sim

Results 1 - 25 of 2362Sort Results By: Published Date | Title | Company Name
Published By: IO     Published Date: Dec 31, 2015
The primary focus of any data center is the critical applications that form an enterprise’s business and operational core—its commercial and technical heart. Last-generation facilities, which were often designed using traditional methods created during the mainframe era, simply aren’t capable of handling the requirements of today’s businesscritical applications. Additionally, deploying a data center with inadequate or inappropriate resources, or placing the facility in the wrong location, can negatively impact application performance and, in turn, enterprise success.
Tags : 
    
IO
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location— across time zones or simply across the conference table. Cisco Webex makes working together what it should be - intuitive. Teams can work faster, smarter, and more effectively than ever, while providing the peace of mind that solution administrators want.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA Tier 3 ABM
Published By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Dans un monde des affaires dynamique où les applications et les données sont utilisées en dehors des frontières traditionnelles de l’entreprise, le service informatique doit répondre aux besoins de l’entreprise aussi bien que de ses salariés mobiles. De l’agilité de l'activité à l’efficacité des salariés, les entreprises de tous les secteurs cherchent en permanence à améliorer la productivité. L’informatique a pour mission de gérer l’infrastructure, la sécurité et le contrôle des accès d’une entreprise, tout en soutenant les initiatives destinées à favoriser son agilité et sa croissance, et de veiller à la productivité des salariés.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Si votre entreprise ne déroge pas à la règle, vous êtes aux prises avec différents défis liés au stockage de données. Dans une enquête annuelle de Frost & Sullivan menée auprès de décideurs informatiques, la croissance du stockage a été répertoriée parmi les défis majeurs des centres de données au cours des cinq dernières années2 . Étant donné que les entreprises collectent, répliquent et stockent un nombre toujours croissant de données, la simple acquisition d'une capacité de stockage suffisante constitue un problème.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Do you want to bring continuous delivery to your organization? Or would you simply like to begin your automation Journey? CA Technologies Automation Solutions (formerly Automic) proposes a fourstage blueprint to continuous delivery to assist enterprises at any stage of their DevOps journey. This e-book sets out a plan that can take a company of any maturity level all the way up to enterprise-scale continuous delivery using a combination of CA Continuous Delivery Automation, 40-plus years of business automation experience, and the proven tools and practices the company is already leveraging.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Enterprises today face the major challenge of how to fully orchestrate the apps that define their business and automate the IT processes underpinning them when much of the infrastructure used to run them is outsourced to cloud providers. Opportunity Some cloud service providers offer their own orchestration tools, and each on-premises tool has automation capabilities. But while we own our apps, providers are interchangeable depending on what they can offer and for what price. We should be able to switch between cloud providers and between cloud, on-premises and hybrid infrastructure as and when the business requires, with minimal effort and without losing any control. Sometimes we might want to use more than one provider at the same time, leveraging the advantages of each provider simultaneously. Benefits What is needed is an orchestration layer that remains constant while cloud services come and go; one that enterprises own along with their core apps.
Tags : 
    
CA Technologies_Business_Automation
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Groove     Published Date: May 16, 2018
HotSchedules is a technology company that streamlines several aspects of running a business in the service industry. The sales team at HotSchedules had been using Salesforce for several years, but they were spending a lot of time on data entry and other manual tasks. They needed a way to simplify recordkeeping so they could spend more time talking to prospects. The HotSchedules sales team is taking advantage of the full suite of features in Groove to enhance their sales operations at every turn — from Salesforce integration to multi-step campaigns to analytics. Let’s take a look.
Tags : 
    
Groove
Published By: Abacus Labs     Published Date: Jul 12, 2018
As more pressure is placed on the finance team to provide meaningful insights more frequently, it is becoming increasingly necessary to speed up business processes, as well as have immediate access to the most up-to-date information. The traditional expense reporting process is a drain from both perspectives. Using software to manage employee expenses can provide a more efficient means of managing the process, however most solutions are simply a digital version of the traditional paper process. This can limit the amount of time savings you can gain. This paper will demonstrate the time savings you can accomplish by implementing a real time expense reporting solution versus one that relies on employee generated expense reports.
Tags : 
expense, reporting, roi, calculations, digital, employee, finance
    
Abacus Labs
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: Applause Israel     Published Date: Jun 19, 2018
At the center of every shopping experience is the payment process. The way that brands connect their products and services to their customers, and in turn receive their payments, is the foundation upon which shopping is built. Digital payments, both online and in-store, are transforming that foundation. 80% of Americans are now shopping through online channels on at least a monthly basis, and digital payments have become a primary stream of revenue for brands across all channels1. While offering digital payment options has the potential to simplify life for customers and increase conversion rates, they are creating an additional layer of complexity that is challenging to keep up with. Between the expanding number of digital payment technologies, the increasing number of devices payments can be completed on, and the continuous blurring of digital and physical buying experiences, it is critical to ensure payments will be successful for every person on every device and in every location.
Tags : 
    
Applause Israel
Published By: Gelato     Published Date: Jul 02, 2018
Operating across multiple countries is complex, as is shipping printed material. When our customers shared their stories with us, we knew we needed to act. In April 2017, Gelato entered each BRIC country. By establishing legal entities and print partners within Brazil, Russia, India, and China, Gelato gives customers an easy way to get printed material to colleagues and customers within those borders. The specific considerations in each BRIC country are numerous and often cumbersome. And who better to share insights on the state of local printing than the Gelato country managers on the ground? This ebook is for global enterprises than need to get prints in the BRIC countries, for those that are considering starting up sales and marketing operations in the regions for the first time, and also for domestic businesses that simply want to improve their local print processes.
Tags : 
    
Gelato
Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
    
Akamai Technologies
Published By: Epicor     Published Date: Jun 11, 2018
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it will simply delay the inevitable—even making it worse. The cost of doing nothing is expensive in the long term. This report—from the independent researchers at Aberdeen Group—outlines the reasons organizations choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Epicor has a history of providing software solutions tailored specifically for the manufacturing industry. Check out the report, and see how upgrading to Epicor ERP can help grow your business.
Tags : 
erp software, enterprise resource planning (erp), manufacturing, cloud erp
    
Epicor
Published By: Epicor     Published Date: Jul 10, 2018
In today’s competitive market, FFLs often have inadequate tools that are hindering their growth, or are often sold software rather than solutions to their ATF compliance needs—leaving them confused and less compliant than before. Fortunately, it just got easier to streamline compliance processes and keep your Bound Book up-to-date. Get the facts in a quick-reading guide from the FFL Operations experts at Orchid Advisors and the software experts at Epicor. Learn how firearms businesses like yours are using cloud technology to keep their bound book to date, making compliance tasks much simpler and more cost effective. • Why the ATF changed its rules in 2016 and how you take advantage of it • Practical tips for moving your Bound Book to the cloud, stress-free • Streamline business process and improve ATF Compliance
Tags : 
electronic bound book software, regulations, compliancy, bound book, firearms pos, atf audits, shooting sports software, a&d logging, eforms software, ffl compliance, e4473, guardrails, atf inspections, atf software, firearms retailers, atf compliance, atf eforms, businesses efficiency
    
Epicor
Published By: Genesys     Published Date: Jun 08, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with Microapps
Tags : 
ai solutions, customer experience
    
Genesys
Published By: Genesys     Published Date: Jun 13, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
artificial intelligence, human touch, customer conversations, customer service, reduce costs
    
Genesys
Published By: Genesys     Published Date: Jun 13, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
artificial intelligence, customer service, agent productivity, recommendations
    
Genesys
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com