sub systems

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
Published By: Esker     Published Date: Jun 14, 2019
Customer and supplier portals are one of the many fruits borne from the age of digital transformation. However, the level of accommodations that portals provide to customers and suppliers has spawned a whole new set of challenges that didn’t exist less than a decade ago. Chief among these is something referred to as “portal fatigue.” Many AR departments and CSR teams are painfully familiar with the term, as it’s often their job to either retrieve orders from a customer portal or submit invoices directly into customers’ AP systems. On paper, these tasks don’t seem all that odious. But when you consider the amounts of different portals being used, and the fact that not every user is trained on each portal, it’s easy to see why portal fatigue is a very real and concerning problem for today’s businesses.
Tags : 
    
Esker
Published By: goTransverse     Published Date: Nov 25, 2015
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
    
goTransverse
Published By: Brightidea     Published Date: Feb 05, 2016
What is the Tech Forecast? Is innovation the result of inscrutable, opaque genius, or can innovation be treated as an end-to-end process subject to performance optimization by adopting proven systems?” Gain Insights On: - Systemizing and sustaining innovation - Tools, strategies and processes that work - Creating an enterprise business process for innovation that is redesigned, improved and measured to improve performance
Tags : 
    
Brightidea
Published By: Intel     Published Date: Apr 11, 2019
Robots play a major role in making manufacturing processes more efficient and less labor intensive. They can help control costs and improve quality, as well as increase productivity. The complexity of robotic system design, however, creates obstacles for many manufacturers, and this is made more difficult by the need to identify and integrate subsystems from multiple vendors. NexCOBOT, a NEXCOM company, offers a flexible, modular robotics solution integrating artificial intelligence (AI) with machine vision and powered by the new Intel® Vision Accelerator Design products. The solution brings together the insight of artificial intelligence, the mobility of robotics, and the capabilities of machine vision, providing a new level of precision and optimization for manufacturing and industrial implementations
Tags : 
    
Intel
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"With the introduction of Oracle Database In-Memory and servers with the SPARC S7 and SPARC M7 processors Oracle delivers an architecture where analytics are run on live operational databases and not on data subsets in data warehouses. Decision-making is much faster and more accurate because the data is not a stale subset. And for those moving enterprise applications to the cloud, Real-time analytics of the SPARC S7 and SPARC M7 processors are available both in a private cloud on SPARC servers or in Oracle’s Public cloud in the SPARC cloud compute service. Moving to the Oracle Public Cloud does not compromise the benefits of SPARC solutions. Some examples of utilizing real time data for business decisions include: analysis of supply chain data for order fulfillment and supply optimization, analysis of customer purchase history for real time recommendations to customers using online purchasing systems, etc. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
    
Intel
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: Oracle     Published Date: May 20, 2019
Today’s Outdated State of ERP When was the last time you upgraded your ERP system? Not just patched, fixed or tinkered with it—but implemented a substantive upgrade that enabled real business innovation, generated excitement and unleashed a wave of ideas and productivity from your users? You know—the same kinds of enthusiasm that greets web or iPhone apps like Instagram, Spotify, Netflix, etc.? If you’re like your peers, then the answer is “not in recent memory.” In fact, according to Forrester, “approximately half of ERP customers are on releases that are two versions behind the current release, which may be four years old or more.” Download this whitepaper to find out more about how outdated ERP systems are harming businesses.
Tags : 
    
Oracle
Published By: ServiceNow     Published Date: Mar 24, 2015
In its most basic form, a runbook is an electronic or physical document that lists detailed procedures for handling every expected situation that an IT system may experience. Based on changes in system condition, incoming requests and other factors, system administrators determine which procedures to run and when to run them. Runbook procedures often include complex decision trees that indicate specific steps to follow depending on answers to pre-established questions. Administrators are responsible for performing the appropriate steps of the procedure in painstaking detail, often by manually issuing commands to components and sub-systems. Primitive runbooks are notoriously inefficient, inflexible and error prone, sometimes relying on undocumented steps known to just a few staff members. Yet, if a critical step is missed or an incorrect command is entered, the entire process may be negatively impacted.
Tags : 
runbook, it system, system administrator, sub-systems, accelerate business
    
