professional

Results 226 - 250 of 1300Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 24, 2017
In our 28-criteria evaluation of application performance management (APM) solutions, we identified the 14 most significant vendors — AppDynamics, AppNeta, BMC Software, CA Technologies, Dell, Dynatrace, Hewlett Packard Enterprise (HPE), IBM, ManageEngine, Microsoft, Nastel Technologies, NetScout, New Relic, and Riverbed Technology — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice for their organization.
Tags : 
    
CA Technologies
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
In Forrester’s 40-criteria evaluation of omnichannel order management (OMS) vendors, we identified the nine most significant software providers in the category — Aptos, IBM, Jagged Peak, Kibo, Manhattan Associates, NetSuite, Oracle, Radial, and SAP Hybris — and researched, analyzed, and scored each. This report details our findings about how well each vendor fulfills our criteria and where each stands in relation to one another to help eBusiness professionals select the right partner for their omnichannel order management needs.
Tags : 
omni channel, ibm, order management, forrester, partner, optimization
    
IBM UK&Ireland
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Flexible and quick fulfillment of online orders has become a differentiator for retailers in the battle for omnichannel customers. But omnichannel fulfillment is expensive and difficult to execute, eroding already thin margins and exposing fragile fulfillment systems. Furthermore, the amount of data that must be processed to ensure the most profitable transaction is more than a fulfillment professional can handle alone, with literally hundreds of decision points to consider.
Tags : 
omni channel, fulfillment, system, retailers, online orders, ibm
    
IBM UK&Ireland
Published By: Workday UK     Published Date: Jan 31, 2019
People analytics is increasingly on the agenda for organisations. With the rise of workplace technology allowing leaders to track employees’ performance, productivity and wellbeing, we partnered with the CIPD to survey over 3,000 business professionals to understand how people analytics is being used. And the results are in, 65% of respondents who work in an organisation with a strong people analytics culture, say their business performance is strong compared to competitors. As well as outlining the key opportunities leaders can capitalise on, this report covers: • How different professions are using people data • The various types of people data that are being used • How people analytics adds value to organisations • What the future holds for people data
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus
    
Qualys
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: Adobe     Published Date: Feb 03, 2017
Econsultancy’s 2017 Digital Trends report, published in association with Adobe, is based on a global survey of more than 14,000 digital marketing and ecommerce professionals across EMEA, North American and Asia Pacific markets.
Tags : 
digital trends, customer experience, business transformation, customer experience management
    
Adobe
Published By: Veracode     Published Date: Jun 26, 2019
DevSecOps is the future of Software Development
Tags : 
    
Veracode
Published By: Rackspace     Published Date: Feb 01, 2019
Rackspace Quick Start for Google Cloud Platform helps enterprises expedite their migration to Google Cloud using proven design, automation, and migration methodologies—all executed by Rackspace experts who have deployed more than a million applications into the cloud. By partnering with your company’s cross-functional leaders, our professional adoption team will fast-track your journey to the cloud—typically moving your first application(s) to the cloud within the first few weeks of the program. This annual review includes an assistance with a disaster recovery (DR) simulation, audit of patch levels, and upl eveling the deployment tools to ensure they align with the infrastructure that may have evolved since deployment.
Tags : 
    
Rackspace
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : 
united arab emirates, united arab emirates university, network security, security, network
    
HP - Enterprise
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications
    
Teradata
Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring
    
Viavi Solutions
Published By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : 
cloud control, it complexity, collaboration, data management, cloud implementations
    
NetApp
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: MobileIron     Published Date: Sep 22, 2014
The explosive popularity of mobile devices and apps offers a tremendous opportunity for any enterprise to become a “Mobile First” organization — one that views mobility as the most important business enabling technology today. Mobile First organizations understand that the Bring Your Own Device (BYOD) trend is here to stay and is fueled by users who expect total flexibility in managing their professional and personal business wherever they are, on their device of choice. However, the ability to securely and cost-effectively enable BYOD presents a significant challenge for even the most forward-thinking companies.
Tags : 
mobile devices and apps, mobile first, total flexibility, enterprise, cost-effectively enable byod
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
    
MobileIron
Published By: NetApp     Published Date: Sep 26, 2018
Get practical advice from IT professionals on how to successfully deploy all-flash arrays for Oracle, SAP and SQL Server workloads in a SAN environment. You'll explore topics such as transaction processing speed, storage management, future requirements planning, workload migration and more.
Tags : 
netapp, flash, san, workload, netapp
    
NetApp
Published By: SAP     Published Date: Jun 04, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SAP
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SuccessFactors, an SAP Company
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Box     Published Date: Nov 24, 2015
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
ecm, content management, forrester, box, productivity
    
Box
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.