aps

Results 151 - 175 of 601Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: Nov 07, 2014
XtremIO all-flash-arrays (AFAs) are engineered for Oracle DBA requirements through a powerful, vastly simplified scale-out performance architecture, with unique compression, deduplication and snapshot capabilities.
Tags : performance architecture, unique compression, deduplication, snapshot capabilities, all-flash-arrays, enterprise applications
     EMC Corporation
By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : erp, enterprise resource planning, database virtualization, data management, virtualization
     Delphix
By: Salesforce.com     Published Date: Mar 22, 2013
Login and get a quick snapshot of the state of your business.
Tags : salesforce, crm, salesforce app, customer service, cloud, salesforce cloud, business technology
     Salesforce.com
By: Dell EMC     Published Date: Aug 03, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance, enterprise workflows, hdd
     Dell EMC
By: VMware AirWatch     Published Date: Feb 21, 2017
Businesses running older versions of Citrix XenApp and XenDesktop, or running Citrix on top of Windows Server 2003, have hard choices. You can’t ignore the problem, which will likely require large-scale upgrades of the existing application delivery farms, which in turn often require replacing the entire software stack—and perhaps the hardware, too. Once the need for such a major upgrade has been determined, we recommend a fresher approach than making the default choice to upgrade to the next version of Citrix XenApp. Download this whitepaper to learn how you can take advantage of the opportunity to sail the Safe Passage to VMware Horizon, which offers a clean start, reduces the number of vendors involved with application delivery and improves employee productivity.
Tags : 
     VMware AirWatch
By: Mitel     Published Date: Apr 25, 2018
In businesses and organizations across the world, rooms once humming with wires, black boxes and blinking lights now sit empty. In a lonely phone closet, there’s only dust, a single lonely terminal, or perhaps a foosball table where IT pros can let off steam. The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : cloud, communications, organizations, landscape
     Mitel
By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
     Determine (Selectica)
By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
     Determine (Selectica)
By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : cloud, cloud security, encryption, security, mobility
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses similar to yours to get work done from any device, any time. Download this e-Book to find out: What benefits 85% of businesses get from relying on the cloud How business-class cloud services use encryption to protect your data Why 79% of IT pros say it’s people, not technology, that cause security gaps
Tags : cloud security, data encryption, data security, mobility, efficiency
     Citrix ShareFile
By: Lookout     Published Date: Dec 09, 2016
The top five questions your security and IT peers have about mobile security, answered. Get details on top threats, critical gaps, and why enterprises need visibility into mobile today.
Tags : 
     Lookout
By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : idg, mobile workforce, analysis, technology, lookout
     Lookout
By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi, value-based care, episode-of-care, mortality data, process-of-care model, hospital insights, health system insights
     IBM Watson Health
By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
     Carbon Black
By: Carbon Black     Published Date: Nov 26, 2018
Deciding on an endpoint security solution can be a difficult task. Many organizations know their current security has gaps, but don’t know where to begin in the search for something new. To help with this, SANS has created a guide to evaluating these solutions. The guide outlines the necessary requirements you should look for, as well as how to prepare to run a test.
Tags : 
     Carbon Black
By: PwC     Published Date: Jun 14, 2018
Leaders shouldn’t forget that most structural changes will have tax implications. Thoughtful planning can convert tax traps into enhanced reorganization returns.
Tags : 
     PwC
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
     Location3
By: Location3     Published Date: Feb 07, 2019
Your Local Business Listings are part of the foundation of your online presence. Ensuring that all of your brick-and-mortar business locations are accurately represented on directories like Google My Business, Facebook Places, Bing Places, Apple Maps and more requires a hands-on, managed approach to local data optimization.
Tags : marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, local business listings, listing management, store visits
     Location3
By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
     Illusive Networks
By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : here technologies, transport and logistics
     Here Technologies
By: Aerohive     Published Date: May 13, 2015
HiveManager NG is a cloud-based, enterprise-class Wi-Fi management solution and is a breakthrough in management simplicity, flexibility, and redundancy.
Tags : hivemanager ng, aerohive, wi-fi solutions, network management system, network, how to simplify your wi-fi, wi-fi solutions, network simplification, aps, network security, branch controllers
     Aerohive
By: pepperjam     Published Date: Jun 18, 2019
It happens too often: Marketers relying on advertising methods and platforms that work “just well enough” to keep the business going. And while many marketers realize their existing affiliate network provider isn’t delivering the results they crave, they’re under the assumption that this is as green as the grass gets. Perhaps they assume that it’s just simply, too hard, too costly, or too risky to move. The truth is that it’s far more effective, easier and profit-boosting to make a switch to a new affiliate provider. Let us show you how less than 30 days and three simple steps can take you from good enough to great. You’re almost there! Just complete the form to download Migrate Your Affiliate Program in 30 Days or Less!
Tags : 
     pepperjam
By: Concur ENT     Published Date: Nov 07, 2017
When travel, expense and invoice management are disconnected, your business can only see a snapshot of spending. If you only plan to improve one area – perhaps expense, leaving travel and invoice behind – discrepancies between processes will begin to show. Only by embracing connected spend management can you save your employees and your business time and money both now and in the future.
Tags : holistic spend, control costs, compliance, employee satisfaction, simplified process, late payments, duty, productivity
     Concur ENT
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com