Skip to main content
 

proof concept

Results 1 - 22 of 22Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Sep 23, 2019
An excellent CMS solution provides your business with the flexibility to grow into a broad experience delivery platform. It should enable your business to scale and add new capabilities as it grows, and easily integrate with other marketing technologies. Why should the target audience care? Customer expectations have increased. They now expect their in-store experiences to be continuous and consistent extensions of the online journey. And the online journey provides fast, dynamic, and interactive experiences. If your business is not well informed on what is needed from a content management solution, it may come up short on customer experience. A successful and growing business will choose a solution that helps them future-proof for emerging channels and effectively manage mature ones. Supporting Concepts: Navigate your business through the noise. Apply these questions and insights to your selection process and avoid the pitfalls of costly and rigid content management systems.
Tags : 
    
Adobe
Published By: Automation Anywhere     Published Date: Jul 16, 2019
Learn why companies aren’t currently embracing RPA at scale and understand how to tackle different scaling challenges, from reaching the ceiling of a small Proof of Concept to keeping your people and RPA strategies aligned. Find out how scale was successfully achieved for some of Automation Anywhere’s customers, including Bancolombia.
Tags : 
    
Automation Anywhere
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Avanade DACH     Published Date: May 08, 2018
In this six-step guide, we aim to help you solve your data challenges to prepare for advanced analytics, cognitive computing, machine learning and the resulting benefits of AI. We’ll show you how to get your data house in order, scale beyond the proof of concept stage, and develop an agile approach to data management. By continually repeating the steps in this guide, you’ll sharpen your data and shape it into a truly transformational business asset. You’ll be able to overcome some of the most common business problems, and work toward making positive changes: • Improve customer satisfaction • Reduce equipment outages • Increase marketing campaign ROI • Minimize fraud loss • Improve employee retention • Increase accuracy for financial forecasts
Tags : 
    
Avanade  DACH
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform
    
Venafi
Published By: OutSystems     Published Date: Oct 12, 2015
This complete kit provides a proven process and customizable documents that will help you evaluate rapid application delivery platforms and select the ideal partner for building mobile and web apps for your organization.
Tags : 
outsystems, application delivery, platform, mobile app, web app, rad
    
OutSystems
Published By: NTT Ltd.     Published Date: Jan 16, 2019
NTT Data services has over 600+ BI experts and over 250+ implementations in India, receiving high accolades from Gartner and AMR research. NTT Data Services offers Industry focused offerings and pre-configured models. Some of our offerings include: - Guided Analytics Strategy - Proven Framework & Methodology for ‘C’ level executives - Solution lab for Co-Innovation and Proof of Concepts - Advisory Services - BI Transformations, Big Data Strategy, Information Governance, Health Checks - Proprietary Tools & Accelerators – System Optimization, Architect to Archive, User Adoption - Flexible Delivery - Rapid Development Factory, Shared Services Find more details in this deck.
Tags : 
    
NTT Ltd.
Published By: Zscaler     Published Date: May 15, 2019
Is it possible to implement an Office 365-ready network, at scale, without a proof-of-concept (PoC)? Your CIO has tapped you to lead the effort to move to Office 365. Realizing it’s a great opportunity and distinction in your career, you reply with, “Sure, I’ll make sure it is a total success!” and then note that a PoC will not be needed.
Tags : 
    
Zscaler
Published By: Delphix     Published Date: Mar 24, 2015
Data virtualization is becoming more important as industry-leading companies learn that it delivers accelerated IT projects at reduced cost. With such a dynamic space, one must make sure that vendors will deliver on their promises. This white paper outlines the top 10 qualification questions to ask before and during the proof of concept.
Tags : 
    
Delphix
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Our recent primary research project solicited feedback from respondents to determine familiarity with, and plans for use of Hadoop ecosystem components. Download this white paper to learn more.
Tags : 
    
Waterline Data & Research Partners
Published By: Intel     Published Date: Sep 20, 2019
More data means more opportunities to discover powerful, actionable insights around customers, internal processes, and the broad market. Unfortunately, legacy IT architectures and approaches can block progressive analytics efforts. That leaves a lot of room for improvement, and the learning and investment curve for starting in analytics can be steep. However, tending to three core steps will prove immensely helpful on this journey: • Establishing an organizational foundation • Mapping the data pipeline • Transitioning analytics proofs of concept into production
Tags : 
    
Intel
Published By: BMC Software     Published Date: Jul 22, 2015
This CIO eBook explores how to deploy Hadoop applications faster and easier with a workload automation solution that simplifies and automates Hadoop batch processing and connected enterprise workflows. Read the eBook to learn: • The role—and challenges—of Hadoop in Big Data application development • Six considerations for a Hadoop proof-of-concept initiative • How to connect Hadoop to other enterprise data sources and applications
Tags : 
big data, hadoop applications, hadoop development
    
