Skip to main content
 

bi software

Results 226 - 250 of 873Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Microsoft     Published Date: Oct 09, 2017
SaaS ist eine Chance für ISVs, ihr Geschäft grundlegend zu verändern: Sie können so zusätzlichen Mehrwert für Kunden bieten, Software an ein breiteres Spektrum von Kunden verkaufen und interne Abläufe optimieren. Der Markt für Software passt sich schnell der Nachfrage nach dieser Liefermethode an. Softwarekäufer berücksichtigen Gesamtbetriebskosten, einfache Handhabung und Flexibilität bei ihrer Kaufentscheidung. ISVs müssen sich auf diesen Wandel vorbereiten. Dieses Dokument erkläutert die Vorteile, die aus Änderungen am ISV-Business Modell (die Stellung im Wettbewerb) und am Betriebsmodell (die Ausführung auf dem Geschäftsmodell) herrühren, sowie die Vorschläge zur Vorbereitung auf eine SaaS-Umstellung. Als Grundlage dienen die Erfahrungen von 20 ISVs, die von einem traditionellen Softwarelizenzierungs- und Bereitstellungsmodell erfolgreich auf SaaS umgestellt haben.
Tags : 
betriebsmodell, geschafts-modell, preise, aufstellung, differenzierung, skalierung, struktur, prozesse, ressourcen
    
Microsoft
Published By: Here Technologies     Published Date: Apr 02, 2019
OEMs today face significant challenges that restrict effective fleet analysis. Data is often siloed and held in several incompatible formats, meaning responding to software faults can be a costly and lengthy process. To overcome this, Here have combined OTA technology with the HERE Open Location Platform. By closing this loop, Here provide a one-stop solution for data enrichment and analysis – and Here turn connected vehicle data into over-the-air updates. Watch this webinar and learn how HERE enables: • Early error detection and proactive remote maintenance of software and firmware • Reduction of data management value chain complexity with its one-stop solution • Effective fault response and real-time access to new products and services
Tags : 
over the air technologies, location data, auto, mapping
    
Here Technologies
Published By: Here Technologies     Published Date: May 14, 2019
To provide drivers with navigation experiences that are always fresh, differentiated and that set an OEM’s brand apart on either embedded or mobile platforms, automakers need an unprecedented level of flexibility and control over data, software and the delivery process. As a SaaS offering, HERE Navigation on Demand offers automakers a new way to solve their key challenges – such as static software, complex and costly solution development and the inability to update or upgrade the experience once vehicles are in the field. Automakers need alternatives as they overhaul their navigation and connected service programs and bring change to their development, deployment, and monetization processes. This whitepaper outlines how HERE Technologies can support them to deliver compelling navigation and connected experiences, while keeping them in full control of their branding and revenue streams. Find out how HERE Navigation on Demand leverages: The HERE Open Location Platform to deliver alwa
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Microsoft     Published Date: Oct 24, 2016
This Technology Spotlight examines the important role played by enterprise mobility management (EMM) technology in managing the security challenge posed by the combination of mobile devices and cloud-based software-as-a-service (SaaS) apps. It also explores the role of Microsoft's Enterprise Mobility Suite (EMS) in the strategically important EMM market.
Tags : 
mobility, enterprise mobility management, software as a service, cloud, mobile security
    
