automated

Results 276 - 300 of 659Sort Results By: Published Date | Title | Company Name
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW - NetApp
Published By: CDW - EMC     Published Date: Apr 07, 2016
IT infrastructure is no longer just supporting the business; it is the business enabler. Infrastructure must support constant business demands for new applications and services with limited budgets and resources. Yet there is limited time to constantly evaluate and integrate hardware, software and networking solutions to meet continuously evolving requirements. Create an automated, dynamic infrastructure that adapts to your business demands with the VCE VxRail™ Appliance.
Tags : 
infrastructure management, business management, best practices, application performance
    
CDW - EMC
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW - EMC
Published By: IBM     Published Date: Apr 06, 2016
"Discover the benefits of deployment automation and how to maximize your automation investments! IT organizations have been finding it increasingly difficult to deploy more quickly without adding more people and incurring additional risks. Only until recently have there been more viable automated deployment options to offer an alternative to the slow and error prone process of manual deployment. Read the paper to learn about: • The limitations of manual deployment, namely its inconsistency, lack of visibility, and proneness to error • The benefits of deployment of automation • The base set of features that an automated system should provide"
Tags : 
ibm, deployment automation, consistent deployments, urbancode
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
" This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions Complete the short form to the right to download the eBook."
Tags : 
ibm, application release, devops, deployment, ibm urbancode
    
IBM
Published By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
Self-service is an advanced element of private cloud environments that improves management efficiency and business agility, as well as lowering operating expenses. A self-service environment streamlines the interaction between users and the IT department. It empowers internal consumers of IT services to request and receive appropriately configured resources on demand with minimal IT intervention. NetApp® OnCommand® Workflow Automation, the NetApp Management SDK with open APIs, and key ecosystem partnerships enable enterprises to easily integrate their orchestration solutions and custom management tools with the NetApp storage service catalog for automated storage provisioning and protection. Customers can thereby create a self-service, web-based portal that efficiently delivers IT as a service to virtualization administrators, application administrators, and users, while enabling IT staff to focus on higher value activities.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
IT infrastructure is no longer just supporting the business; it is the business enabler. Infrastructure must support constant business demands for new applications and services with limited budgets and resources. Yet there is limited time to constantly evaluate and integrate hardware, software and networking solutions to meet continuously evolving requirements. Create an automated, dynamic infrastructure that adapts to your business demands with the VCE VxRail™ Appliance.
Tags : 
infrastructure management, business management, best practices, application performance
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW
Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud
    
IBM
Published By: Iconixx     Published Date: Mar 09, 2016
To unleash the beast in every sales professional, the sales beastmaster must wipe out every possibility of sales downtime caused by trivial administration and clunky processes. The beastmaster needs automated sales compensation
Tags : 
iconnix, automated sales compensation, sales compensation management, sales compensation solution, sales commission reconciliation, manual commission reconciliation, commission plans, sales
    
Iconixx
Published By: Coupa     Published Date: Mar 07, 2016
User adoption of automated business processes for procurement, invoicing and expense management still hovers around 20-40%. Coupa’s modern, easy-to-use, easy-to-configure platform can change that. Coupa helps extend the reach of your Oracle ERP system, by plugging seamlessly into your established framework.
Tags : 
    
Coupa
Published By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : 
silkroad, human resources, industry trend, learning
    
SilkRoad Technology
Published By: SilkRoad Technology     Published Date: Feb 24, 2016
Learning Management Systems (LMS) allow companies to focus on the right component of the learning process – and that is the learning. Administrative activities like registering for training or recording training completion are automated. Required compliance programs can be delivered online, reducing costs. Managers can share training feedback that supports the company’s business goals.
Tags : 
silkroad, human resources, learning management, roi, training, development
    
SilkRoad Technology
Published By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : 
logrhythm, cyber attacks, cyber threat, security, security application
    
Logrhythm
Published By: Onbase     Published Date: Feb 18, 2016
Accounts payable has been talking about end-to-end integrated automation for at least 40 years. Today, the technology exists, but resources are limited and end-to-end AP automation is still not standard. Some AP departments have automated pieces of the AP process, but an end-to-end solution should include the ability to capture, integrate, measure, process, store, and access information.
Tags : 
accounts payable, business management, business practices, accounting, finance
    
Onbase
Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices
    
Qualys
Published By: Oracle     Published Date: Feb 10, 2016
New online/ecommerce flows and customer interactions make or break today's omni-channel customer experience. The most automated organizations have transformed business processes to understand B2B/B2C customers, channels, and costs. Leading companies (top 30% studied) successfully invest in cloud-based, customer-driven capabilities to support their omni-channel initiatives and strategies.
Tags : 
oracle, cloud based supply chain, business transformation
    
Oracle
Published By: Datawatch     Published Date: Feb 03, 2016
Some companies estimate that up to 80 percent of their analysts’ time is spent on data preparation. Thorough, automated data preparation, however, can quickly transform raw information into reliable, consistent data sets ready for analysis. This report from Gartner details why information management and business analytics leaders must introduce data preparation into their big data initiatives in order to improve both the understanding of the data, and the productivity of analysts. Read the report now to learn more.
Tags : 
datawatch, data preparation, data analytics, data analysis, analyst productivity, information management, business analytics, big data
    
Datawatch
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Published By: Pure Storage     Published Date: Jan 29, 2016
While Epic deployment is widespread in Healthcare Delivery Organizations, protection of those environments is often difficult, manual and scripted. Learn how Commvault Intellisnap software and Pure Storage enable an automated protection and recovery environment for Epic.
Tags : 
modern data protection, epic, healthcare delivery organizations, commvault intellisnap, pure storage, recovery environment
    
Pure Storage
Published By: IBM     Published Date: Jan 26, 2016
Read this in-depth ebook to learn what industry standards look like, how they work, and the ways they enable automated exchanges of business transactions and information.
Tags : 
ibm, b2b, integration, industry, standards, processing
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat, global threat intelligence, protection
    
IBM
Published By: Esker     Published Date: Dec 18, 2015
Includes success stories from other companies running SAP who automated their O2C processes! Download now!
Tags : 
esker, performance gap, document processes, sap solutions, sap
    
Esker
Published By: Dynatrace     Published Date: Dec 16, 2015
This eBook is inspired by the famous 6th century Chinese manuscript: The Art of War. Today, we will embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly.
Tags : 
dynatrace, devops, application development, automated testing, performance monitoring
    
Dynatrace
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.