independent

Results 51 - 75 of 292Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Mar 28, 2017
Great food and great service, delivered consistently, are at the heart of any successful restaurant business. But success — and survival — also depend on being profitable. Every restaurant owner, whether independent or part of a large chain, understands that labor and inventory costs represent a significant variable expense to the business. Keeping control of those costs is as critical as the culinary magic that occurs in the kitchen. After all, how can a restaurant expect to make a profit when they are regularly overstaffing or running out of ingredients?
Tags : 
food, service, restaurant, oracle, profi
    
Oracle
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security, it management, data management, business technology
    
EMC Corporation
Published By: Allscripts     Published Date: Jun 05, 2013
This paper explores the unique perspectives of both types of organizations. The participants include two of the original 32 Pioneer ACOs; the nation’s largest commercial ACO; a major IDN that is pursuing its own ACO pathway; a large stand-alone hospital that has yet to take the formal step of creating an ACO but is experimenting with the model; and a large, independent, multispecialty physician group that is wary of stepping into the ACO waters.
Tags : 
aco, idn, accountable care organization, medicare, reimbursement
    
Allscripts
Published By: Mimecast     Published Date: May 27, 2015
White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.
Tags : 
mimecast, migration, microsoft office 365, storage, cloud backup, email, security, it management
    
Mimecast
Published By: Mitel     Published Date: Apr 25, 2018
This is a time of rapid and dramatic progress in the cloud communications landscape. New technological innovations help companies incorporate location-independent systems, allowing workers to collaborate and communicate wherever they may be. And all signs indicate this is only the beginning, with the industry poised for unprecedented growth. In fact, as enterprise software moves to the cloud, the traditional unified communications space is having its own dramatic shift. The consumer experiences from Snapchat to Instagram to Facebook among other consumer technologies—are changing the expectations for communications. New models for collaboration and engagement, supported by big data and the cloud, provide a whole new world of opportunities.
Tags : 
evolution, consumer, demands, cloud, communications
    
Mitel
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
forrester, wave, web, application, firewalls, akamai
    
Akamai Technologies
Published By: Genesys     Published Date: Nov 17, 2017
This eBook focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months!
Tags : 
ebook, contact centers, cloud, customer experience
    
Genesys
Published By: Jamf     Published Date: May 04, 2017
The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from Jamf—the Apple Management Experts—will show you how to best implement the independent organizations’ recommendations
Tags : 
    
Jamf
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
    
Determine (Selectica)
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
You want to deliver new innovations, release apps faster and take advantage of new opportunities, but legacy applications and infrastructure are holding you back. Transition to a modern architecture by decomposing monolithic applications into agile microservices—independently created, managed and scaled. Your business will be able to act faster and developers will love the easy access to APIs that give them the freedom to focus on customer experience.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Sojern     Published Date: Oct 26, 2017
The Sojern Traveler Platform offers hotels of all sizes access to over 350 million traveler profiles that allow you to precisely target prospects at all stages of the marketing funnel. You can also manage campaigns across multiple channels and devices, maintain brand awareness, increase purchase consideration, and turn site visitors into hotel room bookers.
Tags : 
hotel digital marketing, hotel advertising, boutique hotels, independent hotels, hotel website, travel marketing, search engine marketing hotels, revpar, direct bookings
    
Sojern
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: Pure Storage     Published Date: Jan 01, 2017
In July 2016, Pure Storage commissioned an independent study, conducted by 451 Research, that surveyed 253 enterprise IT decision-makers responsible for storage technology decisions in order to quantify the business impact that Tier 1 storage had on organizations.
Tags : 
    
Pure Storage
Published By: Oracle     Published Date: Mar 01, 2019
Join Oracle’s Director CX Strategy EMEA Director, Harald Behnke and Daryn Mason, Independent Customer Experience Leader, as they list their top three hyped technologies, and discuss innovations such as conversational Interface, AI and IoT.In particular, customer experience is all about personalised intelligence at scale, and IoT connects product to Front Office with convenient new options. Find out what’s happening in customer experience across the globe, and get inspired by the smart revolution.
Tags : 
    
Oracle
Published By: Sage People     Published Date: Nov 02, 2017
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: BMC Control M     Published Date: Jul 16, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: TriNet     Published Date: Nov 08, 2017
Classifying independent contractors vs. employees and exempt vs. non-exempt employees can be tricky. This white paper outlines what small business owners should know and examines general standards under state and federal law for correct classification.
Tags : 
    
TriNet
Published By: athenahealth     Published Date: Oct 07, 2015
Download this whitepaper to learn more about these five capabilities to keep your practice independent: -Strong Financial Performance -Connectivity and Clinical Integration -Ability to Win at Risk -Competitive Edge -Adaptability to Change
Tags : 
independent practice, financial performance, clinical integration, connectivity, value-based reimbursement, patient care, financial stability
    
athenahealth
Published By: Rimini Street, Inc.     Published Date: Oct 07, 2015
Cancelling the ERP vendor's maintenance agreement isn't right for everyone. The options for replacing the vendor's support need to be understood to ensure there is an independent support option that satisfies the enterprise's needs within a tolerable level of risk. However, cancelling can play an important role in enabling an enterprise to run current mature application releases more cost-effectively, shift funds to business growth initiatives, and position itself flexibly for the best-fit future application platform. Download this Gartner report to learn more about what to consider before cancelling your ERP Vendor's Maintenance Agreement and Switching to Third-Party Support.
Tags : 
    
Rimini Street, Inc.
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business technology
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee