sus

Results 226 - 250 of 868Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Oct 22, 2018
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
cmdb, deployment, management, servicenow
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
    
ServiceNow
Published By: Arm Treasure Data     Published Date: Oct 17, 2018
What does it take to succeed in today’s hypercompetitive and hyperconnected digital economy? Keep reading to find out.
Tags : 
arm treasure data, treasure data, customer data, data insights, customer intelligence, customer engagement, customer transactions, business technology
    
Arm Treasure Data
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon
Published By: Cool Effect     Published Date: Mar 05, 2019
Universities around the world are realizing the importance of sustainable practices and are working towards shrinking their carbon footprint by focusing on renewable energy resources, clean technology, and carbon offsets. This guide will provide complimentary information on carbon credits along with case studies where universities have incorporated them into their sustainability strategy. Also included: tips for identifying high-quality credits and avoiding low-quality credits that do not reduce carbon emissions. Read this guide to learn more about what carbon credits are and how to navigate the process of measuring, assessing, and obtaining carbon credits.
Tags : 
carbon offsets, carbon credits, carbon footprint, carbon neutral, carbon emissions, carbon management, tonnes, climate neutral, reduce emissions, greenhouse gas, climate impact, sustainability, corporate responsibility, environmental responsibility, clean technology, renewable energy, voluntary credits, university, higher education, college
    
Cool Effect
Published By: Barracuda     Published Date: May 30, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
    
Barracuda
Published By: Barracuda     Published Date: Jun 18, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
    
Barracuda
Published By: Workday France     Published Date: May 01, 2019
L’alignement de votre plan d’effectif sur les objectifs prioritaires de votre entreprise peut être difficile et laborieux surtout lorsque les fondamentaux ne sont pas bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
workday, workforce technology, digital strategy
    
Workday France
Published By: Taleo     Published Date: Feb 09, 2011
Making the right talent management decisions requires a specific understanding of what talent management actually is and does. The goal of a talent management program is to create a highly responsive, high-performing, sustainable organization that meets business targets.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
    
Taleo
Published By: Netsuite     Published Date: Jul 24, 2017
Over the years, small to midsized businesses have pieced together a patchwork of applications to run their operations. From accounting to order fulfilment, to sales and marketing, a venerable hairball of applications exists across millions of small to midsized business. This infrastructure will not enable rapidly growing businesses to sustain and accelerate growth.
Tags : 
    
Netsuite
Published By: athenahealth     Published Date: May 24, 2012
Health care providers cope with an avalanche of complex rules, regulations, and administrative processes just to run their practices. At the same time, costs are increasing and reimbursement rates are declining. The only way for a practice to achieve financial health in this demanding environment is to learn how to operate at peak performance level.
Tags : 
healthcare, cost, ibm, asset management, service management, technology
    
athenahealth
Published By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : 
modernization, electrical distribution system, schneider electric
    
Schneider Electric
Published By: HERE Technologies     Published Date: May 31, 2019
Rich, real-time location intelligence is shaping the future of the third-party logistics (3PL) industry, powering some of the most innovative new technologies behind the smartest, most efficient and environmentally sustainable 3PLs in the industry. Rapid growth in the industry over the next five years will see competition driving further technology and location intelligence innovation. This eBook predicts five ways in which this will result in smarter work patterns and new business-critical technologies. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
industry, solutions, tracking data, technologies, predictions, customer, automation, logistics
    
HERE Technologies
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Logi Analytics     Published Date: Jan 12, 2016
This white paper takes a no-nonsense approach to discovering which side of the "buy versus build" dichotomy you belong on, based on your business' requirements.
Tags : 
embedding analytics, analytics
    
Logi Analytics
Published By: Workday France     Published Date: May 17, 2019
L'alignement de votre plan d'effectif sur les objectifs majeurs de l'entreprise n'est pas forcément une entreprise laborieuse, surtout lorsque les fondamentaux sont bien compris. Ce livre blanc décrit les 10 étapes fondamentales pour créer un plan d'effectif stratégique efficace et explique comment la technologie peut aider à le mettre en œuvre.
Tags : 
    
Workday France
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access, privileged access management, security, privileged credentials, secure it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans les organisations agiles d’aujourd’hui, les équipes de production se trouvent face à un défi de taille : déployer en production les nouvelles versions immédiatement après les phases de développement et de test. Pour assurer la réussite d’un tel déploiement, il est nécessaire de mettre en œuvre un processus automatique et transparent. ce processus, nous l’avons baptisé Zero Touch Deployment™. cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique. cet article commence par retracer le contexte commercial et technologique qui pousse les organisations agiles à se tourner vers des solutions d’automatisation du déploiement.
Tags : 
zero touch deployment, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour pouvoir réellement mettre en œuvre une approche de livraison continue, les organisations doivent entièrement repenser la façon de mener leur processus d’assurance qualité (QA). Cela passe notamment par redéfinir le rôle que les professionnels d’assurance qualité jouent au sein de l’organisation, automatiser le plus possible à chaque niveau et revoir entièrement les structures de test, pour prendre en charge des versions logicielles plus légères et plus rapides.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Ce document présente les résultats d’une enquête commandée par CA Technologies en vue de comprendre la situation des entreprises face aux exigences imposées par le RGPD. Ce dernier ayant de vastes implications concernant le type de données pouvant être utilisées dans les environnements autres que de production, CA Technologies souhaitait avant tout comprendre comment les entreprises envisageaient de se mettre en conformité avec le RGPD et quels sont les processus et technologies nécessaires pour y parvenir.
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee