sif

Results 1 - 25 of 165Sort Results By: Published Date | Title | Company Name
By: Ahead     Published Date: Jun 05, 2019
Digital Requires a New Level of Insight and Control Digital strategies have caused business executives to intensify their scrutiny of how technology affects bottom line performance. With a growing emphasis on differentiating the customer experience in highly competitive markets, these executives want to understand how their IT systems affect everything from brand perception to customer acquisition and loyalty. 3 | A Guide to Intelligent Operations Meanwhile, those same demanding business leaders lack appreciation and patience for the complexity of today’s digital technology environment. While applications and user experiences are simpler and more intuitive, the backend processing, application interdependencies, and underlying infrastructure are more complex than ever, even in light of the benefits of abstraction, virtualization, and cloud computing (see Figure 1.) While CIOs have long been expected to improve stability and uptime - and done a pretty good job of it - the stakes are much
Tags : 
     Ahead
By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
     Zynapse
By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Bancolombia is an award winning, full-service financial institution that provides banking services to customers in 12 different countries and is one of the 10th largest financial groups in Latin-America.With bots from Automation Anywhere, Bancolombia sifts through structured, semi-structured, and unstructured customer data to transform their BPM. Bots automate hundreds of processes and greatly increasing back office efficiency, saving Bancolombia a significant amount of time servicing customers. This has led to an increase in CSAT numbers and has created additional revenue streams.
Tags : 
     Automation Anywhere APAC
By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
     Zaloni
By: Hewlett Packard Enterprise     Published Date: Nov 01, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
     Cisco EMEA
By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
     Hewlett Packard Enterprise
By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
     Commvault
By: Cisco     Published Date: Feb 23, 2016
As security continues to get more complex Cisco looks at a network visually for secuirty aspects and is not based upon classifications of boundary and segmentation. Putting the 'Network' back in Network Security is an implementation used through: Netflow, Fire & ISE, Beyond Access Control (SGT & TrustSec)
Tags : network management, network secuirty, network optimization, networking, security
     Cisco
By: Adobe     Published Date: Mar 21, 2017
L’espace de vente est tellement diversifié que les consommateurs avisés exigent, avec raison, une expérience exceptionnelle et constante.
Tags : 
     Adobe
By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : interaction management, business technology, enterprise, forrester, best practices, pegasystems
     Pega
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
3rd party guide to evaluating all-flash storage arrays. DCIG researched the features of more than 80 all-flash arrays for its Storage Array Body of Research. Recognizing that there are multiple market segments for these products, DCIG grouped the products into midmarket, small and midsize enterprise, and enterprise classifications.This guide includes the products that ranked Recommended, Excellent or Good among the enterprise grouping of arrays.
Tags : 
     Hewlett Packard Enterprise
By: SAP     Published Date: Oct 11, 2018
The consumer durables sector continues to evolve. Consumer demand for connected, energy-efficient appliances is driving investment in R&D – even as profitability pressures necessitate new cost-cutting measures. And intensifying vertical and virtual integration means manufacturers need stronger relationships with extended supply chains. Supply chain and sourcing professionals are leading the charge. Learn how a digital strategy enables the transformation needed to excel today.
Tags : 
     SAP
By: SAP Ariba     Published Date: Oct 11, 2018
The consumer durables sector continues to evolve. Consumer demand for connected, energy-efficient appliances is driving investment in R&D – even as profitability pressures necessitate new cost-cutting measures. And intensifying vertical and virtual integration means manufacturers need stronger relationships with extended supply chains. Supply chain and sourcing professionals are leading the charge. Learn how a digital strategy enables the transformation needed to excel today.
Tags : 
     SAP Ariba
By: Dell EMC EMEA     Published Date: Feb 28, 2019
Les organismes des secteurs public et privé reconnaissent que la gestiondu cycle de vie des PCdevient plus complexe et coûteuse à mesure queles gammes de PC et les modes de travail des collaborateurssediversifient. Pour optimiser leur productivité, chaque groupe decollaborateurs a des besoins spécifiques en termesde matériel, de logicielet de configuration. Tandis que les services informatiques s’efforcent defournir et de soutenir un plus large éventail de technologies à un personneltoujours plusdispersé et mobile, tout en veillant à limiter les risques deperturbation de l’utilisateur, ils sont également soumis à une intensepression en termes de coûts. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
     Dell EMC EMEA
By: Dell EMC EMEA     Published Date: Mar 29, 2019
Les organisations publiques et privées reconnaissent que la gestion du cycle de vie des PC devient plus complexe et coûteuse, à mesure que les appareils et les modes de travail des collaborateurs se diversifient. Pour être pleinement productifs, différents groupes de collaborateurs ont des besoins différents en matériel, logiciels et configuration de périphériques. Si les départements IT cherchent à fournir et à prendre en charge un large éventail de technologies pour un personnel de plus en plus dispersé et mobile, tout en assurant une faible interruption de l’activité des utilisateurs, il ne faut pas oublier qu’ils sont soumis à une pression considérable en matière de coûts. À ce titre, consolider les processus et faire appel à un partenaire fournisseur tel que Dell réduit les coûts et donne accès à l’expertise nécessaire pour améliorer les opérations de gestion du cycle de vie des PC. Téléchargez ce livre blanc pour en savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
     Dell EMC EMEA
By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy, investment, wealth diversification, acquisition, value creation
     KeyBanc Capital Markets
By: Dell     Published Date: Oct 24, 2014
Windows Server 2004 platform migration is not a mere OS upgrade or migration. Platforms accordingly need to be classified by their use in order to establish an adequate migration plan; the use of platform can be largely classified into 4 types. Read this paper to become informed on the 4 types of platform use and how to establish an adequate migration plan.
Tags : migration process, server migration, platform methods
     Dell
By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : miercom, security, effectiveness, report, protect, network, threats, solutions
     Websense
By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
     Dell EMC
By: DellEMC and Intel®     Published Date: Sep 16, 2016
Land Rover BAR a renforcé son avantage concurrentiel grâce à une appliance VxRail destinée à intensifier la collaboration entre les parties prenantes au développement du voilier et roder les tactiques de navigation.
Tags : land rover, vxrail, case study, convergence, infrastructure, collaboration
     DellEMC and  Intel®
By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
By: Adobe     Published Date: Nov 25, 2013
Without document classification in play, it's impossible to know what to protect. The mobile ecosystem makes workers infinitely more productive, which is one reason that it won’t go away. This white paper explores the question: How can IT govern and protect content in such ad hoc and semi-structured environments? Please download whitepaper to learn more.
Tags : document, document classification, document security, mobile, mobile workforce, cloud-based, mobile, mobile ecosystem, it governance, semi-structured environments, sensitive documents, corporate liabilities, enterprise, enterprise solutions, networking, security, wireless, business technology
     Adobe
By: Pega     Published Date: Jul 29, 2015
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to discover how well each vendor fulfills Forrester’s criteria an
Tags : 
     Pega
By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
     Oracle
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com