RecruitingBlogscom

Follow Us:

 

inter enterprise

Results 76 - 100 of 365Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Enterprises today face the major challenge of how to fully orchestrate the apps that define their business and automate the IT processes underpinning them when much of the infrastructure used to run them is outsourced to cloud providers. Opportunity Some cloud service providers offer their own orchestration tools, and each on-premises tool has automation capabilities. But while we own our apps, providers are interchangeable depending on what they can offer and for what price. We should be able to switch between cloud providers and between cloud, on-premises and hybrid infrastructure as and when the business requires, with minimal effort and without losing any control. Sometimes we might want to use more than one provider at the same time, leveraging the advantages of each provider simultaneously. Benefits What is needed is an orchestration layer that remains constant while cloud services come and go; one that enterprises own along with their core apps.
Tags : 
    
CA Technologies_Business_Automation
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Sherwood International, a specialist in providing customised in-bound supply chain solutions into Africa, has implemented the Sage Business Cloud Enterprise Management solution business management solution to boost efficiencies in its operations and gain better visibility into its business. It has also been able to streamline finances and improve operational controls.
Tags : 
    
Sage Software (APAC)
Published By: CA Technologies     Published Date: Jun 09, 2015
In today’s application economy, everyone is in the software business. Auto makers are putting Wi-Fi hotspots in their cars. Watches are trading gears for motherboards. Even soda fountains have evolved from dumb machines into instrumented devices with touch-screen user interfaces. This digital transformation is changing the way applications are developed, tested, moved through environments and released into production—and it’s putting new demands on IT teams with which they’re struggling to keep up. At a high level, this is because the application delivery systems and processes at many enterprises were put in place when IT only had to push out an annual or semi-annual release. But as market pressures and executive mandates have forced teams to deliver innovations faster and more frequently, a new set of development, testing, automation and customer challenges have appeared—acting as obstacles that stand between you and your digital transformation goals.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 11, 2016
IBM’s 2015 annual February customer conference was a massive event combining multiple conferences of yesteryear. This EMA impact brief discusses IBM’s hybrid cloud strategy at a high level with particular focus on IBM’s latest announcements related to the PureApplication portfolio.
Tags : 
ibm, ibm pureapplication, ema, application platform, software development, enterprise applications, business technology
    
IBM
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Schneider Electric     Published Date: Apr 23, 2019
The supply chain for manufacturers and distributors is facing challenges around increased analytics, multichannel fulfillment, talent shortages, and the use of new technologies such as wireless, augmented reality, robotics and machine-to-machine (M2M). At the same time, there is continued focus on cost reduction and sustainability. The Industrial Internet of Things is driving a huge transformation as it increases the interconnection between connected devices and analytics. The smart manufacturing enterprise can seize opportunities to maximize efficiency and safety through networking and intuitive collaboration with its users. This eBook shares practical steps to follow for a smart material handling and logistics approach.
Tags : 
material handling, logistics, conveying
    
Schneider Electric
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: NetApp and VMware     Published Date: Jan 09, 2012
Magna International implemented NetApp storage to drive innovation while achieving enterprise IT efficiencies and agility. Read on to find out more.
Tags : 
private cloud, manufacture, innovation, assemblies, modules, enterprise, benefits, iaas, saas, netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection
    
NetApp and VMware
Published By: Genesys     Published Date: Oct 16, 2013
Enterprise Workload Management gets the right work to the right person at the right time, eliminating the outdated manual distribution of work model. Enterprise Workload Management finally gives organizations the ability to correlate the work that customer service interactions create in the front office -- with the best resource within the organization required to complete that work in the back office. Enterprise Workload Management ensures that the highest priority work is being handled by the right resource, and gives managers real-time visibility into when the work will be completed, as well as reports that show the outcomes of the work. Customers get notified when an order or application is processed instead of waiting to hear or having to repeated call back. Employees get specific coaching and training plans based on the results of their work.
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm, enterprise applications, business technology
    