ServiceNow
Published By: Visier     Published Date: Jan 25, 2019
Complementing your investment in Workday, Visier People takes you beyond Workday’s operational reports to strategic excellence. How? Through actionable and proven people analytics that are available today—not someday. Chosen time and again by Global 2000 organizations, Visier’s dedicated people analytics and workforce planning solution, with its all-inclusive subscription model, brings together data from all your transactional HR and business systems— including Workday—so you can: • Answer strategic workforce questions on demand, with credibility • Connect the dots between workforce decisions and business outcomes • Model and forecast your future workforce and its costs
Tags : 
    
Visier
Published By: Aria Systems     Published Date: May 03, 2016
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
    
Aria Systems
Published By: Tripp Lite     Published Date: Jun 28, 2018
As high-density IT equipment becomes the new normal, the amount of heat generated continues to grow substantially – as does the challenge of efficiently cooling data centers. Traditional perimeter and/or raised floor computer room air conditioning systems increasingly struggle to remove concentrated heat loads. In many small to mid-size data centers, implementing close-coupled cooling solutions can be a highly effective and efficient strategy for supplementing cooling capacity. Located in or near server racks, close-coupled air conditioning units focus cooling where it is needed most without lowering the temperature of the entire data center. In addition, these modular solutions make it easy to reconfigure cooling to handle new equipment or eliminate hot spots. As a result, using close-coupled portable, rack-mounted or row-based air conditioning units tailored to your specific data center needs can boost cooling efficiency and add valuable flexibility.
Tags : 
    
Tripp Lite
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Trend Micro     Published Date: May 03, 2018
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v3.8 SP5 and OfficeScan (OSCE) v12.0.1807. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v4.0 available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation. While the companion Comparative Reports on security, performance, and total cost of ownership (TCO) will provide information about all tested products, this Test Report provides detailed information not available elsewhere.
Tags : 
    
Trend Micro
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
    
HP Data Center
Published By: Infosys Limited     Published Date: Aug 02, 2019
The consumer packaged goods landscape is a sum of many complex and moving parts – a demanding and ever changing customer universe, with a subset of digital natives; a complex distribution system; and legacy IT systems from internal silos and mergers. In such a dynamic environment, we help our clients accelerate growth by transforming their organization to become a thriving Live Enterprise by augmenting their core digital capabilities. The cloud is an integral part of this digital transformation ushering CPG enterprises into a new era of hyper performance. Cloud promises to deliver several significant benefits including reduced costs, increased scalability, flexibility, and agility, leading to improved business performance and therefore growth. To better understand the specifics of cloud initiatives, we surveyed 167 senior executives from organizations in the CRL industry, with over USD 1 billion in revenues across the United States, Europe, Australia and New Zealand. Download thi
Tags : 
    
Infosys Limited
Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance
    
McAfee
Published By: Cisco     Published Date: Jun 21, 2016
The new age of digital manufacturing is expected to drive dramatic business improvements for companies transitioning from legacy automation systems. Manufacturers can create a foundation for a highly integrated and intelligent decision-making value chain by connecting existing industrial sub-systems, sensors and machines with enterprise applications.
Tags : 
    
Cisco
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: IBM     Published Date: Nov 13, 2008
Improve operational efficiencies with next-gen networks and servicesThere has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Tags : 
ibm, operations management, tivoli, value-added services, operational support systems, wireless, ibm, power, cooling, tivoli, netcool solutions, operational efficiencies, efficiency, ip multimedia subsystems, ims, fixed-mobile convergence, operational support systems, oss, value-added services, vas
    
IBM
Published By: NexGen     Published Date: Feb 09, 2015
94% of IT professionals consider it valuable to manage data based upon the business value of it. Yet only 32% are doing it - because it's hard. Are you looking to be a part of the 32% without the difficulties? There is a substantial gap between those who want to use data to its full potential and those that are actually doing so. Storage systems have never been designed with the end-goal to help customers prioritize their data based on their own priorities and the value of that data. Narrowing that gap may not be as hard or expensive as many companies think. Solving these challenges was one of the founding principles around NexGen's Hybrid Flash Array. Download now and learn how IT professionals can use NexGen storage architecture and software to simplify data priority assignment and management process.
Tags : 
data, data value, nexgen, flash, hybrid
    
NexGen
Published By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : 
customer-centric, increase revenue, relationships, operations
    
IBM
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.