Skip to main content
 

state

Results 126 - 150 of 1088Sort Results By: Published Date | Title | Company Name
Published By: Hyland Software     Published Date: Jun 16, 2016
To support a more robust exchange of health information across multiple systems and care settings, HIT must embrace future-state technology: A single data management solution built on a single platform that stores all content in its native format in a single archive.
Tags : 
healthcare, technology, information technology, solutions, best practices, business management, process management, content management
    
Hyland Software
Published By: EMC Converged Platforms     Published Date: Oct 22, 2015
Old Dutch Foods, known for its broad selection of snack foods in the midwest United States and Canada, was struggling to get the right products to the right places at the right time. Its data center included outdated physical servers, and batch processing meant that inventory would not be updated until the end of the day as opposed to real time. In addition, recovering from power outages and disk failures could frequently take up to two weeks. To modernize its data center, Old Dutch Foods invested in EMC Converged Infrastructure. The fast and easy deployment of two VCE VBlock® systems running JD Edwards, MS Exchange, mobile device apps, and operation of a backup site with replicated applications and data. This enhanced the IT department's responsiveness to the business, allowed them to shift to real-time inventory, and reduced CapEx and OpEx costs. Operations were simplified by reducing person-hours needed for infrastructure maintenance by 75 percent.
Tags : 
    
EMC Converged Platforms
Published By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : 
microstategy, apple, dashboards, ipad
    
MicroStrategy
Published By: Oracle     Published Date: Aug 08, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : 
oracle, global customer experience, cx benchmarking
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : 
customer experiences, customer service, oracle, rightnow cloud, cloud, crm
    
Oracle
Published By: HP Inc.     Published Date: Feb 03, 2016
Every day an average of 30,000 new websites are identified as distributing malicious code to site visitors. This helped contribute to the 43% of U.S. companies that experienced data breaches in 2014 alone. But not all dangers to computers and laptops come from malicious code picked up over the Internet. A study by IDC and the National University of Singapore revealed that in 2014, businesses worldwide would spend nearly $500 billion to deal with the problems caused by malware on pirated software.
Tags : 
    
HP Inc.
Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux
Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas
    
NAVEX Global
Published By: EMC Converged Platforms     Published Date: Feb 17, 2016
This VxRail solution brief provides an overview and describes benefits gained by State and Local Govt Agencies.
Tags : 
vxrail, vce. vdi challenge, state and local agencies, solution brief
    
EMC Converged Platforms
Published By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it’s about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
    
Puppet
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: HPE APAC     Published Date: Feb 24, 2017
In the full report, we will share with you what we learned and how you may be able to use this information to better inform your own path forward. Let’s start with a look at the general state of flash deployment in the data center.
Tags : 
flash storage, data center, storage, best practices
    
HPE APAC
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Il ressemble fortement à un autre terme actuel, la « transformation numérique. ». Mais en réalité, la transformation de l’IT est indispensable à une transformation numérique efficace. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement que ses concurrents : elle devient actrice
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Bien que ce ne soit pas un synonyme direct de la transformation numérique, ces deux concepts sont fondamentalement liés, dans la mesure où une transformation numérique efficace est indissociable d’une transformation de l’IT. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées, cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement q
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Il ressemble fortement à un autre terme actuel, la « transformation numérique. ». Mais en réalité, la transformation de l’IT est indispensable à une transformation numérique efficace. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement que ses concurrents : elle devient actrice d
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Bien que ce ne soit pas un synonyme direct de la transformation numérique, ces deux concepts sont fondamentalement liés, dans la mesure où une transformation numérique efficace est indissociable d’une transformation de l’IT. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées, cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement qu
Tags : 
    
Dell EMC Storage
Published By: Juniper Networks     Published Date: Oct 20, 2015
Data center network for competitive differentiation.
Tags : 
data center, competitive differentiation, virtualization, infrastructure
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
The increased virtualization and outsourcing to the cloud is most often being driven by business-continuity and disaster-recovery (BC/DR) initiatives.
Tags : 
virtualization, data, data center, business continuity, disaster recovery
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
With nearly every organization implementing some degree of cloud computing, virtualization security is as integral a component as traditional firewalls are in today’s networks.
Tags : 
juniper, network, virtualization, data center, virtual security, firewall
    
Juniper Networks
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Microsoft     Published Date: Mar 23, 2018
Expectations for Customer Service continue to rise around the globe. Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement.
Tags : 
    
Microsoft
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse this summary for additional information about performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers.
Tags : 
ibm uk, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering, migration, backup, replication, non-disruptive, ssd, solid state, metro mirror, global mirror, raid, if award winner storwize v7000, ibm smarter planet, smarter technology
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment.
Tags : 
esg, virtualization, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering, migration, backup, replication, non-disruptive, ssd, solid state, metro mirror, global mirror, raid, if award winner storwize v7000, ibm smarter planet
    
Ogilvy - IBM UK
Published By: Microsoft     Published Date: Oct 12, 2017
Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement.
Tags : 
customer service, customer loyalty, digital trends, multiple channels, microsoft
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.