Genesys
Published By: Peoplefluent     Published Date: Apr 02, 2013
HR has an important opportunity to drive enterprise social collaboration. Read how social technology enables employee productivity, how HR can add value to social communication, and how social tools can improve HR functions.
Tags : 
social, collaboration, social collaboration, enterprise social collaboration, social technologies, enterprise communication, social communication, social hcm, social talent management, talent management, workforce productivity, social hr improvements, social hr process, social hcm software, employee communication, employee engagement, intersection of social and hr, onboarding, employee retention
    
Peoplefluent
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: VMware AirWatch     Published Date: Jul 19, 2017
In June 2016, VMware interviewed 575 VMware inner circle customers and partners with the goal of collecting Windows 10 insights and IT perspectives from global enterprise, commercial, and SMBs. This flipbook reveals the five key trends that were discovered for Windows 10 adoption and migration. Unified endpoint management (UEM) with Windows 10 and VMware takes these trends into account and gives customers the ability to unify desktop and mobile management under one model.
Tags : 
    
VMware AirWatch
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Akamai Technologies     Published Date: Mar 10, 2016
Find out why companies must rethink how they architect their enterprise network and utilize the Internet to meet the demands of the business.
Tags : 
akamai technology, enterprise network, enterprise applications, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
    
Akamai Technologies
Published By: TIBCO Software     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Aug 14, 2018
According to Forrester Research, "Enterprise data virtualization has become critical to every organization in overcoming growing data challenges," with faster access to connected data, self-service, and agility among the many benefits seen. In this report, Forrester analyzes past research and Forrester Wave reports, user need assessments, and vendor and expert interviews to evaluate the offerings of top vendors in enterprise data virtualization. In compiling the vendor rankings, the report reviews the current offering, strategy, and market presence for the 13 most significant vendors. They discuss where TIBCO ranks in the evaluation and positions TIBCO Data Virtualization as a leader in enterprise data virtualization Read The Forrester Wave™: Enterprise Data Virtualization, Q4 2017 report to learn more.
Tags : 
    
TIBCO Software
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
The shared responsibility model is spelled out in the terms of services document of every CSP from Microsoft to Amazon. However, it is arguably the least understood and most misconceived concept. Simply put, the shared responsibility model outlines the CSP’s responsibility to maintain a secure and continuously available service and enterprises’ responsibility to ensure secure use of the service. Why is such a concept so difficult to comprehend and open to varying interpretations? Is the difference between security of the service and secure use of the service so significant? Aren’t enterprises moving to the cloud so they don’t have to deal with these types of responsibilities? This white paper examines the root cause behind the confusion, some unfortunate scenarios that resulted from the confusion, and how some enterprises are successfully addressing and embracing the shared responsibility model.
Tags : 
    
Oracle Security Solutions
Published By: Cisco     Published Date: Dec 27, 2017
The market for communications is shifting to one in which multi-modal interactions will become the norm. Voice, video, and messaging Communications and Collaboration will drive the future of this market. As messaging becomes a larger part of the Communications landscape, Mobile Collaboration is poised to take on a larger enterprise role, by way of shifting email to more of a confirmation tool. Moreover, the convergence of content types under UCC will be greatly enhanced by a categorized and dynamic ontology-driven knowledge framework that goes beyond search. Once the framework supports are in place, UCC will accelerate its momentum at an even greater rate than it already is today. This Research Note identifies the new elements of UCC and how enterprises can plan for the shift to multi-modal communications.
Tags : 
    
Cisco
Published By: Pure Storage     Published Date: Oct 09, 2017
Cloud computing and all-flash storage are two of the most important innovations driving next-generation IT initiatives. While it may seem at first that these are parallel trends, in reality they are inextricably intertwined. Without the benefits of all-flash storage —driving new levels of performance, agility and management simplicity — enterprises would not be able to modernize their infrastructures to deliver cloud services. It is no coincidence that the largest hyperscale cloud providers rely on all-flash storage solutions as their storage foundation. Pure Storage all-flash storage arrays provide enterprise customers with a safe, secure and smooth path to the all-flash cloud. You can take the journey in stages, starting small with a single application or two, and then adding more applications through consolidation and virtualization. You can also implement multiple stages at once.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Pure Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top