mba

Results 1 - 25 of 311Sort Results By: Published Date | Title | Company Name
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, its fair to say the perimeter has left the premises. Whether its discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, todays attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Since it first started providing air passenger services in 2000, JetBlue has been innovating. It was the first airline to embrace dot.com transactions and electronic ticketing, and continues to churn out industry-leading inventions as described here. When business needs changed in 2014, JetBlue embarked on very robust digital transformation based on TIBCO integration and analytics technologyand the company was recognized with the first-ever TIBCO Trailblazer Impact award for the incredible effect this project was having on its strategic differentiation. In this case study, Director of Shared Development Services Andi Azzolina describes the objectives, initiatives, capabilities, and achievements making up JetBlues journey towards becoming the most caring travel provider in the world.
Tags : 
    
TIBCO Software APAC
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesnt matter whether youre new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If youre new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
You are most likely reading this because you are either an Oracle Retail customer or are about to embark on an Oracle Retail implementation. As with all major application implementations, you must make a significant investment, often of several months or more, to develop a reliable and efficient batch schedule. With CA Automic Workload Automation, you can cut the batch schedule development and implementation time to just a few weeks, and also reduce ongoing maintenance. The result is reduced total cost of ownership (TCO). This white paper describes how CA can help significantly shorten your Oracle Retail batch schedule development time. In addition, the paper describes how this Oracle Validated solution optimizes performance of Oracle Retail so your core retail processes will run faster and be more agile.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programacin de aplicaciones (API por sus siglas en ingls) representa una oportunidad de negocio y supone un reto tcnico. Para los lderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilizacin de sistemas back-end en las nuevas aplicaciones web y mviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos tcnicos de un programa de API estn estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que debern construir la interfaz.
Tags : 
    
CA Technologies EMEA
Published By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesit una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integracin de los servidores y la infraestructura de la red, as como a capacidades de software ms avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, data center
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats todays advanced malware attacks using a combination of four techniques: Advanced analytics Collective global security threat intelligence Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: BlackLine     Published Date: Aug 06, 2018
If youre in the middle of a finance transformation initiative, then youre not alone. Leaders at enterprise and mid-size finance and accounting organizations alike are reviewing their current processes, technology, and talent, to build their blueprints for change. With the rise of broader digital transformation projects, finance organizations are first looking to upgrade their own operating models. The truth is that finance transformation is a journey, not a destination. Many finance organizations have already embarked on it, driving down costs, whether through enhancing shared services centers, or applying more centralization, standardization, and automation.
Tags : 
    
BlackLine
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives.
Tags : 
    
Dell EMC & Intel
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customers perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique lattention des responsables mtier et IT sur les actions entreprendre ds MAINTENANT pour grer la mobilit future de lentreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, cloud computing
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Modern businesses are increasingly embracing digital transformation leveraging new technologies to reinvent core processes, business models, product offerings, and the customer experience. As businesses embark on the digital transformation journey, they need to modernize their underlying technology infrastructure to enable a more agile, customerfocused, flexible, and innovative digital workplace to drive greater human and operational efficiencies. Intel Inside. Powerful Productivity Outside. Intel Xeon processor
Tags : 
    
Dell EMC
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless, classroom, media-rich apps, school
    
Ruckus Wireless
Published By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
    
Pega
Published By: VSP     Published Date: Sep 08, 2017
Research shows that wellness plans are extremely important to your clients. Employers have very solid reasons for embarking on a wellness program, including increased productivity and lower health costs for their employees. They are struggling to achieve their goals, however. Many employers arent sure how to begin a program; even the most advanced employers in terms of wellness are seeking ways to improve their wellness activities
Tags : 
    
VSP
Published By: Oracle     Published Date: Feb 15, 2018
I progressi nel campo digitale rivoluzionano in profondit il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilit senza precedenti. Questi cambiamenti sono grandi opportunit, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessit di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
guida, approccio, integrato, odierne, informatica, oracle
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
I progressi nel campo digitale rivoluzionano in profondit il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilit senza precedenti. Questi cambiamenti sono grandi opportunit, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessit di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
guida, approccio, integrato, odierne, informatica, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
I progressi nel campo digitale rivoluzionano in profondit il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilit senza precedenti. Questi cambiamenti sono grandi opportunit, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessit di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: FireEye     Published Date: Nov 27, 2012
Combating the Attack of Choice for Cybercriminals
Tags : 
cybercriminals, fireeye, phishing attacks, apt, advanced persistent threat, security
    
FireEye
Published By: BMC Software     Published Date: Jun 26, 2013
Cloud is not simply a new technology platform, its a new way of running your IT processes. Success changes relationships with users, with services and with operations. Learn what to anticipate as you embark on cloud and how to ensure success not just in your datacenter, but in your business.
Tags : 
cloud management, hybrid cloud, cloud planning, cloud operations, cloud users, cloud process, it management, data center
    
BMC Software
Published By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal cloud-like initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMCs Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure, best practices, business intelligence, cloud computing, infrastructure
    
BMC Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.