bi application

Results 76 - 100 of 1850Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 30, 2018
The digital world has made it possible for enterprises to reach, and deliver services to customers near and far through mobile applications. However, regular and rapid rollout of features and new versions across geographies and different operating systems call for flawless applications and mobile app testing capabilities. A chemical giant wanted to deliver agriculture data and services to their farmer clients across geographies through their mobile applications. See how Infosys helped and the five key takeaways from the project.
Tags : 
    
Infosys
Published By: Riverbed     Published Date: Jan 25, 2018
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Jan 25, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the
Tags : 
    
Riverbed
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Pour suivre l’essor de la mobilité professionnelle sans devenir victime des risques potentiels qui en découlent, le département IT doit être en mesure de résoudre efficacement des problèmes complexes, allant du provisionnement des services à l’achat des périphériques en passant par la supervision de la sécurité. Pourquoi ? Les professionnels de l’information ont besoin d’un accès aux informations sensibles sur un large éventail d’applications métiers et d’appareils, où qu’ils soient. En d’autres termes, des politiques de sécurité et de confidentialité qui n’entravent pas la productivité des utilisateurs leur permettront d’optimiser leurs performances. Téléchargez ce livre blanc pour en savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA
Published By: Unit4     Published Date: Feb 18, 2019
Looking to buy a Professional Services Automation (PSA) solution? Learn how you can drive greater revenue and employee billable utilization across the whole business with this Buyer’s Guide. Providing an overview of the key trends, business processes, selection criteria, as well as the major business impact of PSA, it includes expert guidance to help project- and services-based businesses evaluate and choose PSA applications.
Tags : 
psa, productivity, professional services automation, professional services, services automation
    
Unit4
Published By: 3D Systems     Published Date: Feb 28, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: Dell EMEA     Published Date: Jun 14, 2019
The manufacturing industry has always been at the forefront of embracing new ways of doing things faster, smarter and better. Today, we’re at a fascinating inflection point. Industry 4.0 — a long-used term in manufacturing — has become increasingly mainstream, due to the availability of affordable IoT infrastructure, the desire to gain new business insights from data plus the arrival of advanced connectivity technologies, such as 5G. As a solution builder, you can help your manufacturing customers realize benefits in the era of new industrial revolution. We can help you manage data across the entire manufacturing process and supply chain, from the edge to the core to the cloud, speeding up you application development and compressing time to market. Our team of engineers and project managers are ready to help you design and build solutions on Tier 1 infrastructure to meet your unique requirements. Download this eBook to learn how to take advantage of Industry 4.0 and deliver Next Gen
Tags : 
    
Dell EMEA
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and efficiency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances
    
Dell EMC
Published By: Zebra     Published Date: Oct 12, 2011
Re-pricing products in the store has become a strategic tool that retailers apply to increase traffic and sales. This white paper explains how retailers are profiting from mobile markdown printing and how stores can leverage different printing applications to create more value.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions
    
Zebra
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper by CA outlines the challenges experienced on a daily basis in the IT department
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper outlines the benefits of CA Unified Infrastructure Management and how it can have a positive impact on your business
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper explains how CA Unified Infrastructure Management can have an important impact on your business.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This info-graph explains the challenges and potential problems caused by the monitoring of multiple tools and devices and provides a complete unified visualization to help provide you with a single view in one architecture.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
Tags : 
web application delivery, session hijacking, security, ca single sign-on
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: Dell     Published Date: May 04, 2015
To run a truly efficient private cloud, the enterprise must have clear visibility into operations, applications, and costs, no matter how heterogeneous the underlying virtualized environment. Read on to learn how to build the ties that bind the private cloud infrastructure to what the business needs.
Tags : 
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.