optimization

Results 1 - 25 of 1180Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
IoT has proven its value in the private sector. Ever since the 1980’s, US manufacturing has undergone a dramatic transition based on IoT. Machines that where once manually calibrated and maintained began to be controlled by specialized computers. These computers were able to quickly recalibrate tools which allowed manufactures to produce smaller batches of parts, but were also often locked into proprietary computing languages and architectures.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Too often we hear that people want to move everything to the cloud. Unfortunately cloud is not the easy button, and it will not fix every problem that you have with IT today. We have seen a large number of customers who do the math after moving to the cloud only to realize that it was more expensive to run in an offsite cloud than onsite IT. These customers then move away from offsite cloud for workloads that never should have left the building. The cloud in its many varieties is a good tool that can help organizations, but it needs to be thought out. This document is intended to help you move the right workloads to the right clouds in the best way possible and avoid the yoyo effect of moving twice and paying for the privilege of the experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
The key to order management success is to recognize that the product alone is no longer what is being sold, but the entire purchase experience from the point of view of the customer. Each retail task is a challenge that brings the customer and their needs to the center of the conversation. With the help of IBM Order Management and Watson Order Optimizer, your company can address the key challenges of optimizing inventory and minimizing cost-to-serve while delivering omni-channel services that satisfy your customers.
Tags : 
success management, optimization, watson order optimizer, customer success, omni channel, ibm
    
IBM UK&Ireland
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
In Forrester’s 40-criteria evaluation of omnichannel order management (OMS) vendors, we identified the nine most significant software providers in the category — Aptos, IBM, Jagged Peak, Kibo, Manhattan Associates, NetSuite, Oracle, Radial, and SAP Hybris — and researched, analyzed, and scored each. This report details our findings about how well each vendor fulfills our criteria and where each stands in relation to one another to help eBusiness professionals select the right partner for their omnichannel order management needs.
Tags : 
omni channel, ibm, order management, forrester, partner, optimization
    
IBM UK&Ireland
Published By: HP Inc.     Published Date: Dec 06, 2017
Reinventing with 3D printing. See how the HP Jet Fusion 3D printing solution unlocks the full potential on 3D printing.
Tags : 
printing, business, solutions, optimization, organization
    
HP Inc.
Published By: CA Technologies     Published Date: Aug 22, 2017
Data is the most valuable asset a business has, and the most important data lives on the mainframe. This critical information fuels the new apps and services that differentiate your business. And it’s rapidly growing, with each new app creating a new source of data. What’s more, usage demands are increasing as developers seek access to mainframe-based data to promote innovation.
Tags : 
database, administration, management, performance optimization, sla, ca technologies, security
    
CA Technologies
Published By: DocuSign UK     Published Date: Nov 16, 2017
This eBook will outline four key areas of DX that will help you grow your business.
Tags : 
digital, success, transformation, companies, organizations, optimization, docusign
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 16, 2017
In this eBook we will explore five key areas where DX can help you save money, increase productivity, and ultimately be more profitable.
Tags : 
global, customer, docusign, digital, signatures, optimization
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 16, 2017
This best practices paper outlines seven important ways that HR teams can make meaningful progress in their digital transformations.
Tags : 
professionals, team, digital, transformations, technology, optimization
    
DocuSign UK
Published By: IBM     Published Date: Oct 17, 2017
The data quality tools market continues to show strong revenue growth, driven by cost, process optimization and digital business initiatives. Applying data quality tools to existing and emerging business scenarios will enable data and analytics leaders to deliver greater business value.
Tags : 
    
IBM
Published By: Palo Alto NAM Nov-Jan     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto NAM Nov-Jan
Published By: Palo Alto NAM Nov-Jan     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto NAM Nov-Jan
Published By: Palo Alto NAM Nov-Jan     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto NAM Nov-Jan
Published By: Oracle OMC     Published Date: Nov 30, 2017
There’s really no mystery about mobile testing. It’s the art and science of building, running, and analyzing optimization tests for mobile customer experiences. But for companies looking to mobilize their websites and apps, the mystery often lies in how to do mobile testing really well. This guide assembles the best advice from analysts, engineers, and thought leaders to help mobile-minded businesses master the non-desktop landscape. You’ll learn how to optimize customer mobile experiences from strategy to execution. Along the way, you’ll get answers to common questions about mobile testing, find out about optimization testing in general, learn key differences between customer experience optimization (CXO) on mobile and desktop, and see how you can use design expertise to create bold and effective mobile experiences. So start reading and boost your understanding of mobile testing and optimization.
Tags : 
    
Oracle OMC
Published By: Epicor     Published Date: Nov 14, 2017
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, you’re likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in today’s manufacturing market. Technology leaders can help drive the company’s digital ambition by: • Considering whether the business can support full digital transformation or more moderate optimization • Observing digital trends across the industry and adjacent industries • Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
    
Epicor
Published By: FICO     Published Date: Dec 04, 2017
In an era where Big Data decisions demand high-powered tools, organizations everywhere are still mired in complex spreadsheets that limit the speed and precision of their critical customer interactions. Read this fact sheet to learn how you can evolve beyond what spreadsheets alone can achieve: • Allow business users to easily create and compare “what if” scenarios, interact with compelling visualizations, and challenge, improve and build trust with stakeholders and collaborators • Rapidly deploy new optimization features and applications practically at the speed of thought – without leaning on IT – while leveraging existing investments in other analytic tools (such as R, SAS, MATLAB, and even Excel) Download Now
Tags : 
fico, optimization, modeler, industry, analytic, tool, business, solutions
    
FICO
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches.
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: