deployment

Results 1 - 25 of 1592Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 23, 2014
With the ever increasing capability of mobile devices, together with continual increase in wireless throughput (one Gbps wireless LAN throughput is a reality today); thereís a clear need for a comprehensive and robust wireless deployment strategy in all public and private sector organisations.
Tags : 
    
Cisco
Published By: Dell APAC     Published Date: Nov 20, 2019
Organizations realize the time is now to move to a new deployment model. Digital transformation and proliferation of devices have put IT departments in the spotlight: They must move away from being linear, traditional controllers and evolve into modern transformers that are agile, flexible, and employee centric. PC-as-a-service (PCaaS) has emerged as the go-to model for IT because of the level of automation, efficiency, and employee empowerment it offers. None of this can be accomplished without a competent business partner that underpins the new customized, deployment model. In February 2019, Dell commissioned Forrester Consulting to evaluate employee experience and enterprise computing. Forrester conducted an online survey with 1,186 IT leaders across the globe to understand current PC lifecycle management deployment models.
Tags : 
    
Dell APAC
Published By: Hitachi EMEA     Published Date: Jan 13, 2020
Cisco and Hitachi have invested significant time and engineering resources to ensure that a large number of deployment options are available to all of our customers and partners. This e-Book includes tips and advice that can help you get the most out of your Cisco and Hitachi Adaptive Solutions for CI deployment. Cisco and Hitachi Adaptive Solutions for Converged Infrastructure will help organizations: Execute data-driven transformation. Simplify IT, improve agility, maintain compliance and ensure reliability. Enable IT to focus on supporting business needs. Download this e-Book now to find out more about the partnership and technology behind Cisco and Hitachi Adaptive Solutions for Converged Infrastructure and to learn how to transform your data center.
Tags : 
    
Hitachi EMEA
Published By: Dell EMC EMEA     Published Date: Oct 31, 2019
Gone are the days when IT operated in a dark, back-office environment, where they had little to no impact on the business or the employees they serve. IT leaders now see themselves as fundamental pillars of the business, moving from simple IT operation to the more complex IT orchestration, where they are actively serving business needs. Whether that need is to improve employee productivity or enhance customer experience, IT is at the forefront. When it comes to enabling employees with new devices, IT leaders are embracing new, innovative strategies for device deployment to increase automation, improve self-service, and enhance their capacity for innovation. The best part? The technology and processes involved with this change are now mature enough to support this shift. If your organization is considering changing its device deployment strategy in the next five years, itís time to revise that timeline, because the change is now necessary. Learn more about Dell solutions powered by In
Tags : 
    
Dell EMC EMEA
Published By: Swimlane     Published Date: Dec 26, 2019
Selecting new software can be tricky, and organizations want to make sure they are getting the best value for their time and money. However, focusing exclusively on a list of available feature sets is not the best way to make a software choice. Products are constantly evolving. Frequently, evaluators are left looking at a checklist of seemingly identical features without a real understanding of how to assess the differences from one platform to the next. But if a side-by-side checklist of required features isnít the answer, what methods can organizations use to choose the right security orchestration, automation and response (SOAR) platform? When it comes to likely indicators of successful platform deployment, itís essential to look beyond advertisements and dig into the differentiators. A SOAR platform should optimize the work already being done by the organizationóbetter, faster and smarter. Want to know more? Download the SOAR Platform Buyer's Guide to hear what you need in a plat
Tags : 
    
Swimlane
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
The rise of microservices has been a remarkable advancement in application development and deployment. Moving to a microservices-based approach makes app development faster and easier to manage, requiring fewer people to implement more new features. Microservices are a critical part of a number of significant advancements that are changing the nature of how we work. Agile software development techniques, moving applications to the cloud, DevOps culture, continuous integration and continuous deployment (CI/CD), and the use of containers are all being used alongside microservices to revolutionize application development and delivery. In this ebook, youíll take away with pro-tips on how to solve many potential development problems before you even start writing code.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Genesys     Published Date: Jan 13, 2020
If you are considering the right deployment model for your contact center, economic guidelines can help you choose the solution that is best for your company. Cloud, on-premises or hybrid. Just a few years ago, businesses were still unsure of the viability of moving their contact centers and other critical enterprise systems to the cloud. Since then, with the decrease of cloud costs, and the corresponding increase in security and, the viability and total cost of ownership of cloud deployments are attracting more and more companies. This eBook will cover how different criteria can affect a choice between a cloud or on-premises contact center, including: The size of your contact center, and business requirements such as customer journey management The location and quantity of contact centers being managed The need for scalability, speed of deployment, and maintenance requirements Read the eBook today!
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jan 14, 2020
Your move to a new call center shouldnít be intimidating. This ebook covers the basic steps for a successful migration. Avoid pitfalls, slow deployment, operational downtime and the hassles of migration. With proper planning and the key team members to assist in the transition, it can be easier than you think. Make your call center technology move confidently. Ensure you have the right stakeholders and subject matter experts on the internal project team Determine if your companyís network are compatible with your move Work together to provide a clear path forward for implementation Set expectations and get ready for go-live
Tags : 
    
Genesys
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
Published By: StoryDesk     Published Date: Mar 28, 2012
How can you use the iPad in your organization? What's the formula for a successful iPad deployment? What do you need to know about regulatory requirements, security, HTML5, and custom apps?
Tags : 
enterprise applications
    
StoryDesk
Published By: SAP     Published Date: Feb 03, 2017
As the global business world shifts to all digital, real-time operations, the legacy two-tier ERP architecture so many businesses have relied on to bridge headquarters with subsidiaries can no longer compete effectively. A simple and comprehensive answer exists in SAP S/4HANA. Available in cloud and on-premise, SAP S/4HANA gives organizations the ability to utilize the same product family across a multi-tier deployment.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrustís SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, youíll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dellís approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : 
infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
    
HPE APAC
Published By: Cisco     Published Date: Dec 20, 2018
Ciscoģ Collaboration Flex Plan gives you access to Ciscoís collaboration products, allowing you to mix and match buying models and deployment models in a single subscription depending on your buying needs. One subscription covers entitlement and technical support for: (a) the cloud services Cisco Webexģ Meetings, Cisco Webex Calling, Cisco BroadCloud Calling, and Cisco Webex Teams and (b) the software Cisco Unified Communications Manager and Cisco Meeting Server.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.