company

Results 1 - 25 of 1928Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 29, 2017
IT executives are in one of the most dynamic, challenging business environments of all time. The business expects speed; the IT function strives to keep up while pursuing innovation and efficiency. Many CIOs recognize that cloud is a possible solution to achieving both but they are uncertain about the best way to get there. Whether your company seeks to modernize IT, fuel innovation or accelerate growth, you’ll find that by identifying the most appropriate cloud journey for your organization, you can determine the best potential entry points to cloud migration as well as identify, prepare and prevent possible roadblocks. And, you’ll discover how the right cloud platform and partner can enable your success by leveraging different layers of the cloud to reach your desired business outcomes—and ultimately achieve true business transformation.
Tags : 
    
Oracle
Published By: Schneider Electric     Published Date: Nov 21, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Oct 25, 2017
eBay Classifieds supports multiple internal clients and all of their requirements in more than 1,000 cities around the world. The company adopts cloud and virtualization services to get to market faster with new features, services, and campaigns using Juniper Networks Contrail Networking, Contrail Cloud Platform and QFX5100 Switch.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
The CSI Companies consists of four entities plus affiliate Anteo Group that provide staffing and specialized services to meet a wide range of client needs. Since 1994, the Jacksonville, Floridabased company has offered staff augmentation services, executive search, and direct hire of people for clients in healthcare, financial services, banking, retail/hospitality, technology, and other industries. The company serves businesses nationwide from its headquarters and three regional offices. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
If you’ve seen recent car ads, you know they’re as likely to promote applications and connections as they are styling and horsepower. But manufacturers aren’t the only ones pushing apps these days. Banks, airlines, restaurants—you name it—all are using them to attract and engage customers. This is the application economy; where every company is in the software business and user experience is the new survival of the fittest.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
The key to order management success is to recognize that the product alone is no longer what is being sold, but the entire purchase experience from the point of view of the customer. Each retail task is a challenge that brings the customer and their needs to the center of the conversation. With the help of IBM Order Management and Watson Order Optimizer, your company can address the key challenges of optimizing inventory and minimizing cost-to-serve while delivering omni-channel services that satisfy your customers.
Tags : 
success management, optimization, watson order optimizer, customer success, omni channel, ibm
    
IBM UK&Ireland
Published By: FinancialForce     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
FinancialForce
Published By: ADP     Published Date: Aug 28, 2017
Does your company rely on an ad hoc HR manager, an owner or other employee who takes on HR responsibilities in addition to their “day job?” View the SlideShare and learn how releasing the burden of ad hoc HR management can free you up to do more by doing less.
Tags : 
    
ADP
Published By: ADP     Published Date: Oct 25, 2017
If your business relies on an owner or other employee to manage HR tasks, rather than employing a certified, dedicated HR expert, you might be experiencing some unforeseen risks, including wasted time and decreased morale. Check out the infographic to learn more about the risks of ad hoc HR management, as well as what you can do to free your company from this burden so you can focus on what you do best.
Tags : 
    
ADP
Published By: ADP     Published Date: Oct 25, 2017
Your company culture can help differentiate you from competitors. Find out if yours needs a makeover — and why it matters to employees.
Tags : 
    
ADP
Published By: Sage BMS Enterprise     Published Date: Nov 27, 2017
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape.
Tags : 
business, hr leaders, changing landscape, growth, company, employees
    
Sage BMS Enterprise
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Workday     Published Date: Nov 27, 2017
Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape has put together a guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications
Tags : 
    
Workday
Published By: Workday     Published Date: Nov 28, 2017
In this episode of “In Good Company,” Meredith Coughlin, assistant dean of enterprise systems at Indian River State College, and Sean Hanna, analyst of student systems at the University of Rochester, discuss the current challenges higher education institutions face as the traditional path to degree completion has evolved. What measures can schools take today to help students of all backgrounds achieve academic success and prepare for productive careers, and what role can technology play? Watch to find out.
Tags : 
    
Workday
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Most businesses have experienced an IT or technology outage in the past five years. Outages and disruptions result in business and IT challenges. Business continuity and disaster recovery (BCDR) plans ensure a company's ability to continue business uninterrupted and survive unforeseen disruptions. By adopting network diversity, IT pros expect to experience a variety of business and IT benefits, including protection against unexpected disruptions. Check out this easy-to-absorb infographic, based on Forrester survey data, to learn how your peers view the importance and structure of BCDR strategies.
Tags : 
    
Spectrum Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: