ops

Results 101 - 125 of 885Sort Results By: Published Date | Title | Company Name
By: rPath     Published Date: Jan 10, 2012
Applications are what business lines really care about. Read this white paper to find out how you can make sure you're delivering an application cloud laser-focused on improving business outcomes.
Tags : 
cloud application deployment, rpath, rpath inc, cloud, clouds, cloud servers, cloud application, cloud deployment, application logistics, application deployment, application update, application provisioning, system deployment, system update, system provisioning, release automation, release lifecycle, configuration management, devops, cloud strategy
    
rPath
By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use
    
Blue Coat Systems
By: VMWare - vFabric     Published Date: May 10, 2012
Join IDC Analysts and NewEdge's Global Head of Data to hear how a new approach to applications and data is driving revenue growth and cost savings.
Tags : 
vfabric, applications, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, newedge, revenue growth, cost savings
    
VMWare - vFabric
By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
By: FusionOps     Published Date: Jun 15, 2016
Download this white paper to learn why Merck Animal Health's Dave Williams is striving for self service supply chain analytics with the help of cloud software.
Tags : 
    
FusionOps
By: FusionOps     Published Date: Jun 15, 2016
Bimodal capabilities, customer intimacy and advanced analytics can all be enabled by digital technologies, allowing supply chains to be both cost-effective and innovation-driven. This research explores the implications of these leading trends for chief supply chain officers.
Tags : 
    
FusionOps
By: FusionOps     Published Date: Jun 15, 2016
The supply chain generates huge volumes of data captured in ERP, CRM, demand planning and other systems. Download this whitepaper to learn how FusionOps Machine Learning can provide companies with a more accurate, granular understanding of their business by harmonizing these disparate data sources in the cloud, and applying machine learning algorithms.
Tags : 
    
FusionOps
By: FusionOps     Published Date: Jun 27, 2016
The term Industry 4.0 presupposes the passing of three major shifts in how businesses approached manufacturing throughout modern history, tracing its roots as far back as the 19th century: Industry 1.0: The Industrial Revolution redefines human limitations by harnessing the power of water and steam. Industry 2.0: Electricity pushes people and machines even further as manufacturing grows in scale and scope. Industry 3.0: The modern computer opens the door for automation
Tags : 
    
FusionOps
By: FusionOps     Published Date: Jul 25, 2016
Life science companies are adopting innovative cloud technology to provide a single source of truth for end-to-end supply chain decision-making. Read this CIO interview to learn how H.D. Smith is using FusionOps supply chain intelligence software to improve efficiency, cost, and quality. Interview Highlights: • How to improve time to actionable insights using a cloud platform • How to improve service levels and forecast accuracy through deeper intelligence into the supply chain • How to enable cross-functional collaboration to make better business decisions and drive performance improvement
Tags : 
    
FusionOps
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover how HPE Advisory Consulting Services consolidates and modernizes workloads and technology siloes, simplifying administration, and improving automation. Learn how IT organizations can support on-demand IT services and enable DevOps, self-service IT and agile development practices, while reducing equipment and operating expenses. This HPE Blueprint provides them with an overview of the steps they need to consider to achieve this outcome. This is valuable information to the IT person, particularly when they don’t know where to begin.
Tags : 
    
Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
    
Hewlett Packard Enterprise
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
By: Panasonic Business Mobility Solutions     Published Date: Sep 06, 2016
A surprising 80% of the 30 million1 warehouse workers worldwide, in the field of transportation and logistics, are still using pen and paper in a physically-intensive environment that increasingly demands accuracy and real time feedback. With warehouse efficiency, so closely tied to customer satisfaction in areas like ecommerce, the low penetration of digital solutions—20% as recent as 2014, is surprising. Unless an organization has a fully automated warehouse, the job is heavily labor-intensive. VDC research reveals that as long as human labor plays a dominant role in warehousing, any technology that optimizes workflows and improves accuracy will add tremendous value
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : 
mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
    
Panasonic Business Mobility Solutions
By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
A global media conglomerate was facing issues with their existing operating model -stagnant quality of support, lack of innovation and inferior/deteriorating end user experience. LTI’s Amplified Outcomes Model - Mosaic helped deliver TCO reduction, coupled with enhanced user experience.
Tags : 
    
Larsen & Toubro Infotech(LTI)
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
By: Oracle     Published Date: Mar 06, 2017
Enterprise mobility is here to stay, but many customers are still bound to their desktops due to the lack of a mobile solution.
Tags : 
    
Oracle
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : 
citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop
    
Citrix Systems
By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management
    
Adobe
By: Adobe     Published Date: Apr 25, 2016
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer?
Tags : 
enterprise mobility, mobile application security, it management
    
Adobe
By: Adobe     Published Date: Mar 21, 2017
Die fünf Best Practices in diesem Leitfaden helfen Einzelhändlern beim Übergang zum Erlebnisunternehmen. Dies bedeutet nicht nur die Zusammenfassung der digitalen und physischen Kanäle in einer vollständig integrierten Customer Journey, sondern auch die Entwicklung von Erlebnissen für Kunden, die deren Bedürfnisse und Wünsche in den Mittelpunkt rücken.
Tags : 
    
Adobe
By: Prophix     Published Date: May 31, 2016
Prophix develops Corporate Performance Management (CPM) software that companies use primarily to manage processes in the finance department, streamlining budgeting, planning, financial reporting and consolidation, and scorecarding.
Tags : 
prophix, performance management, best practices, software development, business management
    
Prophix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.