it strategies

Results 1 - 25 of 909Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 14, 2015
This eBook examines operations and the most likely causes of outages in a data center along with organizational strategies that can eliminate or minimize the potential for unplanned downtime in a data center.
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
When companies evaluate potential data centers and colocation service providers, they normally compare them using some kind of criteria or checklist. However, many such efforts fail to sufficiently evaluate the breadth and depth of detail necessary to make a well informed decision. This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider. Specifically, this paper examines the importance of factors such as risk mitigation, operational processes and service assurance, combined with maintenance and lifecycle strategies that directly contribute to “high-availability service delivery.”
Tags : 
    
FORTRUST
Published By: RagingWire Data Centers     Published Date: Oct 09, 2015
Today’s modern IT infrastructure is demanding more out of its resources, expansion strategies, delivery methods and disaster recovery methodologies. To help meet these new growing demands, many organizations are turning to colocation providers to help service their data center needs. But what makes up a good data center decision? Is it just the location? What about the bandwidth coming into the site? What about green technologies and the adoption of new unified technologies? The reality here is that there are several key consideration points which need to be made when choosing the right data center colocation solution. Now with cloud computing and a truly distributed, data on-demand, environment, making the right choice has become more important than ever.
Tags : 
    
RagingWire Data Centers
Published By: RagingWire Data Centers     Published Date: Oct 09, 2015
Data Center Migration, three words that can cause sleepless nights to even the most experienced professionals involved in enterprise IT and facilities departments. While it can be a daunting challenge, it also offers a great opportunity to improve and rethink your IT architecture and examine how well it meshes with your organization’s long term business strategies. This whitepaper examines some of the major strategic issues that should be an integral part of your evaluation when forming a data center migration strategy.
Tags : 
    
RagingWire Data Centers
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Workday     Published Date: Mar 02, 2018
Higher education must make changes to best prepare students for the shifting economy. This whitepaper outlines the skills needed in the workplace of tomorrow and strategies colleges and universities might consider to ready their students for what’s to come.
Tags : 
higher education, shifting economy, students, workplace
    
Workday
Published By: Panaya     Published Date: Jun 01, 2018
Hear IDC Research Director for ALM Strategies explain how establishing effective agile approaches to software development, QA and testing, ensures software relevance, streamlines execution and increases release velocity. Join IDC guest speaker and Panaya experts to hear: › IDC Research Director, Melinda-Carol Ballou cover the latest ALM industry practices › Which ALM strategies bring greater agility to your backend system › How to implement these practices to achieve frequent, quality change releases
Tags : 
    
Panaya
Published By: Olapic     Published Date: Jun 05, 2018
Olapic is an innovator in visual content solutions, offering the technology and expertise to help brands create authentic, personalized, and effective customer experiences along their entire journey. Through user-generated content – content that is earned from consumers; influencer-generated content – content that is requested from specific creators; and enhanced branded content – existing image or long-form video content that is transformed into short form videos, Olapic helps brands get the right visual content, use it across marketing channels, and understand its impact on performance and ROI.
Tags : 
user generated content, content marketing, marketing trends, visual marketing, video marketing, brand building, brand marketing, social media marketing, customer marketing, increasing engagement, visual content, brand building, customer marketing, earned content, digital marketing strategies
    
Olapic
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Datastax     Published Date: May 14, 2018
"What’s In The Report? The Forrester Wave: Translytical Data Platforms, Q4 2017 report reviews companies that offer “translytical data platforms”, which Forrester defines as an “emerging technology” that delivers “faster access to business data to support various workloads and use cases.” Download the report if you want to learn: -Why Forrester named DataStax a leader among 12 companies it identifies as “the most significant translytical vendors. -What constitutes a “translytical data platform” and why translytical data platforms are so critical for enterprise data strategies today. Why performance, scale, security, and use-case support are the key differentiators."
Tags : 
    
Datastax
Published By: Epicor     Published Date: Jun 11, 2018
Focus on your best customers and minimize time wasted on unprofitable partnerships to maximize LBM business growth through the benefits of the trending practice of customer stratification. Epicor BisTrack Software, an LBM-specific business software, provides all the tools and information you need to implement customer stratification and reap the benefits of knowing your customer’s buying habits and successes. Download the e-book from Epicor to: 1. Understand the Benefits of Stratification 2. Explore The Four Customer Types 3. Ask Yourself These Important Questions 4. Apply Strategies to Maximize Results 5. Sustain Success With a Focus on Customers
Tags : 
lumber, building materials, lbm, erp, bistrack, lumber distributors, customer stratification, customer experience
    
Epicor
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Service Now     Published Date: Jan 26, 2018
The accelerating pace of technology innovation will offer organizations new opportunities to engage with customers as they build a digital business. Application leaders must be ready to translate habits of customer centricity into a new set of improved actions to support CRM and CX strategies.
Tags : 
    
Service Now
Published By: HireVue     Published Date: May 18, 2018
Recruiting leaders know that if their companies aren’t sourcing and hiring for diversity they are missing valuable talent and experience. This is one of the reasons diversity has been a focus area for improvement in recent years. Many organizations start with training. While diversity training is important for creating awareness, it doesn’t a¬ffect human behavior. A 2017 meta-analysis of studies investigating bias training confirmed this. Formal training can reduce unconscious bias, but it does not change behavior.13 This has put talent leaders in a di cult position. The way to make real progress on diversity hiring initiatives is by using systematic processes that apply data-driven decision making. With structured interviews and AI, you can overcome unconscious bias and make hiring more equitable for all candidates.
Tags : 
    
HireVue
Published By: Adobe     Published Date: May 15, 2018
The companies that are succeeding today are the ones that go beyond their products and services and create exceptional experiences. We surveyed industry leaders around the world to discover the top digital marketing trends and priorities. We’re sharing the results of the 2017 Digital Marketing Study in Running on Experience. Read the report to learn: What strategies and approaches set leaders apart from the rest Where companies in your industry are investing The four steps for digital transformation
Tags : 
    
Adobe
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data. This transformation is also amplifying competition. As analyst Mark Raskino notes, “As a consequence, all players rebuilt their strategies around the same time, and all have awakened to the power of digital business at the same time. Contention is therefore inevitable.”1
Tags : 
    
CA Technologies EMEA
Published By: ForUsAll     Published Date: Jun 18, 2018
While the real cost of losing an employee is difficult to measure and can vary widely depending on job complexity, one study by the Center for American Progress found that turnover for workers earning less than $50,000 annually cost 21% of their annual salary. With the U.S. economy nearing full employment, competition for talent is getting fierce, which means that attracting and retaining quality talent is now more important than ever. Luckily, there are affordable ways to make your company more competitive at attracting and retaining talent. Offering higher quality, affordable, comprehensive benefits has never been more important. And one of the most important and affordable benefits that you can improve is your company’s 401(k). But just how does one turn their 401(k) into a powerful recruiting and retention tool? In this White Paper, we’ll walk you through five strategies that forward-thinking companies are already using to turn their 401(k)s into strategic business drivers that att
Tags : 
    
ForUsAll
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, data center design and management
    
123Together
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com