BMC Software
Published By: Bluecore     Published Date: Apr 03, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most email marketers use technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your marketing program with the next generation of email marketing technology. This guide explores exactly what your team needs to know to prepare for a successful change and how to best evaluate this next generation of email marketing technology, including: Understanding the next generation of email marketing technology Determining when it’s time for a change Prioritizing value with a proof of concept Approaching the ESP selection process Securing buy-in for the change Building a successful retail marketing program around your new ESP Creating a foundation for long term success
Tags : 
retail marketing, esp, email marketing, marketing technology
    
Bluecore
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Big data projects often entail moving data between multiple cloud and legacy on-premise environments. A typical scenario involves moving data from a cloud-based source to a cloud-based normalization application, to an on-premise system for consolidation with other data, and then through various cloud and on-premise applications that analyze the data. Processing and analysis turn the disparate data into business insights delivered though dashboards, reports, and data warehouses - often using cloud-based apps. The workflows that take data from ingestion to delivery are highly complex and have numerous dependencies along the way. Speed, reliability, and scalability are crucial. So, although data scientists and engineers may do things manually during proof of concept, manual processes don't scale.
Tags : 
    
BMC ASEAN
Published By: Infosys     Published Date: May 22, 2018
The company's CEO had a vision of a 'Team of Teams', based on social business collaboration. His target was to improve productivity by 30%, driven by an ability to quickly identify people with the right skills, build small teams and collaboratively solve problems, and 'fail fast' instead of wasting time on unproductive activities. Research showed this was possible: Companies reported better collaboration and a greater focus on results when using social business models. Even McKinsey Global Institute stated that social collaboration methods could improve productivity by 20-25 percent. But the company had spent 3 years trying to realize the CEO's vision. As a last throw of the dice, Infosys was asked to provide a proof of concept to show they could deliver these benefits where others had failed.
Tags : 
ceo, social, business
    
Infosys
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
From planning, to proving, to production, there are a lot of intricate details to think about when you are considering a Linux implementation. In this webcast, Marianne Eggett summarizes industry best practices for project management of your IBM System z Linux (POC).
Tags : 
system z linux, mainline information systems, project management, best practices, ibm, poc, testing, installation, set up
    
Mainline Information Systems
Published By: IBM     Published Date: May 04, 2009
Live migration is essential for a dynamic data center environment. But until now, it's been impossible between different generations of processors. Intel IT and End User Platform Integration have done so successfully with Intel® Virtualization Technology FlexMigration. This white paper explains how.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x, power, energy costs, hardware, cooling, flexmigration, processors, proof-of-concept, poc, virtual machines, vms, virtual machines, vmware esx 3.5u2
    
IBM
Published By: IBM Corporation     Published Date: Jun 28, 2011
Merkur conducted an extensive selection process for service management solutions, evaluating technologies to provide proof-of-concept demonstrations. Following its rigorous review, Merkur selected IBM Tivoli Asset Management for IT and IBM Tivoli Service Desk to automate and integrate IT asset management and incident, problem, change, inventory, SLA and knowledge management processes.
Tags : 
tivoli, merkur, sla, inventory, services management, ibm, service management, tivoli, automation, it asset management, service request management, infrastructure
    
IBM Corporation
Published By: IBM     Published Date: Oct 19, 2016
Pfizer completed a proof-of-concept of a 5TB SAP Business Warehouse application on an Oracle system to evaluate a move to SAP HANA. This 5TB scale-up system was created on the IBM Power Systems platform under the direction of SAP and IBM. This webinar will explain SAP's road map for SAP HANA on Power architecture and Pfizer's rationale and lessons learned during this exciting project. Pfizer has now moved from development into production and will share the results from this recent experiment.
Tags : 
ibm, systems, hardware, sap, sap hana, 5tb sap business warehouse application, oracle, pfizer
    
IBM
Published By: ASME - Formlabs     Published Date: Aug 28, 2019
Rapid prototyping helps companies turn ideas into realistic proofs of concept, advances these concepts to high-fidelity prototypes that look and work like final products, and guides products through a series of validation stages toward mass production. With rapid prototyping, designers and engineers can create prototypes directly from CAD data faster than ever before, and execute quick and frequent revisions of their designs based on real-world testing and feedback. Download this white paper to learn: How rapid prototyping fits into the product design process The applications of rapid prototyping from concept models to manufacturing An overview and comparison of 3D printing technologies for rapid prototyping: FDM vs. SLA vs. SLS
Tags : 
    
ASME - Formlabs
Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark
    
ProofSpace
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Search      

Add Research

Get your company's research in the hands of targeted business professionals.