group

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Apr 13, 2017
Les plates-formes converges Dell EMC ont permis au groupe ProMedica de dployer son systme de gestion des dossiers mdicaux personnels Epic et damliorer les soins prodigus aux patients, tout en favorisant la croissance.
Tags : 
case study, dell emc, hyperconvergence, converged platforms, converged infrastructure
    
Dell EMC
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
digital marketing, operations, big data, analytics, web content management, content management systems, it management, data management
    
Progress
Published By: Workday     Published Date: Mar 20, 2017
A recent report by The Tambellini Group indicates that less than 50 percent of todays colleges and universities are running student information systems developed in this century. Read the report to find out why Workday was chosen as the leading SIS by public four-year institutions in 2015.
Tags : 
workday, integrated learning, workplace success
    
Workday
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development, application integration, enterprise software, software testing
    
Black Duck Software
Published By: IBM     Published Date: Jan 26, 2017
By taking full advantage of the integration and advanced capabilities currently being offered by leading counter fraud solution providers - including predictive analytics and cognitive computing - enterprises can expect to achieve significantly better outcomes.Aberdeen Group's analysis helps to quantify the value of counter fraud analytics in the insurance industry.
Tags : 
ibm, analytics, fraud analytics, insurance, fraud
    
IBM
Published By: Okta     Published Date: Apr 17, 2017
Hear ENGIEs Deputy Group CIO Claude Pierre and Chief Infrastructure Officer Youssef Tahani detail how they connected 24 business units globally, while facilitating adaptation and innovation at the local level.
Tags : 
    
Okta
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions weve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platformstouch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areasmigration, security, costs, and visibilitywhere CIOs can make major differences in the successful execution of hybrid cloud strategies. Weve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: OpenText     Published Date: Apr 12, 2016
Read the Digital Clarity Group report to learn how you can increase the value of your enterprise content by extending it to business applications.
Tags : 
opentext, content management, ecm, business applications, business integration, return on investment, content management system, information management
    
OpenText
Published By: OpenText     Published Date: Apr 11, 2016
Read the Digital Clarity Group report for advice on how to initiate conversations internally about GDPR and questions you should ask your vendors to determine compliance levels.
Tags : 
opentext, gdpr, general data protection regulation, data. data inventory, network security, compliance, email security, security policies
    
OpenText
Published By: McAfee     Published Date: Mar 31, 2017
Aberdeen Group discusses the move to the public cloud and the security shared responsibility model that leverages the strengths of both the public cloud service providers and enterprises
Tags : 
virtualization, public cloud, infrastructure as a service, iaas, cloud security, devops, devsecops
    
McAfee
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg, ip storage, storage management, enterprise software, business intelligence
    
Mimecast
Published By: JTE Group     Published Date: Mar 05, 2013
unlimited bulk email in delhi/ncr
Tags : 
    
JTE Group
Published By: Hewlett Packard Enterprise     Published Date: Mar 07, 2017
For decades, lasers and inkjets have dominated workgroup and enterprise printer technology. What are IT pros deploying today? As printer technologies evolve there are new considerations for IT as they strive to meet the increasing demands of both business and IT users.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their companys information is secure and today any device can become an access point threat. Printers and MFPs can be the Achilles Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn whats necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: HPE     Published Date: Jan 04, 2016
A New Class of Storage for the All-flash Data Center: HP 3PAR StoreServ 20000 Enterprise Flash.
Tags : 
    
HPE
Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gardner magic quadrant, cisco, contact center, omnichannel routing, best practices, cloud computing, application performance management, business activity monitoring
    
Cisco
Published By: Cisco     Published Date: Feb 12, 2016
Offices arent productivity factories anymoretheyre collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isnt just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
ebooks, cisco, productivity, digigal, collaboration tools, best practices, business integration, business intelligence
    
Cisco
Published By: Code42     Published Date: Apr 28, 2016
CyberEdge Groups third annual Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1000 IT security decision makers and practitioners conducted in November 2015, the report delivers insights IT security teams can use to compare their perceptions, priorities, and security postures to their peers.
Tags : 
    
Code42
Published By: Hewlett Packard Enterprise     Published Date: Feb 08, 2017
Learn how you can meet all of your IT infrastructure needs by taking a hybrid IT approach that gives you the performance of on-premise with the flexibility of the cloud in this Aberdeen Group report.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip, network management, network performance, network security, wide area networks
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
    
Cisco
Published By: HPE     Published Date: Feb 20, 2015
Many businesses continue to rely on outdated IT infrastructures to run the extremely demanding workloads of today. Not surprisingly, these businesses are facing increasing complexity and challenges. However, by taking the important step to adopt next generation infrastructure hardware, leading organizations are gaining a great opportunity to meet the challenges of these workloads with a reliable and optimized environment that delivers the services that customers demand, and brings significant benefits and returns on investment.
Tags : 
    
HPE
Published By: Oracle     Published Date: Mar 05, 2015
Business buyers are more demanding than ever. They expect organizations to meet their precise needs through the life-cycle of interactions with B2B brands. This means providing todays business buyers with consumer like-experiences that allow them to do their job better and easier, and making the complex simple. Download this white paper from Aberdeen Group to learn the five best practices to get B2B e-commerce right and how to achieve best-in-class performance in customer retention, revenue growth, and operational efficiency.
Tags : 
oracle, b2b, commerce, empowerment, customer, e-commerce, content
    
Oracle
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.