lab

Results 1 - 25 of 4775Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
    
Red Hat
Published By: SAP     Published Date: Jul 23, 2018
New market forces are creating unprecedented pressure for companies to move faster, with greater agility, and change in response to new threats and opportunities. Companies that are embracing a new approach built on Intelligent Cloud ERP are gaining valuable advantages — such as boosting profits, growing faster, entering new markets, and disrupting their industries. Learn how Intelligent Cloud ERP empowers you to leverage the opportunities presented by changes to how we work, collaborate and achieve success in this practical, actionable overview.
Tags : 
    
SAP
Published By: Zendesk     Published Date: Jun 29, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self-service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-service leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service, every single day.
Tags : 
    
Zendesk
Published By: Quantum Corporation     Published Date: Sep 11, 2018
Virtualization is rapidly changing the way business IT operates, from small local businesses to multinational corporations. If you are reading this, chances are good that your company is already taking advantage of virtualization’s benefits. Virtualization means that a single underlying piece of hardware, such as a server, runs multiple guest operating systems to create virtual machines, or VMs, with each of them being oblivious to the others. An administrative application, such as VMware, manages the sharing process, allocating hardware resources, memory, and CPU time to each VM as needed. And all applications look at this software construct exactly as if it were a real, physical server — even the VM thinks it’s a real server! Virtualization makes good financial sense. It enables a single server to offer multiple capabilities that otherwise would require separate servers. It includes native high availability features, so you don’t have to use any more complex clustering tools. This ab
Tags : 
    
Quantum Corporation
Published By: Google     Published Date: Aug 23, 2018
To remain competitive, executives must embrace change and equip employees to do the same. Conrad Electric, a 95-year-old online retail company, took just 4 months to migrate to G Suite, providing 4,000 of their employees with more transparent and agile collaboration capabilities. Read this Google Cloud report and get insights to creating a culture where people — combined with productivity tools — can reach their full potential.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
There are five ways to provision test data. You can copy or take a snapshot of your production database or databases. You can provision data manually or via a spreadsheet. You can derive virtual copies of your production database(s). You can generate subsets of your production database(s). And you can generate synthetic data that is representative of your production data but is not actually real. Of course, the first four examples assume that the data you need for testing purposes is available to you from your production databases. If this is not the case, then only manual or synthetic data provision is a viable option. Download this whitepaper to find out more about how CA Technologies can help your business and its Test Data problems.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Dalle start-up alle aziende consolidate, i container aiutano a soddisfare le esigenze di un business digitale moderno, supportando app estremamente scalabili, portabili e rapide da implementare. Principali motivi per adottare i container: -Coerenza -Flessibilità -Modularità -Leggerezza
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Desde las empresas emergentes hasta las ya establecidas, los contenedores ayudan a satisfacer las demandas de un negocio digital moderno, puesto que son compatibles con aplicaciones portátiles, de rápida implementación y escalables de manera masiva. Principales motivos por los que incorporar los contenedores: -Coherencia -Flexibilidad -Modularidad -Ligereza
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Reconstructing resource management tools to simplify tasks, drive collaboration and facilitate action. People who use technologies at home expect the same ease of use and intuitiveness for the tools they use in the workplace. But enterprise tools aren’t keeping up with the pace of change. Many product and portfolio management (PPM) solutions force resource managers to create entire workflows or navigate through multiple screens just to see the fundamental component of resource management—what their people are working on. Resource managers also cite shortcomings such as no simple way to perform everyday tasks, communicate in context with others, drill down into key information, narrow the field of resources and forecast financials and model outcomes.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mit dem neuen CA Project & Portfolio Management (CA PPM) 15.3 können Sie Projekte für beliebige Geschäftsbereiche ganz einfach per Drag-and-drop maßschneidern. Ob komplexe Workflows für die Personalabteilung oder einfaches Aufgabenmanagement für den Vertrieb – Projekte sind nun statt erst nach Tagen innerhalb weniger Minuten eingerichtet. Mit der In-App-Kooperation eliminieren Sie überflüssige Meetings, Budgets verwalten Sie mit einem vertrauten Raster ähnlich wie in Microsoft Excel®, und dank der neuen Verknüpfung mit Business Intelligence (BI) Tools von Drittanbietern lassen sich versteckte Antworten aufspüren. Sie verfügen damit über die modernste Projektportfoliomanagement-App, die derzeit am Markt verfügbar ist.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicità del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attività per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anziché in giorni. È possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel® per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la più moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
De un solo vistazo Gracias al nuevo software CA Project & Portfolio Management (CA PPM) 15.3, podrá adaptar proyectos a cualquier unidad de negocio con la facilidad que ofrece la acción de arrastrar y soltar. A partir de ahora, los trabajadores no pasarán días preparando proyectos, les bastará con solo unos minutos, ya se trate de un flujo de trabajo complejo para el departamento de recursos humanos o de una gestión de tareas sencilla para el departamento de ventas. Agregue la opción de colaborar en la propia aplicación para eliminar reuniones redundantes, una cuadrícula conocida, ya que se parece a la de Microsoft Excel®, para gestionar presupuestos y una conexión nueva para herramientas de inteligencia empresarial (BI) de terceros para encontrar respuestas, y contará con la aplicación de gestión de carteras de proyectos más moderna del mercado en la actualidad.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé La version 15.3 de CA Project & Portfolio Management (CA PPM) vous permet de personnaliser les projets pour chaque business unit par de simples opérations de glisser-déposer. Qu’il s’agisse de workflows complexes pour les ressources humaines ou de simples tâches de gestion des ventes, les projets peuvent désormais être lancés en quelques minutes, au lieu de plusieurs jours. Ajoutez à cela des possibilités de collaboration au départ de l’application proprement dite pour éliminer les réunions superflues, un format de tableau familier de type Microsoft Excel® pour gérer les budgets, de nouvelles connexions à des outils d’aide à la décision tiers pour trouver des réponses, et vous obtenez l’application de gestion de portefeuilles de projets la plus moderne du marché.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
    
