capability

Results 101 - 125 of 218Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Jul 30, 2019
Professional services automation (PSA) can empower your firm to respond quickly to new opportunities by automating critical processes and increasing visibility into capacity and capability.
Tags : 
    
Workday
Published By: Red Hat     Published Date: May 05, 2015
New Gartner research predicts that 75% of IT organizations will have a bimodal capability by 2017. Bimodal is a critical capability that combines the solid conventional capabilities of IT alongside a capability to respond to the level of uncertainty and the need for agility required for a digital transformation. According to Gartner, half of IT organizations that have a bimodal capability will make a mess. Learn more about Gartner's predictions for common mistakes that CIOs will make and how to avoid them.
Tags : 
red hat, gartner, bimodal it, cio, it architecture, hybrid, ntegration, devops
    
Red Hat
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: Dell     Published Date: Oct 23, 2008
To perform a successful and cost-effective Windows Vista migration, organizations must have a readiness plan in place. Assessing readiness can help your organization understand the current level of capability and maturity, and provide a guide for addressing trouble spots.
Tags : 
dell, vista readiness assessment, cost-effective vista migration
    
Dell
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster
    
BMC Control M
Published By: Appian     Published Date: Jun 29, 2010
This Aberdeen Group report reveals that Best-in-Class organizations are delivering process management capability to their non-technical business users faster and more efficiently, and leveraging these optimised processes for a substantial reduction in operating cost and cycle time.
Tags : 
appian, bpm, business process management
    
Appian
Published By: McAfee     Published Date: Jul 24, 2013
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : 
siem, big security data, security information, advanced threats, security intelligence
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Tags : 
siem, big security data, security information, advanced threats, security intelligence
    
McAfee
Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Datastax     Published Date: Aug 03, 2018
"Part of the “new normal” where data and cloud applications are concerned is the ability to handle multiple types of data models that exist in the application and persist each in a single datastore. This data management capability is called a “multi-model” database. Download this free white paper and explore the multi-model concept, its rationale, and how DataStax Enterprise (DSE) is the only database that can help accelerate building and powering distributed, responsive and intelligent cloud applications across multiple data models"
Tags : 
    
Datastax
Published By: Anaplan     Published Date: Sep 07, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its inancial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the luidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
In this paper learn how RSA Group shortened their FP&A process by 4 months. With a 300-year heritage, RSA Group is one of the world’s leading insurance groups. The company, which has over 20,000 employees in its core markets of the U.K., Scandinavia, and Canada, focuses on general insurance and has the capability to write business across the globe. Late one night, after the team had already been planning nonstop for weeks, one of Andrew Dinwiddie’s colleagues slammed his fists down on his desk and said, “Surely, this can be easier; surely, we can ind a solution to make this a less intense process.” It was that outburst of frustration that triggered Andrew and his team to look for different solutions to their inancial planning needs and ultimately led them to the Anaplan platform.
Tags : 
    
Anaplan
Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco
Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA
Published By: MuleSoft     Published Date: Jan 16, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : 
grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management
    
HP SAS
Published By: Comcast Business     Published Date: Mar 24, 2015
Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using Private Lines, Frame Relay or IP VPNs over the Internet. Ethernet services support hub and spoke topologies but also support an “any-to-any” network topology similar to a LAN but delivered over a wide area. This latter capability is unique to Ethernet services and cannot be cost effectively delivered using legacy point-to-point technologies such as Frame Relay or IP VPNs. This paper discusses two options for multi-site connectivity using Ethernet services. One option discusses the classical hub and spoke topology using Ethernet Virtual Private Lines (EVPL). The other option discusses the “any-to-any” topology using an Ethernet Private LAN (EP-LAN) service. Through examples, the paper illustrates the capabilities of the two approaches and their benefits.
Tags : 
multi-site connectivity, ethernet, security, ip transparency, performance, ep-lan, evpl
    
Comcast Business
Published By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : 
gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud
    
XO Communications
Published By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Jan 03, 2017
The term hunt has been largely accepted in the cyber security community, and we believe this particular definition is useful because it’s durable: whatever your current state, and however your capability changes, it applies. The hunt mentality, hunt approach, and hunt capability is something that everyone can use. Download now to find out more.
Tags : 
    
Delta Risk
Published By: Citrix     Published Date: Oct 26, 2017
This paper describes key criteria for evaluating SD-WAN solutions. It discusses the most important issues, and outlines levels of capability that separate “just okay” products from really good ones.
Tags : 
    
Citrix
Published By: Sixth Sense Media     Published Date: Nov 08, 2011
Location-based technology for the mass market is an exciting new capability moving rapidly into the mainstream for mobile marketing and engagement
Tags : 
marketing, sixth sense, engagement, sms, customer loyalty, conversion
    
Sixth Sense Media
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Learn how Stratus Mission-Critical Managed services have delivered 100% business capability for a clients' global operation - so they can 'have their cake and eat it too!'
Tags : 
stratus, business capability, business process, it components, business centric managed service, slas, mission critical environments, disaster prevention
    
Stratus Technologies
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.