Microsoft
Published By: Pure Storage     Published Date: Jul 18, 2017
In einer Studie von Forrester Research™ bezüglich der gesamtwirtschaftliche Auswirkungen (engl. Total Economic Impact) wurde geschätzt, dass ein weltweit tätiges mittelständisches Unternehmen eine durchschnittliche Erhöhung der Rentabilität um mehr als 960.000 USD in einem Zeitraum von drei Jahren mit einer Rendite von 102 % erzielen würde. Diese Zahlen werden durch Geschäftsvorteile, Vereinfachung sowie Einsparungen bei Rechenzentrum-Rack-Einheiten, beim Strom- und Kühlbedarf, bei Softwarelizenzierung und bei der Wartung möglich gemacht.
Tags : 
das cloud-computing, cloud-modelle, storage-plattformen, flash-storage, pure storage
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 26, 2017
In einer Studie von Forrester Research™ bezüglich der gesamtwirtschaftliche Auswirkungen (engl. Total Economic Impact) wurde geschätzt, dass ein weltweit tätiges mittelständisches Unternehmen eine durchschnittliche Erhöhung der Rentabilität um mehr als 960.000 USD in einem Zeitraum von drei Jahren mit einer Rendite von 102 % erzielen würde. Diese Zahlen werden durch Geschäftsvorteile, Vereinfachung sowie Einsparungen bei Rechenzentrum-Rack-Einheiten, beim Strom- und Kühlbedarf, bei Softwarelizenzierung und bei der Wartung möglich gemacht.
Tags : 
das cloud-computing, cloud-modelle, storage-plattformen, flash-storage, pure storage
    
Pure Storage
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Engineered Systems are architected to work as a unified whole, so organizations can hit the ground running after deployment. Organizations choose how they want to consume the infrastructure: on-premises, in a public cloud, or in a public cloud located inside the customer’s data center and behind their firewall using Oracle’s “Cloud at Customer” offering. Oracle Exadata and Zero Data Loss Recovery Appliance (Recovery Appliance) offer an attractive alternative to do-it-yourself deployments. Together, they provide an architecture designed for scalability, simplified management, improved cost of ownership, reduced downtime, zero-data loss, and an increased ability to keep software updated with security and patching. Download this whitepaper to discover ten capabilities to consider for protecting your Oracle Database Environments.
Tags : 
    
Oracle
Published By: Avaya     Published Date: Jan 15, 2014
Avaya Aura Communication Manager is a vital component of an industry best-in-class redundant server solution that can support the available uptime today’s businesses demand. Do you demand more in your server solution?
Tags : 
avaya, communication manager, server solution, business demand, high availability, avaya aura, virtualized environments, high level performance, linux software, remote core servers, linux-based software, duplicate servers, survivable core, communication
    
Avaya
Published By: BMC Control M     Published Date: Jul 16, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Gartner has positioned BMC CONTROL-M in the Leaders Quadrant of their "2009 Magic Quadrant for Job Scheduling." The report assesses the ability to execute and completeness of vision of key vendors in the marketplace. Read a full copy today, courtesy of BMC Software.
Tags : 
quadrant, magic quadrant, job scheduling, bmc control-m, workload, automation broker, gartner, data, job, itwab, it workload automation broker
    
BMC Control M
Published By: Nutanix, Inc.     Published Date: May 02, 2013
Enterprise data-centers are straining to keep pace with dynamic business demands, as well as to incorporate advanced technologies and architectures that aim to improve infrastructure performance, scale and economics. meeting these requirements, however, often requires a complete rethinking of how data centers are designed and managed. Fortunately, many enterprise IT architects are leading cloud providers have already demonstrated the viability and the benefits of a more modern, software-defined data center. This Nutanix white paper examines eight fundamental steps leading to a more efficient, manageable and scalable data center.
Tags : 
nutanix, data-centers, dynamic business demands, advanced technologies
    
Nutanix, Inc.
Published By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
    
Riverbed
Published By: Red Hat     Published Date: Sep 25, 2014
Today’s mega IT trends – cloud computing, big data, mobile and social media –have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : 
datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment
    
Red Hat
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization
    
Red Hat
Published By: Delphix     Published Date: Mar 24, 2015
Many data centers are aging and organizations still use legacy applications, which drives up operational costs and limits the ability to upgrade software. Download this white paper to find out how Delphix Data as a Service can remove the biggest constraints and bottlenecks of your modernization projects.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: KANA®, A Verint® Company     Published Date: Aug 13, 2014
Kana Enterprise is a product built via acquisition, and it delivers a solution that combines the strength of its two parents — the multichannel and knowledge capabilities of the historical Kana Software products and the business process management engine from Sword Ciboodle.
Tags : 
kana, customer service solutions vendors, case management, customer service, reporting capabilities, process management, sword ciboodle
    
KANA®, A Verint® Company
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps
    
ServiceNow
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.