Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

resources

Results 1 - 25 of 1550Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
For midsize firms around the world with 100 to 999 employees, advanced technology plays an increasingly important role in business success. Companies have been adding cloud resources to supplement on-premise server, storage, and networking capabilities. At the same time, growth of mobile and remote workers is also changing how companies need to support workers to allow them to be as productive as possible.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: May 16, 2018
IT transformation is a strategic focus for IT executives as they seek to free up time, money and resources to invest in digital innovation. The most successful organizations are paying more attention to data protection as a critical element to transform and modernize the entire IT stack and deliver greater business value.
Tags : 
    
Dell EMC
Published By: Dell     Published Date: May 04, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. Download this executive summary to learn ways to best upgrade PCs efficiently with effective solutions to meet the needs of the emerging workforce. Organizations who find this balance can turn their workforce into a strategic asset and gain a competitive advantage while freeing up IT resources to invest in other aspects of digital transformation. Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. Powerful Productivity Outside. The following trademark line should be used on the landing pages for this asset: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: DigiCert     Published Date: Jun 19, 2018
1. Avoid Outages. 2. Save Time, Money, And Resources. 3. Manage Certificates at Scale. Download this infographic today to find out about the remaining benefits of using SSL/ TLS Automation in your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Schneider Electric     Published Date: May 04, 2018
While many OEMs are aware of new technologies to make machines more energy-efficient, they are reluctant to make changes due to the perception that it will make their machines more expensive to sell. The constraints of cost reduction, usage of resources and energy reduction are becoming key drivers in the industry as consumers require manufacturers to be more “green”. This paper demonstrates how incorporating sustainable design can add value to their machines and differentiate OEMs from the competition.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: Workday     Published Date: Mar 02, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
streamline workflow, increase visibility, global demand, modernize systems
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
To thrive in an outcome-based funding model, your institution needs an ERP and student information system that is efficient and adaptable in order to channel more resources into learning and support student success. Read the Ovum case study to learn how Broward College accomplished this with one cloud-based Workday system.
Tags : 
    
Workday
Published By: Groove     Published Date: May 16, 2018
Account based sales (ABS) has generated a lot of buzz lately, but it’s more than just a passing trend. In fact, many enterprise sales teams have been doing account based sales for quite a while. Whether this is the first time you have encountered the idea of ABS or you have heard about it before, this e-book will equip you with the basics so you can decide whether ABS is right for your company, outline your own ABS strategy, and optimize for the best results possible. We’ll cover: An explanation of account based sales Key benefits of adopting an ABS strategy How to get started and implement a successful ABS strategy Best practices and KPIs to optimize and measure your strategy Additional resources to help you plan and execute your strategy
Tags : 
    
Groove
Published By: Genesys     Published Date: Feb 22, 2018
Your customers expect effortless and personalized engagement across all their channels. Delivering exceptional customer service requires the platform, infrastructure, applications and resources to identify, route and switch interactions seamlessly between agents and channels, while keeping relevant data available throughout the customer journey. Download this paper to learn how to: • Transform single interactions into personalized customer journeys • Empower employees with the right set of tools, including a unified desktop • Quickly deploy new technologies, like blended artificial intelligence (AI), bots and virtual assistants to exceed your customers’ rapidly evolving expectations
Tags : 
contactbabel, contact center, omnichannel, routing, customer experience
    
Genesys
Published By: IBM     Published Date: May 22, 2018
Prepare competency frameworks to leverage AI and cognitive computing to transform your HR strategy.
Tags : 
human resources, talent management
    
IBM
Published By: IBM     Published Date: May 22, 2018
An overview of testing in talent acquisition and four specific guidelines for assessment practitioners evaluating new selection methods.
Tags : 
human resources, talent management
    
IBM
Published By: IBM     Published Date: May 22, 2018
A great candidate experience is now a fundamental requirement, as research in this white paper reveals.
Tags : 
human resources, talent management
    
IBM
Published By: Aviatrix     Published Date: Jun 11, 2018
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei reviews seven best-practice topics for Global Transit Network architecture. Free Evaluation Checklist In addition to the slides, you’ll also receive a handy spreadsheet-based checklist with 50 architecture and business goals to consider when evaluating solutions for your own Global Transit Network. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix
Published By: Workday     Published Date: Feb 27, 2018
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business. System complexity is increasing, though. Enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks.
Tags : 
business, enterprises, cloud, organisations, cybercrime
    
Workday
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search