implementation

Results 101 - 125 of 654Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: FinancialForce     Published Date: Dec 01, 2017
Making the decision to move to cloud accounting is one step in the right direction; understanding the best approach and how you'll get there is half the battle. But guess what? It doesn't have to be difficult. The purpose of this ebook is to provide you with details on how to best plan your cloud accounting implementation, the benefits of a single cloud approach, and offer some key insights and recommendations when evaluating solutions that will make the implementation process so much easier.
Tags : 
    
FinancialForce
Published By: Longi Engineering     Published Date: Feb 15, 2018
SharePoint is a technology that most organizations have access to these days, yet it is one that is open not utilized fully. This is in part due to organizations not being fully aware of the breadth of SharePoint’s capabilities. Most SharePoint power users/administrators are aware they can leverage SharePoint as a document repository and to share data seamlessly with a group of colleagues, however, they often are not aware of how to leverage some of SharePoint’s key foundational components effectively. As someone who implements SharePoint, one of the biggest complaints we hear from organizations is users aren’t using it, adoption is low. Without user adoption no technology implementation project can be successful. It is difficult to pinpoint one reason that causes adoption to be low, however, taking steps to effectively build your SharePoint site with a solid foundation along with an end goal of high user adoption is a great way to start.
Tags : 
software development, it consulting services, net software solutions, microsoft sharepoint
    
Longi Engineering
Published By: Schneider Electric     Published Date: May 04, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
    
Turbonomic
Published By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
Published By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
optimize customer service
    
Attunity
Published By: athenahealth     Published Date: Oct 02, 2012
Your medical billing, practice management and EHR vendor should be working hard right now to prepare for this transition and to adapt your system for this changeover.
Tags : 
icd-10, icd-10 codes, icd- transition, icd training, icd deadline icd codes download, icd 10 procedure codes, icd 10 code book icd 10 changes, icd testing, icd 10 deadline, icd-10-pcs, icd 10 cm, icd 10 implementation, icd10, icd-10 certification, icd 10
    
athenahealth
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The business models of Aerospace and Defense manufacturers often derive revenue from a number of sources including aircraft and completions as well as aftermarket business. The shop floor affects two of these key sources of revenue. In order to grow the business organically, while maintaining margins, the enterprise needs to deliver more, through the implementation of unprecedented levels of flexible production. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : 
aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: IBM     Published Date: Jul 26, 2017
With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base. High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-centric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
customer analytics, data matching, big data, competitive advantage, customer loyalty
    
IBM
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Through 2021, the majority of system integrators and resellers of core financial management suites will have insufficient knowledge of the functionality in current releases, due to the speed with which software vendors introduce new products. By 2023, 50% of all new midsize core financial management application projects and 25% of large and global ones will be public cloud implementations.
Tags : 
cloud solutions, financial management suites
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
The market for core financial management suites is shifting from on-premises to cloud implementations. Application leaders in midsize, large and global enterprises should use this Magic Quadrant as an aid to identifying suitable vendors of cloud solutions.
Tags : 
cloud solutions, financial management suites
    
Workday Netherlands
Published By: IBM     Published Date: Feb 01, 2016
This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive.
Tags : 
ibm, applications, deployment, release, roi
    
IBM
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
The Aspera FASP high speed transport platform is enabled to provide high-performance secure WAN transport of files, directories, and other large data sets to, from and between a number of leading third-party cloud storage platforms. The implementation is an enhanced transport stack and virtual file system layer in the Aspera server software that allows for direct-to-object-storage transfer over the WAN using the FASP protocol and the native I/O capabilities of the particular third-party file system. The stack is available in all generally available Aspera server software products and supports interoperable transfer with all generally available Aspera client software
Tags : 
    
Group M_IBM Q119
Published By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco, server virtualization, server operating system, data protection
    
NetApp
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure
    
Avocent
Published By: RES Software     Published Date: Jul 03, 2012
George Curtis, CIO of URMC, was looking for a way to keep his team from needing to touch desktops every day. He was in search of solution that would simplify desktop management, and when he learned about RES Software, he was immediately hooked. After only a few months of beginning the implementation of RES, George and his team began seeing major benefits.
Tags : 
res software, technology, healthcare it, healthcare technology, compliance, desktop management, desktop migration, networking solutions
    
RES Software
Published By: Workday     Published Date: Aug 08, 2018
Watch this webinar replay with representatives from Workday and San Mateo County of California to learn about government organizations moving administrative applications to the cloud. Learn best practices for funding, planning, and implementing cloud applications and the benefits of a system that provides a single source of data across all departments.
Tags : 
government, cloud, cloud applications, implementation
    
Workday
Published By: CDW     Published Date: Nov 12, 2012
This white paper will explain DCIM as well as provide technology advice on teh tools and practices for its implementation and use, and how to take advantage of DCIM to improve energy efficiency and effectiveness in the data center.
Tags : 
data center, infrastructure
    
CDW
Published By: Cisco Systems     Published Date: Jun 27, 2013
From the cloud or hosted, outsourced or as a managed service—what is the best way to deploy collaboration services? In this report, Forrester helps IT pros identify key priorities and create an optimal strategy for implementation.
Tags : 
cloud solution, outsourcing, managed service, collaboration, optimal strategy, implementation, technology, empowerment
    
Cisco Systems
Published By: ServiceNow     Published Date: Nov 22, 2013
This document discusses how self-service cloud provisioning can serve as a pragmatic customer-centric approach for managing the proliferation of public and private clouds. It discusses customer expectations, critical success factors, and key metrics required for a successful implementation of such an offering.
Tags : 
servicenow, enterprise it, cloud computing, cloud provisioning, customer-centric cloud, it operations and governance, virtual resources, service catalog, automate everything, it services, put it on the cloud
    
ServiceNow
Published By: Oracle     Published Date: Apr 29, 2014
It is common belief that automation of existing processes and implementation of an Enterprise Resource Planning (ERP) system can help organizations with their strategic objectives and seamlessly translate into operational excellence. While a modern ERP system certainly provides companies with many benefits, it does not necessarily translate to optimal business performance.
Tags : 
oracle, policy compliance, erp, enterprise resource planning, business performance, automation, continuous monitoring
    
Oracle
Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup, email
    
Mimecast
Published By: FICO     Published Date: Nov 21, 2016
The bank wanted to be more consistent, agile and segmented with its implementation of strategies in origination and account management. By applying decision management technology, they were able to achieve success. Download now to learn more.
Tags : 
    
FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.