Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

information technology

Results 276 - 300 of 456Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Nov 22, 2011
Newell Rubbermaid sought to reduce time and effort to access information. They wanted to simplify access to global sales data and financial metrics. They also wanted to accelerate report query performance and improve decision making. SAP was selected because they are a comprehensive software program from a single vendor. Read to find out more.
Tags : 
sap, newell rubbermaid, data access, information management, technology, software, whitepaper, sales data, data management, business analytics, business intelligence, sales & marketing software, sales automation, analytical applications, data integration
    
SAP
Published By: IBM     Published Date: Dec 03, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, information technology, strategy, business goals, risk management, it management
    
IBM
Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, small business networks, return on investment, collaborative commerce, content integration, information management, cloud computing, colocation and web hosting, content management
    
123Together
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
Cylance
Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes, mobile computing, mobile data systems, smart phones
    
BlackBerry
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: SAP     Published Date: Aug 24, 2010
Communicate to line-of-business managers how they can deliver the right information at the right time to support better, faster decisions, and thus ensure long-term company success.
Tags : 
sap sme, it managers, chief information officer, cio, project management, business operation, service-oriented architecture, soa, itil, service oriented architecture, productivity
    
SAP
Published By: SAP     Published Date: Aug 24, 2010
This paper examines how an integrated information technology solution can help you take advantage of economies of scale to boost manufacturing utilization, enhance service levels, and improve the efficiency of your sales and administrative activities.
Tags : 
sap sme, integrated information technology, manufacturing utilization, operational, productivity, smb, small business networks, application integration, itil
    
SAP
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management, software development
    
SAS
Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning, server virtualization, web sphere, service oriented architecture, cloud computing
    
IBM Corporation
Published By: Microsoft Corporation     Published Date: Oct 19, 2010
This hosted solution helps organizations reduce the costs of managing and maintaining business systems, which frees information technology resources and enables staff to focus on initiatives that can deliver competitive advantage to the business.
Tags : 
microsoft online services, collaboration, business productivity, software services, integrated online service, it operation, application integration, collaborative commerce, productivity
    
Microsoft Corporation
Published By: EMA     Published Date: Aug 22, 2012
This webinar will serve as a guide for IT executives and professionals seeking to align IT Operations more closely with Agile Development and Business initiatives.
Tags : 
it operations, agile development, information technology, static operations, extrahop, application development
    
EMA
Published By: Dextra Technologies     Published Date: Aug 30, 2013
It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.
Tags : 
best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones, dextra, wireless, network security, network security appliance, smart phones, wireless security
    
Dextra Technologies
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel
Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : 
adobe, information technology, data management, business technology, document disconnect, sales management, contracts, e-signatures, quote to cash, sales contract management, software development, it management, knowledge management
    
Adobe
Published By: Exablox     Published Date: Jan 27, 2015
This IDC Buyer Case Study looks at the approach Exablox has taken in capitalizing on the object - based storage platform opportunity and the use of the Exablox OneBlox technology by the Balboa Park Online Collaborative (BPOC). IDC recently spoke with Jason Quinn, director of Information Technology for the Balboa Park Online Collaborative, whose charter is to further the technology objectives of the Balboa Park Online Collaborative and the institutions in Balboa Park.
Tags : 
storage management, nas storage, cloud managed nas, object-based storage, nas storage use case, digital asset management, primary data storage, backup storage, exablox, oneblox, data management
    
Exablox
Published By: Rackspace     Published Date: Jan 19, 2016
Industry analysts expect rapid growth in the private cloud market over the next five years as CIO’s use private clouds to transform their IT environment. This growth expectation is not surprising as private clouds provide businesses with many features of a public cloud along with the security, control, and performance of a dedicated environment. While private clouds provide many advantages, they are also exceedingly complex and are difficult to manage. They must be implemented and managed by experts who understand cloud architecture and know how to upgrade, patch, monitor, and scale a cloud environment.
Tags : 
rackspace, private cloud, openstack, information technology, software development, data center
    
Rackspace
Published By: Rackspace     Published Date: Jan 19, 2016
Rackspace® Private Cloud Powered by OpenStack® is backed with our results-obsessed service known as Fanatical Support.® Our exceptional customer service means we’re in it with you every step of the way. From initial design to ongoing management for your production environment, we manage your cloud so you can focus on your core business.
Tags : 
rackspace, cloud, information technology, security, data center
    
Rackspace
Published By: CyrusOne     Published Date: Jan 19, 2012
This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston
    
CyrusOne
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search