practice

Results 276 - 300 of 3634Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
As the application economy drives companies to roll out applications more quickly, companies are seeing testing in a new light. Once considered a speed bump on the DevOps fast track, new tools and testing methodologies are emerging to bring testing up to speed. In this ebook, we’ll explore some of the challenges on the road to continuous testing, along with new approaches that will help you adopt next-gen testing practices that offer the ability to test early, often and automatically.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Iterable     Published Date: Sep 07, 2018
Email marketing continues to be the best digital channel for ROI, so delivering dynamic, personalized messaging to the inboxes of your customers is of the utmost importance. In fact, for 77 percent of consumers, email is the preferred messaging channel, dwarfing demand for SMS, push notifications and social media communications. When you are determining the right email marketing strategy for your business, it’s natural to wonder how the industry leaders are conducting their campaigns. A¬er all, if they’re on top, then they must be doing everything right...right? To glean best practices, we analyzed the email marketing strategies adopted by the top 100 e-retailers in the United States to study how they engage with their customers. These companies represent industries ranging from apparel and electronics, to auto parts and pet supplies, but all have the single goal of getting their users to go from inbox to checkout. We note what companies are doing across the board, as well as what spec
Tags : 
    
Iterable
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
    
Amazon Web Services
Published By: AWS     Published Date: Sep 04, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics.
Tags : 
    
AWS
Published By: Epicor     Published Date: Aug 29, 2018
Focus on your best customers and minimize time wasted on unprofitable partnerships to maximize LBM business growth through the benefits of the trending practice of customer stratification. Epicor BisTrack Software, an LBM-specific business software, provides all the tools and information you need to implement customer stratification and reap the benefits of knowing your customer’s buying habits and successes. Download the e-book from Epicor and: • Understand the Benefits of Stratification • Explore The Four Customer Types • Apply Strategies to Maximize Results • Sustain Success With a Focus on Customers
Tags : 
    
Epicor
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Evariant     Published Date: Aug 22, 2018
Health systems that implement CRM-based engagement solutions stand to achieve significant strategic gains, from acquiring and retaining patients to supporting more positive clinical outcomes to increasing referrals to member providers and practices. Driven by easy access to rich consumer data and analytic profiling, as well as patient encounter histories, CRM-based engagement centers optimized for healthcare enable health system CSRs to quickly offer personalized responses to consumer or patient inquiries via multiple in- and outbound media, including telephone, email, social, and web.
Tags : 
call center, healthcare crm, patient experience, patient acquisition, healthcare transformation
    
Evariant
Published By: BNY Mellon | Pershing     Published Date: Aug 22, 2018
Download our report to learn more about key decision points to manage and grow your RIA business
Tags : 
clearing and custody, practice management, financial advisor, ria, registered investment advisor
    
BNY Mellon | Pershing
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: ServiceNow     Published Date: Aug 20, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Tenable     Published Date: Aug 15, 2018
"What’s your vulnerability assessment style? Are you scanning weekly, monthly or quarterly? And, what does your scanning habit reveal about the maturity of your organization’s vulnerability assessment practices, a critical part of cyber hygiene? These are the key questions Tenable Research set out to answer in our Cyber Defender Strategies Report. We discovered four common vulnerability assessment strategies in use today. These strategies tell us how mature an organization’s vulnerability discovery process is – and help us identify ways to improve. Download the report now to: - Learn what the four vulnerability assessment styles tell us about cyber risk maturity. - Compare your vulnerability assessment strategy to these four common scanning styles. - Find out what steps you can take today to improve your vulnerability assessment strategy – no matter where you are on the maturity scale."
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: TIBCO Software     Published Date: Aug 15, 2018
Expanding analytic capabilities are critical to digitizing the business, optimizing costs, accelerating innovation, and surviving digital disruption Historically, manufacturers were almost solely focused on reducing costs by applying automation and analytics to engineering, R&D, manufacturing operations, and quality organizations. Even though the strategies used within these areas are still needed, they are not sufficient to ensure business survival and continuity in the age of Industry 4.0 and the IoT. Today, it is paramount that smart manufacturers broaden their scope because disruptive innovations in data acquisition, storage, and analytics technology have enabled an entirely new degree of automation and virtualization, promising a complete 360-degree high-fidelity virtual data-driven integrated views of all operations—from suppliers and supply chains, through equipment, processes, and manufacturing practices, to final product testing and customer satisfaction. Download this paper
Tags : 
    
TIBCO Software
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.