enterprise strategy

Results 176 - 200 of 346Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Apr 23, 2019
In today’s competitive landscape, businesses need to make decisions quickly in order to respond to rapidly changing customer preferences and nimble competitors; whether it’s a new business strategy, a new business process, or a new market offering, businesses are competing on speed and agility. The overwhelming majority of today’s business and IT leaders understand digital transformation is necessary to maintain leverage amid constantly changing customer preferences. They also have a clear picture of their desired end state—exemplified by leaders like Amazon, Google, and Microsoft. However, only a small minority of have a clear understanding of the path they need to lead the market. In this paper you’ll learn: How to build digital transformation into the root of your company with a practical, natural, and tested blueprint. Best practices from over 1,600 enterprises to transform your strategy, organization, and technology from the ground up. Actionable next steps to start your journ
Tags : 
    
MuleSoft
Published By: HP     Published Date: Aug 22, 2008
Enterprise Strategy Group analysts Mark Bowker and Mark Peters will share the business drivers and benefits for virtualizing both servers and storage. You'll gain an understanding of IT infrastructure virtualization in order to evaluate the operational benefits it could provide. You'll also learn what steps to take to assess your IT environment to quantify the benefits of virtualization.
Tags : 
hp 4400, hp 4000, eva 4400, eva4400, virtual, virtualization, infrastructure
    
HP
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker, productivity, roi, motorola, good technology, application optimization
    
Motorola
Published By: EMC Corporation     Published Date: Mar 20, 2014
Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence, security
    
EMC Corporation
Published By: CollabNet     Published Date: Jan 11, 2013
Like Scrum itself, the process of moving an organization to an Agile framework is best achieved using an iterative approach that employs frequent inspect-and-adapt cycles.
Tags : 
collabnet, enterprise success, transformation strategy, collabnet agile coaches, business technology
    
CollabNet
Published By: HP and Intel® Xeon® processor     Published Date: Feb 11, 2012
Leveraging deduplication in backup environments yields significant advantages. HP StoreOnce deduplication simplifies the deployment of deduplication technology across the IT infrastructure.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
HP and Intel® Xeon® processor
Published By: Yammer     Published Date: May 23, 2012
The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, "The Forrester Wave: Activities Streams, Q2 2012", Forrester Research Inc. evaluated five social software vendors with core strengths in the stream based on the overall strength of vendors' current offerings, a clear product strategy, and vendor market presence. In a detailed look at the space, Forrester named Yammer as a leader.
Tags : 
yammer, enterprise social, integration, cloud, adoption
    
Yammer
Published By: NetApp     Published Date: Dec 12, 2013
"How can you make sure that your private cloud is agile, responsive, and efficient? NetApp offers private cloud technology that aligns with the following recommendations from Enterprise Strategy Group: * Optimize storage to fully realize the benefits of server virtualization and private cloud * Treat storage efficiency as a strategic opportunity to hone and improve the overall cloud environment * Use techniques such as deduplication and compression to expand the available capacity of a private cloud"
Tags : 
private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, data management, data center
    
NetApp
Published By: Windstream     Published Date: Feb 09, 2015
The Path to Value in the Cloud, by Oxford Economics and Windstream, brings together the latest insights, tactics and strategies C-suite respondents are using to make the cloud work for them.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: Windstream     Published Date: Aug 12, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. As an IT leader, a lot is being asked of you: drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company's future by increasing the flexibility and agility of your IT infrastructure to support the rapidly evolving needs of your business? Read this paper to discover how modern enterprises like Williams-Sonoma and Knowledge Universe have adopted new ERP strategies to support their growth. In this paper you will learn: The challenges facing IT and how to evolve your IT architecture to support the modern business. A new strategy for the enterprise involving ERP that increases the flexibility and agility required to add new business models, integrate acquisitions and support innovation. Answers to frequently asked questions when modernizing IT.
Tags : 
innovation through new products, information technology, customer-enabling, supply chain capabilities, enterprise applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Published By: MuleSoft     Published Date: Oct 13, 2015
This paper reviews the primary drivers for mobile initiatives, the challenges faced by CIOs trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity.
Tags : 
mobile applications, api-led connectivity, consumer experience, enterprise mobile strategy, enterprise applications
    
