it implementation

Results 201 - 225 of 488Sort Results By: Published Date | Title | Company Name
By: Genesys     Published Date: Jul 13, 2018
Compare leading contact center infrastructure vendors. In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” 1 — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” 1 — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process 1 Gartner Peer Insights rev
Tags : 
     Genesys
By: Oblong     Published Date: Nov 18, 2016
Fujitsu created the Open Innovation Gateway (OIG) in the Silicon Valley as a platform dedicated to advancing the implementation of innovative practices in June 2015. The OIG spurs practical results and achieves goals based on collaboration throughout the organization from a wide range of fields. Fujitsu has been using the immersive Mezzanine solution as the collaborative heart of the OIG. Mezzanine allows remote teams to simultaneously share information on any device. Meeting participants can gesturally move and organize information across an immersive digital workspace. To achieve the same collaborative results as Fujitsu, schedule a demo at one of our locations and experience an immersive digital workspace first hand.
Tags : 
     Oblong
By: Dassault Systèmes     Published Date: Aug 08, 2017
Industrial Equipment Manufacturers have to connect closely with customers and introduce new products quickly and efficiently to meet their needs. While smaller Industrial Equipment Manufacturers may be able to control, access, and share product data with relatively simple Product Data Management (PDM) tools, larger Industrial Equipment Manufacturers rely on full-featured PLM systems that help automate processes and share data across global supply chains. Industrial Equipment Manufacturer companies may find themselves in-between because: • Product and organizational complexity drive them beyond basic PDM capabilities • A full-featured PLM implementation may feel out of reach They need to choose a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. What’s the right size PLM to fit an Industrial Equipment Manufacturer? Let’s take a look.
Tags : pdm, product data management, industrial, equipment manufacturers, plm, dassault
     Dassault Systèmes
By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : digital future, digital revolution, data integration, positioning
     Kofax
By: VMware     Published Date: Sep 06, 2017
"Whether your goal is to migrate an existing XenApp infrastructure to Horizon, replace it with a new system, or simply integrate legacy Citrix infrastructure with your Horizon virtual desktop deployment, VMware has the innovative products and technology you need. Download this white paper to access valuable guidance for planning and undertaking a migration from Citrix XenApp to VMware Horizon through four detailed approaches, including the major steps required for their implementation. "
Tags : vmware, citrix, xenapp, vmware horizon
     VMware
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: Looker EMEA     Published Date: Sep 27, 2017
Deploy Business Intelligence in Days, Not Months. Fastest Implementation Time -Up and running in 24 days compared to 78 on average (300% faster). ? Ease of Use - Top to bottom, Looker is easier ? User Adoption - More data lovers switch to Looker Deploying a new BI platform doesn’t have to be a long, painful process anymore. See how 21 leading BI vendors compare in terms of overall user satisfaction for implementation -Download the Report >>
Tags : business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
     Looker EMEA
By: IBM     Published Date: Oct 02, 2015
This book helps you understand DevOps and how your organization can gain real business benefits from it. You'll also discover how a holistic view of DevOps that encompasses the entire software delivery life cycle - from ideation and the conception of new business capabilities to implementation in production - can bring competitive advantage in a continuous delivery world.
Tags : dev ops, software delivery, production, delivery, development, operations, cloud, customer service, it management, knowledge management, enterprise applications, business technology
     IBM
By: Bluewolf     Published Date: Apr 04, 2011
From extensive work with thousands of salesforce.com customers, Bluewolf has identified what separates the companies that are most effective with salesforce.com post-implementation.
Tags : bluewolf, roi paradox, salesforce, cloud computing, salesforce.com, cloud solutions, player, contender, leader
     Bluewolf
By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network, network infrastructure, infrastructure, application workload, application delivery, application delivery controllers, adc, platform, platforms, data center
     F5 Networks Inc
By: Riverbed     Published Date: Feb 26, 2015
Insurance organizations are constantly replacing legacy systems and practices with streamlined ones that help them compete better. In the area of billing, policy and claims management, Guidewire is broadly adopted.
Tags : performance management, quality service, network performance, application performance, vendor profile, implementation
     Riverbed
By: Riverbed     Published Date: Nov 02, 2016
"In the cloud era, businesses need levels of agility that traditional networks can’t provide. The software-defined WAN (SD-WAN) is emerging at branch offices and other remote locations to drive increased efficiencies and to optimize user experiences across cloud applications and services. What you’ll learn from this powerful resource: Why the SD-WAN market is expected to hit $6B by 2020. The products and services that form the SD-WAN landscape. Some essential guidance for SD-WAN planning and implementation."
Tags : 
     Riverbed
By: ClickExpress     Published Date: May 01, 2013
The path forward is clear: the best practices organizations have already taken the first steps to establish a stronghold with the application of Mobile Workforce Management Solutions. They are already at the vanguard of technology adoption, implementation, and usage. However, as the global services economy continues to expand, all services organizations that expect to compete successfully in their respective market space will need to embrace the state-of-the-art technologies that will allow them to survive – and thrive – in an increasingly competitive marketplace.
Tags : stage, practice, service, performance, organizations, management solutions, implementation
     ClickExpress
By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
     Absolute Software
By: BMC Software     Published Date: Jul 01, 2011
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service.
Tags : service management, bmc software, itil, saas, help desk software, delivery model, cloud based help desk, simple, affordable, bmc, drive profit, reduce risk, paul avenant
     BMC Software
By: HP     Published Date: Jul 29, 2008
This white paper describes critical steps IT executives must take to prepare for change and manage an ITSM implementation to maximize its value and ensure that it achieves the full transformation effect it is capable of delivering. IT Service Management (ITSM) is a proven and effective framework for helping IT organizations become more adaptive, flexible, cost effective, and service oriented.
Tags : itsm, it service management, service management, itil, mission critical, change management, it management
     HP
By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl, business technology
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
     Entrust Datacard
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: F5 Networks Inc     Published Date: Jan 22, 2009
Hundreds of organizations around the world use Microsoft® SharePoint® with  over 80 million implementations, allowing them to develop intelligent portals that seamlessly connect users, teams, and knowledge. With the release of Microsoft Offi ce SharePoint Server 2007, F5 has specifi cally developed and tested a comprehensive Application Ready infrastructure that enhances the security, availability and performance of SharePoint deployments, whether it’s over the LAN or across a global WAN.
Tags : application ready network guide, microsoft office sharepoint 2007, sharepoint deployments. wan, tcp, roi, sharepoint, portal, microsoft, big-ip, application, networking, it management
     F5 Networks Inc
By: NetApp     Published Date: Jun 09, 2009
This paper focuses generally on optimal storage and storage management for SharePoint and specifically evaluates NetApp's approach, detailing how the capabilities in NetApp's DataONTAP and SnapManager for SharePoint Server offerings help to drive storage efficiency, reduce cost, and exclude complexity in a comprehensive SharePoint implementation. It is not so much a "how to" guide, but rather a "why to" explanation. Learn more today!
Tags : netapp, microsoft, sharepoint, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql, triggers
     NetApp
By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : hp data center, energy efficiency, data center, high-availability it environments, green initiatives, it infrastructure, epeat, global commerce, hvac, crah, cdpr, power usage effectiveness, pue, go green, dcie, networking, security
     HP Data Center
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com