it requirements

Results 76 - 100 of 970Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Jun 24, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries.
Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup, recovery, archive, roi of hp storage solutions, business value of hp storage solutions
     HP
By: HP     Published Date: Jun 25, 2014
An HP commissioned Forrester survey on the storage requirements of IT hardware decision-makers in North America and Europe.
Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, research
     HP
By: IFS     Published Date: Jan 04, 2012
How can ERP with Green SCM tools help manufacturers satisfy green supply chain requirements in order to satisfy customers and regulators? Find out now
Tags : superior solutions, clarity, compliance, control, investment, advisor, regulators, technology
     IFS
By: Adobe     Published Date: Nov 07, 2013
In Forrester’s 53-criteria evaluation of online testing platform vendors, we identified the seven most significant providers — Adobe, Autonomy, Maxymiser, Monetate, Optimizely, SiteSpect, and Webtrends — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria, and where these vendors stand in relation to each other, to help customer intelligence professionals select the right partner for their online testing needs.
Tags : adobe, forrester wave, online testing platforms, vendor selection, optimize core competency, digital marketers, maturing vendor solutions, future of online testing, growing online testing requirements, online testing vendors, balance functionality, balance usability, customer intelligence, right partner, online testing needs
     Adobe
By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
     MobileIron
By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
     Teradata
By: Pega     Published Date: Apr 04, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
     Pega
By: Pega     Published Date: Nov 18, 2015
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category.
Tags : 
     Pega
By: Rubrik EMEA     Published Date: Jan 04, 2019
Demand for flash storage is surging, but IT organizations are hard-pressed to align their data protection efforts with the realities of today’s infrastructure and application requirements in an increasingly flash-based environment.
Tags : : data, flash, storage, archiving, protection, recovery, workloads, applications, management
     Rubrik EMEA
By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
     Avanade  DACH
By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc, workforce mobile, saas
     Symantec.cloud
By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services, document management, document management services, business management, business imaging, business performance, document workflows, business outsourcing, knowledge management, enterprise applications
     Canon Business Process Services
By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms have an ongoing need to stimulate innovation and improve quality. Midmarket firms need to balance these requirements against a backdrop of limited scale, rapid market change and constraints on resources that can be dedicated to shaping the future, rather than reacting to the demands of the present. This Proaction Series report, commissioned by Dell, will address technologies best able to empower scarce resources as they help set new benchmarks for business performance. Download this report from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
     Dell EMC
By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : virtualization, security, consolidation, data, infrastructure, network, technology, networking, enterprise applications, business technology, data center
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : security, data, users, infrastructure, bluecoat
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : free wi-fi, security, acceptable use
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : blue coat, ssl, ssl visibility
     Blue Coat Systems
By: Pega     Published Date: May 24, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
     Pega
By: RSM US     Published Date: Feb 06, 2019
Competition and growth demands are intense in today’s environment. Margin pressure and increasing customer requirements create a need for laser focus on the customer experience, a true understanding of costs and margins, and experience to align your supply chain with your organizational strategy.
Tags : 
     RSM US
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
     Oracle APAC
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: Riverbed     Published Date: Jul 17, 2013
In recent years Boston College has experienced rapid growth in data center network complexity. This complexity was driven by the need to provide a high level of fault tolerance to new, multi-tiered applications that had large bandwidth requirements. Read the case study to learn how the university deployed Riverbed Cascade™ to improve application performance management and increase network uptime.
Tags : boston, boston college, riverbed cascade, riverbed, cascade, application performance management, network uptime
     Riverbed
By: Kaminario     Published Date: May 05, 2016
This IDC Buyer Case Study reviews how Cobb EMC, a regional not-for-profit electric utility company serving the greater Atlanta metropolitan area, addressed evolving IT infrastructure requirements with flash storage technology to improve performance and substantially improve IT efficiencies. This Buyer Case Study explores what drove Cobb EMC's initial interest in flash, how flash deployment has evolved in the company's environments, how the deployment has impacted its business, and what future plans exist for AFAs at Cobb EMC.
Tags : storage management, performance management, best practices, application integration, software protection, business intelligence
     Kaminario
By: DellEMC and Intel® Xeon® processor     Published Date: Jun 19, 2017
Read this white paper to find out how you could move your enterprise to the next level. Intel Inside® per nuove, infinite possibilità.
Tags : digital transformation, it infrastructure, mobile, cloud, big data, social
     DellEMC and  Intel® Xeon® processor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com