operations

Results 1 - 25 of 1317Sort Results By: Published Date | Title | Company Name
Published By: IO     Published Date: Dec 31, 2015
These are all marketing terms being used to describe data center colocation offerings. (IO is no exception.) But what do these terms really mean to an organization? What does “next-generation” or “2.0” or “future proof” or “hybrid” do for those people who are responsible for data center operations? Why should a CIO or data center manager care if his data center is “next-generation”? Why look for a provider with an “enterprise hybrid solution”? In this Solution Guide, we cut through the marketing hype and answer those questions.
Tags : 
    
IO
Published By: FORTRUST     Published Date: Aug 12, 2015
Data Center Infrastructure Management (DCIM) has become more vital than ever to data center operations as efficiency and technology advancement cycles move at an increasingly rapid pace. The insight provided by these essential systems has historically only been accessible to the data center operations team, not the end user or for that matter – the colocated customer. Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
This eBook examines operations and the most likely causes of outages in a data center along with organizational strategies that can eliminate or minimize the potential for unplanned downtime in a data center.
Tags : 
    
FORTRUST
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: CyrusOne     Published Date: Jul 06, 2016
Data centers help state and federal agencies reduce costs and improve operations. Every day, government agencies struggle to meet critical cost controls with lower operational expenses while fulfilling the Federal Data Center Consolidation Initiative’s (FDCCI) goal. All too often they are finding themselves constrained by their legacy in-house data centers and connectivity solutions that fail to deliver exceptional data center reliability and uptime.
Tags : 
    
CyrusOne
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
hpe synergy, api, infrastructure, hybrid it, workloads, code
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Carbonite     Published Date: Oct 04, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration. Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target.
Tags : 
migration mistakes, operations, dependencies, expectation setting, contingency planning
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Cloud Backup continues to be a hot topic, and its adoption has increased during the past two years, albeit from a small base. Infrastructure and operations leaders should leverage public cloud infrastructure as a service to reduce their data center server backup footprints.
Tags : 
iaas, backup, recovery, cloud, infrastructure, data center
    
Carbonite
Published By: CA Technologies     Published Date: Aug 22, 2017
The world of computing is changing before our eyes. Industries that had a consistent and predictable business model for generations are being turned upside down. In the digital economy, a seamless customer experience is critical. Whether a retailer is exploring new innovative online selling strategies or a bank is determining how to anticipate customer needs for new services – a high performing and scalable IT ecosystem is key to success. At the end of the day, as an IT leader, you need to help your business anticipate opportunities, drive growth and proactively prevent threats to your company’s revenue.
Tags : 
proactively manage, remediate faster, improve productivity, collaborate efficiently, application performance, ca technologies
    
CA Technologies
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
Account-Based Marketing (ABM) is one of the truest ways to align your sales and marketing operations to drive holistic account interactions that yield higher returns. According to the Alterra Group, “84% of marketers find that ABM provides significant benefits for retaining and expanding existing client relationships, while 97% say that it delivers a higher ROI than other marketing methods.”able revenue.” Download this brief to discover how ABM can help guide sales strategies, improve prospecting, and increase conversions.
Tags : 
    
Oracle Marketing Cloud
Published By: Dassault Systèmes     Published Date: Sep 26, 2017
This webinar reveals how Dassault Systèmes helps Airbus Helicopters improve operations management. View this video now to find out more.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Epicor     Published Date: Nov 07, 2017
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
    
Epicor
Published By: Juniper Networks     Published Date: Aug 08, 2017
Mainstream enterprises should start taking advantage of the new capabilities being delivered by software-defined networking architectures. This research identifies a pragmatic roadmap for infrastructure and operations leaders to leverage the benefits associated with SDN.
Tags : 
    
Juniper Networks
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
    
Oracle HCM Cloud
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The foregoing use cases—all with varying levels of complexity—are an overview of the creative development opportunities afforded by OpenDXL. We hope these have inspired you to start your own OpenDXL project. Bookmark and explore these pages for core resources. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
opendxl, integrate, orchestrate, expedite, security, operations
    
McAfee EMEA
Published By: UPS     Published Date: Sep 28, 2017
This series explores the role of modern digital technology in the evolution of manufacturing production, defined here as the value chain of internal and external contributors to the manufacture and delivery of products. Each chapter is designed to help operators visualize how they can build-out production of the future, and how to leverage help from the value chain to make faster progress.
Tags : 
manufacturing production, digital supply chain, smart operations, digital transformation, industrial internet of things
    
UPS
Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap
    
SAP
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com