sap

Results 526 - 550 of 1063Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: May 05, 2016
Manufacturers evolve to extend business process and embrace digital technologies across the supply chains to adapt in today’s ever changing marketplace. Watch the video for insights from Simon Ellis, the Program Vice President of IDC Manufacturing Insights.
Tags : 
sap, idc, supply chain, digital, software development, knowledge management
    
SAP
Published By: Cisco     Published Date: Aug 03, 2015
Business value of UCS.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
IDC finds that leveraging data analytics in business decisions is becoming a top priority for an increasing number of companies. This in turn is placing new demands on IT organizations; the need is twofold: to manage new streams of unstructured data from sources such as social media and to speed response times to deliver real-time analytics.
Tags : 
sap, analytics, data, real-time, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
This white paper presents IDC’s analysis of the business value organizations are achieving by using Cisco UCS as a platform for SAP HANA and other SAP Business Suite applications. This analysis is based on IDC’s interviews with 12 Cisco UCS customers. These organizations are all relatively large organizations (1,500–85,000 employees), with an average of 25,383 employees. Interviewees represent a variety of industries: natural resources, agriculture, energy, government, automotive, retail, food and beverage, distribution, technology, healthcare, and IT. These organizations are based in the United States, EMEA, Mexico, and Brazil.
Tags : 
cisco, idc, business values, cisco ucs, sap hana, sap business suite, networking, it management, wireless, knowledge management, enterprise applications, data management
    
Cisco
Published By: SAP Inc.     Published Date: Jun 16, 2009
This white paper presents IDC’s framework for implementing operational excellence (op ex) and helps the reader move toward an effective op ex implementation while avoiding potential pitfalls.
Tags : 
sap, operational excellence, op ex, internal assessment, competitive benchmarking, resource prioritization, enterprise applications
    
SAP Inc.
Published By: SAP     Published Date: May 03, 2016
Organizations are transitioning from mass-market operating models to consumer-centric models. This operating model transformation is essential to delivering on the promise represented by the new experiences being created.
Tags : 
sap, iot, digital transformation, consumer centric, experience, enterprise applications, data management, business technology
    
SAP
Published By: SAP SME     Published Date: Nov 02, 2017
Ante consumidores mejor informados que esperan omnicanalidad, la modernización de la cadena de suministro se vuelve imperante para que las organizaciones minoristas puedan mantener su competitividad.
Tags : 
    
SAP SME
Published By: Cisco     Published Date: Sep 08, 2016
This white paper shows how SAP received a 528% ROI from Cisco programs.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
As digital workplace initiatives grow, it is vital to examine their impact through a financial business case to obtain funding, structure stakeholder dialogue and secure commitment. Here, we describe how IT leaders can create a convincing business case with a strong link to business benefits
Tags : 
    
Cisco
Published By: SAP     Published Date: Mar 08, 2016
This white paper discusses the various challenges facing the manufacturing supply chain. It highlights the importance of networks, collaboration, and supply chain visibility as they pertain to the supply chain's role, relative to the external environment. The evolution must then occur within the internal supply chain environment to meet these external requirements, while meeting internal business objectives.
Tags : 
sap, idc, supply chain, manufacturing, knowledge management, data management
    
SAP
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time
    
Aternity
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: SAP     Published Date: Mar 09, 2017
In April 2016, SAP commissioned Forrester Consulting to evaluate how enterprises are taking advantage of IoT, how IoT fits into broader digital transformation initiatives, and the role of immediate insights in realizing the benefits that IoT can deliver.
Tags : 
    
SAP
Published By: SAP SME     Published Date: Nov 02, 2017
Ha llegado el momento de utilizar el internet de las cosas (IoT) de modo inteligente para impulsar la eficiencia y la efectividad en la prestación de servicios. Piense en semáforos conectados y datos recolectados de sensores para medir cosas tales como niveles de acústica, calidad del aire, temperatura y presión. Las agencias de gobierno y los socios de prestación de servicios pueden utilizar IoT para tomar mejores decisiones más rápido y satisfacer las necesidades públicas con mayor efectividad.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Nov 02, 2017
Para el año 2019, 75% de los grandes fabricantes actualizarán sus operaciones y modelos operativos con IoT y conocimiento de situación basado en analíticas para mitigar los riesgos y acelerar el tiempo de llegada al mercado*. La misión de su empresa es transformar lo que diseña, construye, vende y mantiene
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Nov 02, 2017
Las expectativas del consumidor estan cambiando y los modelos de negocio tambien deberían hacerlo. En la era del consumidor digital, IDC asegura que solo aquellas empresas que puedan interactuar con cada consumidor individualmente –para construir relaciones a largo plazo que sean personales y auténticas– sobrevivirán y prosperarán.
Tags : 
    
SAP SME
Published By: SAP     Published Date: Jul 18, 2016
Organizations are investing in new analytics technologies to improve agility and performance. The technology and data must come together to serve the business users under the guidance and management of IT. Read the white paper to learn key findings in the analytics market and learn how to deliver analytics capabilities suitable for a wide range of use cases.
Tags : 
    
SAP
Published By: SAP SME     Published Date: Nov 02, 2017
Ebook integración en todo el marco de negocios digitales
Tags : 
    
SAP SME
Published By: SAP     Published Date: Jan 21, 2010
This is the key finding of a major programme of research, conducted by the Economist Intelligence Unit and sponsored by Business Objects, into how senior executives in different regions make decisions for their companies.
Tags : 
sap, economist intelligence unit, executive decision-making, decision support tool, information management, it management
    
SAP
Published By: SAP Inc.     Published Date: Jul 28, 2009
Decision-making is at the core of all business activity, as executives set strategy and manage operations by weighing a vast array of factors to arrive at the desired balance of risk and reward. The enormous growth of companies' size and operations in recent years-particularly across borders-is making this process increasingly complex. It is cause for alarm, then, that executives themselves perceive the quality of decision-making at their companies as mixed at best.
Tags : 
sap, business intelligence, dashboards, analytics, decision-making, enterprise applications, platforms
    
SAP Inc.
Published By: RedHat     Published Date: May 10, 2017
To reduce IT costs and improve performance, Indesso successfully deployed a SAP application on Red Hat Enterprise Linux. Migrating to Red Hat Enterprise Linux has lowered IT maintenance costs by 45% and hardware costs by 65%. In addition, the company has gained improved operational efficiency across its business. Read on to find out more.
Tags : 
red hat, linux, enterprise linux, reduce costs, improve efficiency
    
RedHat
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com