RecruitingBlogscom

Follow Us:

 

third party

Results 1 - 25 of 286Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 29, 2008
Aligning IT and business perspectives requires the ability to create links between configuration information in the CMDB and the business service as experienced by the user. Service Dependency Mapping (SDM) products automate the process of creating and maintaining these links.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
The scalability of its EP-LAN lets MMC Corp seize new opportunities without adding infrastructure. For example, Scales and Trusler are looking at virtual desktops or virtual desktop image [VDI] files for some offices and even job sites. “We’ll probably have to scale some bandwidth internally for that,” Trusler notes, “but if we do the VDI internally or we do it with an external third party, it doesn’t really matter… because we can get them on that EP-LAN network and we can get the bandwidth that we need… quickly.” EP-LAN is scalable. In most cases, adding additional services at a specific customer location can easily be turned up by Spectrum Enterprise remotely. Choosing a fiber EP-LAN over MPLS not only met the challenge to connect MMC Corp locations: it created an IT platform that continues to scale to support rapid expansion and innovation.
Tags : 
    
Spectrum Enterprise
Published By: Uberflip     Published Date: Dec 20, 2018
In today’s world, marketers know that producing content isn’t enough. If they’re going to continue to make an investment in creating content, they need to do more to ensure it performs. We’ve long since known that combining content with a remarkable experience will allow it to reach its full potential, and allow marketers to see results. But as with any emerging category, content experience was not without its detractors. After all, what kind of results could you expect from an investment in the experience around that content? If you’ve ever wondered why you should care about content experience, and wanted something a little more concrete than a few anecdotes from marketers, or third-party stats, then look no further.
Tags : 
    
Uberflip
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Microsoft’s SharePoint Platform is used by tens of thousands of enterprises worldwide to share information with employees and third parties. Many of these users access Sharepoint remotely, which is cumbersome and put the enterprise at risk. Read this paper to learn three reasons why IT needs a new approach to third-party access to Sharepoint.
Tags : 
third-party, access, sharepoint, platform, remote, enterprise
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Companies are increasingly using outside contractors and suppliers stay competitive, which means granting third-parties access to applications via VPN or VDI. This reliance causes increased complexity and burden on the Enterprise team while also creating additional security risk, as third-party access creates additional points of entry to an organization’s network. Read this solution brief to learn about a new painless, secure approach to remote access.
Tags : 
painless, security, third-party, resources, enterprise, vpn, solution
    
Akamai Technologies
Published By: Cisco EMEA     Published Date: Nov 08, 2018
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third party perspective is based on our own hands on testing as well as on interviews with customers who use these products in production environments.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Aria Systems     Published Date: Jun 15, 2016
"Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more >"
Tags : 
    
Aria Systems
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®
Published By: Broadsoft     Published Date: Jun 14, 2017
Many premises-based phone system (PBX) manufacturers claim that the five year costs of their systems are lower than an equivalent cloud alternative. What the premises guys don’t tell you about is all the extra little hidden costs that come as a result of the limitations of the hardware and software in their systems. This guide will provide you with useful questions to ask your PBX manufacturer to ensure that you're getting the full picture on the cost of their system. Questions to Ask During an Evaluation: • Have you sized this system for my peak demand? • Have you factored in the cost of site redundancy? • How many hours of call recording are included? • How is mobility supported? Do calls route in an out of the PBX for call treatment? • What are the annual maintenance costs of the hardware and software in this system? • Which third party systems have you integrated this PBX with?
Tags : 
    
Broadsoft
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: SAP Ariba     Published Date: Oct 11, 2018
Today's supply chains typically include multiple partners, with services and sourcing managed across several organizations and across the world. Companies are increasing their use of third-party suppliers in the execution of key strategic imperatives. This leads to complexity in the supply chain and increased scale and intensity of operations, all of which contribute to global warming.
Tags : 
    
SAP Ariba
Published By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
    
3D Systems
Published By: HP Inc.     Published Date: May 20, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top