MuleSoft
Published By: MuleSoft     Published Date: Oct 13, 2015
New technologies are rapidly emerging in the retail industry. How is your business going to keep up? This whitepaper will reveal how to use MuleSoft's approach to enterprise integration, API-led connectivity to scale a retail business globally, prepare for innovations such as the Internet of Things, and create a mobile retail strategy.
Tags : 
retail enterprise, shopping environments, future-proofing, enterprise applications
    
MuleSoft
Published By: MuleSoft     Published Date: Oct 13, 2015
In this paper we’ll discuss how enterprises can connect legacy systems to the cloud to create a hybrid ecosystem. We’ll learn how solutions like enterprise service buses (ESB), and integration platforms as a service (iPaaS) can address present integration challenges and help IT executives future-proof their companies. The best practices covered in this paper will help businesses with both evaluation and implementation of a successful hybrid integration strategy.
Tags : 
hybrid environments, integration platforms as a service, enterprise service buses, integrating hybrid environments, enterprise applications
    
MuleSoft
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: IBM     Published Date: Oct 13, 2017
This BARC document is the third edition of our BARC Score business intelligence vendor evaluation and ranking. This BARC Score evaluates enterprise BI and analytics platforms that are able to fulfill a broad set of BI requirements within the enterprise. Based on countless data points from The BI Survey and many analyst interactions, vendors are rated on a variety of criteria, from product capabilities and architecture to sales and marketing strategy, financial performance and customer feedback.
Tags : 
barc. business intelligence, analytics, customer feedback
    
IBM
Published By: Microsoft     Published Date: Jul 20, 2018
In the two years since we first began working on Enterprise Cloud Strategy, much has changed. Cloud technology has evolved from being an “if” to a “when,” and across almost all enterprises, the cloud has now become an integral part of IT strategy. Further, there is now a growing realization that cloud computing not only represents a set of technical opportunities for efficiencies and cost savings, but also provides the potential to significantly transform the scope of enterprise computing. In fact, many enterprises are finding that cloud computing offers entirely new business models, revenue streams, and vehicles for customer intimacy. Few technological changes have the potential to so dramatically change to the way we do business. The last time we experienced such a tectonic shift was the with arrival of the Internet itself. Yet, as we noted in the first edition of this book, when briefing CIOs and senior IT executives at Microsoft, we are often told that migrating IT workloads to the
Tags : 
    
Microsoft
Published By: Pure Storage     Published Date: Apr 15, 2019
This year, businesses will increasingly turn to AI to power their business transformation. Machine learning and deep learning workloads are quickly becoming a mission-critical workload in the enterprise data center. As an IT leader, are you ready for the impending wave of AI applications that will demand new approaches to computing, storage and networking? Do you have the right strategy for scaling AI workload in your data center? We’ll introduce you to the IT visionaries who have made it happen. In this webinar we’ll explore how one IT leader accelerated his company’s success with an AI infrastructure strategy, sharing their best practices and insights. By watching this webinar, you'll learn: - Why it’s now critical for enterprise IT to have an AI infrastructure strategy that supports the business - Explore one IT leader’s experience developing and implementing a best-of-breed platform for scaling AI workload in the data center - Gain insights that can drive your AI infrastructur
Tags : 
    
Pure Storage
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated
Tags : 
intel, deduplicated, storage, network, business technology
    
HP and Intel® Xeon® processor
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave
Published By: IBM     Published Date: Feb 25, 2008
Enterprise Strategy Group (ESG) Labs performed a hands-on analysis of IBM's System Storage SAN Volume Controller storage virtualization solution in order to validate its value proposition to customers. ESG Labs found that SAN Volume Controller is a rock-solid, feature-rich platform that delivers on the promise of network based storage virtualization: reducing the complexity and cost of managing SAN attached storage.
Tags : 
hardware, ibm, san volume controller, roi, storage, storage management, storage virtualization, virtualization, ibm
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption
    
IBM
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee