traditional pr

Results 301 - 325 of 897Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jan 28, 2019
Traditionally, the best practice for mission-critical Oracle Database backup and recovery was to use storage-led, purpose-built backup appliances (PBBAs) such as Data Domain, integrated with RMAN, Oracle’s automated backup and recovery utility. This disk-based backup approach solved two problems: 1) It enabled faster recovery (from disk versus tape) 2) It increased recovery flexibility by storing many more backups online, enabling restoration from that data to recover production databases; and provisioning copies for test/dev. At its core, however, this approach remains a batch process that involves many dozens of complicated steps for backups and even more steps for recovery. Oracle’s Zero Data Loss Recovery Appliance (RA) customers report that total cost of ownership (TCO) and downtime costs (e.g. lost revenue due to database or application downtime) are significantly reduced due to the simplification and, where possible, the automation of the backup and recovery process.
Tags : 
    
Oracle
Published By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 25, 2017
Two-thirds of organizations that blend traditional and cloud infrastructures are already gaining advantage from their hybrid environments. However, leaders among them use hybrid cloud to power their digital transformation, going beyond cost reduction and productivity gains.
Tags : 
cost reduction, infrastructure, business process, workflow, scalability, resiliency
    
IBM APAC
Published By: KPMG     Published Date: Jul 10, 2018
Working out what consumers want – and why – is getting harder. Transactional data and traditional market research and demographic profiles no longer do the job. Our ‘Five Mys’ report proposes a radical new framework for navigating complex consumer decision-making. Read the report to find out: • what the ‘Five Mys’ are and how they affect spending decisions • how to get better at predicting consumers’ changing needs • where different generations are directing their spending • how changing life patterns are creating new opportunities for businesses that can pick up on signals from consumers
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
The traditional IT organisation is struggling to meet the insatiable demand for new digital capabilities from business stakeholders. It’s time for a new IT operating model – ¬but what will it look like? Read this insight to find out: • what three new roles the future IT operating model must encompass • what new skills and positions will be required in the IT function • which integration needs the future IT function must address • what the priorities should be in terms of orchestrating the IT ecosystem. Read this insight now
Tags : 
    
KPMG
Published By: Schneider Electric     Published Date: Nov 17, 2016
Today’s data center power and cooling infrastructure has roughly 3 times more data points / notifications than it did 10 years ago. Traditional data center remote monitoring services have been available for over 10 years but were not designed to support this amount of data monitoring and the associated alarms, let alone extract value from the data. This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
schneider electric, digital remote monitoring, data center operations, maintenance
    
Schneider Electric
Published By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : 
roi, soa, job scheduling, ca wa, workload automation
    
CA WA
Published By: F5 Networks Inc     Published Date: Jan 25, 2018
With digital transformation reshaping the modern enterprise, applications represent a new class of assets and an important source of differentiation. The ever-more-competitive digital economy requires that your applications be delivered with unprecedented speed, scale, and agility, which is why more and more organizations are turning to the cloud. This explosive growth of apps hosted in the cloud creates a world of opportunities—and a whole new set of challenges for organizations that must now deploy and manage a vast portfolio of applications in multi-cloud environments. Automation and orchestration systems can help streamline and standardize IT processes across traditional data centers, private clouds, and public clouds. But with rapid innovation come concerns about security and delivering a consistent experience across environments.
Tags : 
application delivery, digital transformation, cloud technology, application, multi-cloud enviornment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk
    
LogMeIn
Published By: Genesys     Published Date: Jun 10, 2013
SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs.
Tags : 
session initiation protocol, sip, acd automatic call distribution, contact centers, voice, technology, customer service, solution
    
Genesys
Published By: RelayHealth     Published Date: Mar 29, 2013
Pharmacies must look beyond automation of traditional processes, like prescriptions and communication toward two-way, interactive connectivity, giving the pharmacy the capability to both view and populate the patient’s community health record.
Tags : 
clinical integration, pharmacy integration, longitudinal patient record, medication adherence
    
RelayHealth
Published By: RSA Security     Published Date: Jan 07, 2014
Watch this on-demand webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. Understand why organizations are moving to a true big data security platform where compliance is a byproduct of security, not the other way around.
Tags : 
security analytics, siem, advanced threats, best practices, security visibility, log collection
    
RSA Security
Published By: NetApp     Published Date: Sep 11, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash technologies, total cost of ownership, flash storage, data center, increased flexibility
    
NetApp
Published By: NetApp     Published Date: Sep 11, 2014
"VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
virtualization platform, remote desktop and applications, fas solution, storage utilization
    
NetApp
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
Read this report to understand how the age of the customer requires tech management to transform into a customer-facing function in speci?c ways. Business technology (BT) brings together technology and traditionally customer-facing roles like marketing, sales, service, brand/product management, and ful?llment for the purpose of deploying systems of engagement that provide di?erential customer experience. Firms must build these systems of engagement from the outside in, according to how customers move in market spaces. The rules for planning, building, and running systems of engagement are not the same as for previous generations of tech management because customers are not employees. The increasingly crucial role that digital technologies play in customer engagement elevates the CIO role in business — if CIOs can move beyond the traditional IT focus on technology assets and adopt an expanded view that centers on customer experience and choice
Tags : 
business technology, customer engagement, customer experience, cios
    
Netsuite DWASF Leads Display Q1 2015
Published By: NetApp     Published Date: Apr 02, 2015
This paper explores several of the total cost of ownership (TCO) benefits associated with flash storage compared to those of traditional hard disk storage environments. Experiences of customers with NetApp® flash storage solutions demonstrate how deployment of flash storage can translate into a lower TCO than that provided by traditional hard disks.
Tags : 
netapp, flash, flash storage, tco, disk storage
    
NetApp
Published By: ServiceNow     Published Date: May 21, 2015
The IT department has traditionally been the central nervous system of a company—the brain that powers the entire organization. IT has always been in control of software and systems, and responsible for keeping those systems and associated processes consistent, steady and reliable. But times are changing for IT.
Tags : 
servicenow, next-gen, itsm, saas, cloud generation
    
ServiceNow
Published By: MobileIron     Published Date: Apr 11, 2018
Consumer technology trends are clearly driving the evolution of modern work. As consumers (i.e. employees) become more mobile, they want their work lives to be just as flexible and responsive to their needs. They want to be able to use their own device — instead of a company-issued device — for all their personal and business-related responsibilities. As a result, consumer choice is now the driving force behind mobile enterprise decisions, and demand for the traditional locked-down enterprise device is rapidly decreasing.
Tags : 
guide, unified, endpoint, management, consumers, business, device, enterprise
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: