implementation

Results 276 - 300 of 650Sort Results By: Published Date | Title | Company Name
Published By: Epicor HCM     Published Date: Sep 26, 2012
In this white paper you will learn how to make the business case for a new HRIS to senior executives.
Tags : 
hris upgrade, hris implementation, human resources, hr systems, human resources information systems
    
Epicor HCM
Published By: IBM - Tririga     Published Date: Dec 21, 2011
A recent study by Gartner, in collaboration with TRIRIGA, an IBM Company, surveyed 130 professionals responsible for the planning and implementation of sustainability initiatives across large corporations. This paper provides a thorough analysis of these survey results.
Tags : 
ibm, technology, tririga, sustainability, asset management
    
IBM - Tririga
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : 
siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools
    
McAfee
Published By: eZuce     Published Date: Aug 15, 2013
Want to enable employees to communicate and collaborate socially on a secure internal network? Gain control of BYOD? Eliminate your aging PBX and replace it with a modern, software-only cloud solution? This exclusive research study from internationally renowned Wainhouse has identified the top barriers for UC projects: high costs and slow implementation, leading to high Total Cost of Ownership (TCO). But there are ways to easily overcome both these barriers and ensure UC success. Download the paper today and learn more about how to use UC to drive business business results for your organization.
Tags : 
tco, total cost of ownership, unified communications, virtualization, cloud communications, communication and collaboration, social collaboration, it costs, cut it costs, virtualized communication, secure buy-in, driving it innovation, uc adoption, byod, manage byod, control byod
    
eZuce
Published By: Compass Datacenters     Published Date: May 19, 2014
Due to their historically limited alternatives, many businesses have been forced to justify the inefficiency of their data center implementations based on “the myth of scale”. Download to learn more!
Tags : 
compass datacenters, myth of scale, scale, finance, mtdc, first costs
    
Compass Datacenters
Published By: Cisco     Published Date: May 15, 2015
This guide will provide the steps necessary to configure a Microsoft Fast Track Small Implementation cloud built on EMC VSPEX, which is built on Cisco Unified Computing System and EMC VNXe technologies.
Tags : 
cloud computing, erp, productivity, applications, efficiency, virtual machines
    
Cisco
Published By: Dell EMC     Published Date: Mar 18, 2016
This white paper provides an introduction to the EMC Isilon scale-out data lake as the key enabler to store, manage, and protect unstructured data for traditional and emerging workloads. Business decision makers and architects can leverage the information provided here to make key strategy and implementation decisions for their storage infrastructure.
Tags : 
emc, emc isilon, data lake, storage, network, unstructured data
    
Dell EMC
Published By: OnBase by Hyland     Published Date: Oct 12, 2015
See how implementing an ECM solution enterprise-wide helps meet your constantly evolving business needs
Tags : 
ecm, electronic capture, technology, ecm implementation, technology decision making
    
OnBase by Hyland
Published By: LogRhythm     Published Date: Jun 19, 2018
SIEM deployments may stall or fail if not implemented with the right scope, use cases, data sources, architecture, expertise or staff size. Security and risk management leaders deploying a SIEM solution should follow this structured approach to ensure a successful implementation.
Tags : 
siem, gartner, risk, management, implementation
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Kronos     Published Date: Jul 26, 2017
The results of a 2016 study on employee burnout conducted by Kronos and Future Workplace show that 95 percent of HR leaders agree that burnout affects employee retention. Although serious, the issue of burnout isn’t insurmountable if organizations are proactive in addressing its causes. The implementation of new workforce technology with flexible scheduling capabilities and workforce analytics can help stop burnout before it starts.
Tags : 
employee satisfaction, employee retention, technology, workforce analytics, burnout
    
Kronos
Published By: Monetate     Published Date: Apr 06, 2018
Personalization for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. Not only are consumers expecting hyperpersonalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalization from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalization technology and what companies can expect to gain with implementation. • Four myths about personalization that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalization roadmap for your company. • Eight questions to ask when shopping for a personalization partner that will help you ensure you are getting the right tools and expe
Tags : 
    
Monetate
Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra
Published By: Zebra Technologies     Published Date: May 02, 2018
Up to 5% of all hospitalized patients are affected by ADEs. Implementing a comprehensive Barcode Medication Administration (BCMA) program can help, reducing medication errors up to 80%. In this white paper Zebra Technologies uncovers best practices for adopting Barcode Medication Administration, including: The importance of building a multidisciplinary implementation team The role of efficient, well-defined workflows How accurate data management and reporting are essential to ongoing BCMA success
Tags : 
safety, technology, zebra, medical, administration
    
Zebra Technologies
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
With privacy breaches becoming increasingly common, many organizations look to SSL as a way to protect the integrity of their data online. However, the implementation of a comprehensive SSL strategy comes with its own challenges of visibility, performance and scale. Through proper planning and deployment, a strong SSL strategy mitigates the risk of breaches. Once the strategy is in place, the site will be positioned for future security, scalability, and reliability, putting the focus where it really matters--moving business forward.
Tags : 
ssl, ssl solutions, networking, privacy, security, network security
    
F5 Networks Inc
Published By: Logrhythm     Published Date: Feb 24, 2016
This research will help you to: - Select an appropriate SIEM solution based on vendor research. - Create an implementation roadmap. - Define your SIEM architecture. - Measure the continued value of your SIEM.
Tags : 
security, security application, siem, siem architecture, it security managers
    
Logrhythm
Published By: Citrix     Published Date: May 27, 2009
Whether you're considering your first virtual desktop solution or trying to salvage an existing implementation, Citrix XenDesktop is the clear choice on the market that offers the performance, scalability and manageability required to meet your business needs.
Tags : 
citrix, virtualization, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers, xenserver, network interface cards, nics
    
Citrix
Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight
    
Courion
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
In this case study from Ombud Open Research, you will learn how US Bank is using electronic signature technology to streamline account openings and SMB loans. With e-signatures deployed across more than 3,000 branches, US Bank is leveraging both the Silanis on-premise e-signature solution and the Silanis cloud e-signature service for different processes. As a result, they have achieved operational efficiencies, improved customer experience and increased top-line revenue. The bank is currently e-signing 460,000 documents each week – a number that will continue to grow as US Bank’s initial implementation of electronic signatures is currently being re-purposed across the entire organization.
Tags : 
banking, account openings, financial services, technology, finance
    
E-SignLive by Silanis
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA
Published By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservices implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.