Skip to content
 

best practice

Results 326 - 350 of 2714Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 24, 2016
In letzter Zeit stellen Kunden immer häufiger die Frage, wie AirWatch Office 365 unterstützt. Viele fragen, ob AirWatch den Zugang zu Office 365 (O365) nicht nur auf ihren geschäftlichen Desktop-Systemen, sondern auch auf ihren Mobilgeräten steuern kann.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence
    
VMware AirWatch
Published By: Skytap     Published Date: Aug 23, 2017
The majority of Fortune 500 companies, along with many other enterprises, currently run business critical applications on AIX on IBM Power Systems. For these businesses, incorporating AIX workloads into an enterprise cloud strategy can present significant challenges, most notably the lack of support for these workloads from typical cloud infrastructure providers. Skytap Cloud is the only public cloud that offers support for AIX workloads alongside applications running on x86 architectures. This guide details the considerations involved and best practices for migrating your AIX workloads to Skytap Cloud.
Tags : 
    
Skytap
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: Kaminario     Published Date: May 05, 2016
Kaminario takes a highly unique approach to storage that does not force IT organizations to make tradeoffs between scalability, performance and cost-efficiency.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, infrastructure
    
Kaminario
Published By: CMO.com     Published Date: May 10, 2016
New research from Altimeter Group found many organizations start the journey pursuing a "safe approach" that is more like “business as usual” than it is digital transformation.
Tags : 
business management, strategy, business optimization, best practices, digital management, business reporting
    
CMO.com
Published By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection
    
Thawte
Published By: Red Hat     Published Date: Jun 23, 2016
Amadeus is a leading provider of innovative technology solutions for the global travel industry. To meet changing customer demand, the €4 billion company needed a new computing platform that was highly available, flexible, and tolerant to infrastructure fluctuations. Amadeus chose OpenShift Enterprise by Red Hat as the foundation for its new application infrastructure. When the project is complete, Amadeus expects the cloud solution to decrease system latency for better customer service, increase platform availability, streamline operations through automation, and reduce time to market for new services.
Tags : 
enterprise, best practices, productivity, technology, cloud solution
    
Red Hat
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: New Relic     Published Date: Mar 17, 2015
Are you an AWS user looking to accelerate time to market? Lower costs? Or avoid painful mistakes as you migrate your applications to the Cloud? If you answered “yes” to one or all of the above, then this guide is for you. It offers everything you need to get started improving the performance of your AWS applications with end-to-end monitoring from New Relic. From instructions for installing the agent, a basic feature overview, to AWS best practices, this guide is full of useful information for New Relic newbies. Although we recommend installing New Relic early on to monitor and ensure the success of your cloud migration, it’s never too late to get better visibility into your application environment. So let’s get started exploring everything that New Relic can do for you.
Tags : 
cloud integration, cloud computing, cloud migration, apm, application performance, management, application environment
    
New Relic
Published By: SAS     Published Date: May 04, 2017
Should you modernize with Hadoop? If your goal is to catch, process and analyze more data at dramatically lower costs, the answer is yes. In this e-book, we interview two Hadoop early adopters and two Hadoop implementers to learn how businesses are managing their big data and how analytics projects are evolving with Hadoop. We also provide tips for big data management and share survey results to give a broader picture of Hadoop users. We hope this e-book gives you the information you need to understand the trends, benefits and best practices for Hadoop.
Tags : 
    
SAS
Published By: Intel Corp.     Published Date: Apr 26, 2012
Intel IT has defined an architecture and implementation roadmap for a private enterprise cloud designed. This white paper discusses best practices to follow to ensure your private cloud improves agility and IT efficiency throughout your organization.
Tags : 
cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
    
Intel Corp.
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: PTC     Published Date: Aug 21, 2009
In today's complex global life sciences marketplace, the ability to manage product information is a daunting task. The ability to ensure greater control over this critical product information has led to the development of a standard for product information throughout the European Union. If your company as not begun to think about PIM, now is the time, download this white paper immediately.
Tags : 
best practices, enterprise resource planning, enterprise software, product lifecycle management, plm, pim, product information, catalog, catalogging, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
In February 2004, the FDA issued a Draft Guidance requiring the electronic submission of labeling content to be provided in an XML-based format called Structured Product Labeling (SPL). The purpose of this white paper is for the reader to gain an understanding and prepare for the FDA's new electronic labeling submission standard.
Tags : 
best practices, enterprise software, product lifecycle management, plm, product information, product information management, pim, catalog, catalogging, ptc
    
PTC
Published By: SAS     Published Date: Apr 25, 2017
When was the last time you had an outstanding customer experience? Perhaps you hesitated before answering. Now, think for a minute about your customers – would they hesitate before answering the same question about your business? If you think the answer might be yes, it’s time to consider the customer journey.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2016
This analyst piece shows that to be able to take control and do effective planning, marketers need insights that can only be supplied by marketing analytics
Tags : 
marketing analytics, data, ibm, best practices, effective planning
    
IBM
Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: Oracle     Published Date: May 13, 2017
This digibook contains a step-by-step guide to overcoming the new challenges of raised expectations, big data, and globalization, with case studies and examples of how CFOs of the future are redefining reporting to improve their existing financial business process.
Tags : 
big data, globalisation, modern finance, case studies, best practices, finance
    
Oracle
Published By: IBM     Published Date: Mar 03, 2016
A step-by-step approach to streamline and reengineer your B2B and B2C fulfillment processes.
Tags : 
ibm, b2b, b2c, aberdeen group, convergence, marketing research
    
IBM
Published By: SAP     Published Date: Oct 05, 2010
This paper will examine the state of consumer mobile in retail today, Driven in part by RSR's research among retailers as well as a look at the mobile use---cases that retailers have currently deployed.
Tags : 
sap, mobility, competitive edge, mobile workers, shopper, ecommerce, consumer mobile, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape
    
SAP
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: Coupa     Published Date: Aug 10, 2016
Manual work in accounts payable is a large source of costs that can be cut relatively quickly through automation. With AP automation it's possible to reduce the cost of processing a single invoice by as much as $10. Learn how you unlock the strategic value of accounts payable with the Coupa AP Automation Success Kit. Discover how to transform your AP invoicing processes to realize significant savings that directly impact the bottom line while improving governance and compliance.
Tags : 
business management, finance, accounts payable, best practices, governance and compliance
    
Coupa
Published By: WANdisco     Published Date: Oct 15, 2014
In this Gigaom Research webinar, the panel will discuss how the multi-cluster approach can be implemented in real systems, and whether and how it can be made to work. The panel will also talk about best practices for implementing the approach in organizations.
Tags : 
wandisco, wan, wide area network, hadoop, clusters, clustering, load balancing, data, big data, data storage, storage
    
WANdisco
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.