Carbon Black
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
TIBCO Spotfire® Data Science is an enterprise big data analytics platform that can help your organization become a digital leader. The collaborative user-interface allows data scientists, data engineers, and business users to work together on data science projects. These cross-functional teams can build machine learning workflows in an intuitive web interface with a minimum of code, while still leveraging the power of big data platforms. Spotfire Data Science provides a complete array of tools (from visual workflows to Python notebooks) for the data scientist to work with data of any magnitude, and it connects natively to most sources of data, including Apache™ Hadoop®, Spark®, Hive®, and relational databases. While providing security and governance, the advanced analytic platform allows the analytics team to share and deploy predictive analytics and machine learning insights with the rest of the organization, white providing security and governance, driving action for the business.
Tags : 
    
TIBCO Software APAC
Published By: Elementum     Published Date: Sep 03, 2018
Learn more about what’s slowing your operations, the cost of inaction, and how you can start driving availability to meet the speed of customer expectations.
Tags : 
elementum, supply chain, sales, customer experience, product availability
    
Elementum
Published By: Intel     Published Date: Sep 14, 2018
Digital transformation has pioneered an ever-evolving landscape in the omnichannel retail experience. To efficiently meet consumer demands, retailers consider a fully immersive omnichannel customer experience as integral to their engagement strategy. With increasingly varied technologies such as NFC-based payments, digital signage with rich-media experiences, wireless technologies and IoT technologies—present great opportunities and complexities. New technologies are often being rolled out without a centrally managed approach leading to siloed solution landscape, making deployment difficult. Uncover the path to simplify and automate, where the Reliant Platform delivered performance, scalability, reliability, security, and inter-operability Reliant needs for retail applications.
Tags : 
    
Intel
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
When most people think of denial of service (DoS) attacks, they think of the large pipe-saturating distributed denial of service (DDoS) attacks aimed at the network layer. However, attacks on website or application availability are not just volumetric in nature. Many attacks are designed to cause resource exhaustion somewhere in the application stack, the application servers, middleware, or back-end database.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee