it functions

Results 1 - 25 of 189Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Mar 02, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
streamline workflow, increase visibility, global demand, modernize systems
    
Workday
Published By: Workday     Published Date: Mar 19, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
netflix, global demand, streamline workflow, modernize
    
Workday
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence
    
ASG Software Solutions
Published By: Cisco     Published Date: Dec 23, 2015
So what lessons can operators learn from the past experience with server virtualization? Beware of merely shifting costs from capital to operating expenditures. Be selective in virtualizing the right resources and functions driven by the business need, and not the technology lure.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, enterprise applications
    
Cisco
Published By: HPE     Published Date: Mar 02, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
    
HPE
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: LogMeIn     Published Date: Mar 19, 2015
Many organizations are making fundamental changes to their organizational structures, delivery models are changing, support organizations are adding new capabilities, and mission statements are changing at breakneck speed. Our support organizations are adding new services, taking on new roles and responsibilities, engaging in different ways with their customers, and consolidating many operational functions to create a scalable delivery model that is focused on customer success and outcomes within a cost structure that meets the company’s revenue, cost, and margin goals. This report will explore some of these issues, and how support organizations can make the shift needed to meet their customers' needs.
Tags : 
delivery models, customer support, support services, service offerings
    
LogMeIn
Published By: Adobe     Published Date: Sep 12, 2017
Read the Gartner MQ: Multichannel Campaign Management to learn why Adobe is a leader. Forrester states, "Consider Adobe Campaign for breadth of digital and offline campaign management capabilities and its tight link to the analytics and content management functions within Adobe Experience Cloud."
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle CX
Published By: Infosys     Published Date: May 30, 2018
APIs are a convenient way for enterprises, particularly in the financial services domain, to monetize their services with minimum expenditure. However, making sure that the APIs are always available, scalable, and secure is vital for the API economy to truly realize its potential. A major financial services firm built an API platform to earn revenue by exposing its backend functions, but needed a partner to make sure the platform was well supported and available 24/7 to partners and developers. See how Infosys helped and the five key takeaways from the project.
Tags : 
api, investment, platform, financial, services, domain
    
Infosys
Published By: TriNet     Published Date: Jan 18, 2012
This paper acts as a well-qualified resource to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
Published By: TriNet     Published Date: Jan 18, 2012
This paper acts as a well-qualified resource for to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, human resource technology
    
TriNet
Published By: HPE     Published Date: Mar 23, 2015
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT. Download this white paper to learn more.
Tags : 
    
HPE
Published By: RES Software     Published Date: Apr 05, 2013
While the inevitable move to Windows 7 has been on the horizon for IT departments for several years, it’s clear that migration projects continue to plague many IT professionals. RES Software commissioned its second Windows 7 migration survey in June 2012 to assess the progress of these implementations in relation to a previous benchmarking survey issued in 2010. The most recent survey captures data from more than 330 IT professionals in North America and Europe across multiple industries and job functions. The results have been analysed and are highlighted within this research brief.
Tags : 
windows 7 migrations, it professionals, survey, capture data, job functions, it professionals in north america, research brief, res software
    
RES Software
Published By: EMC     Published Date: Apr 15, 2011
This white paper introduces the EMC Fast VP technology and describes its features, functions, and management.
Tags : 
emc fast vp, unified storage system, fast cache, lun management, storage tier
    
EMC
Published By: VMWare - vFabric     Published Date: May 10, 2012
Attend this webcast to learn how VMware vFabric Application Director can help you ensure simplified and highly flexible application provisioning and create best practice application architectures to be reused by other functions in your organization.
Tags : 
applications, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, provisioning, vfabric, networking, data management
    
VMWare - vFabric
Published By: Oracle     Published Date: Aug 09, 2013
In this whitepaper, the role of business leaders in driving talent management functions is explored, with a particular focus on the tools and approaches that will make them successful.
Tags : 
business leaders, talent management, hcm
    
Oracle
Published By: SAP     Published Date: Nov 12, 2015
The survey conducted by Loudhouse Research of 1,010 executives with responsibility for governance, risk and compliance (GRC) in their organizations found increasing risk and regulation complexity is now the biggest pressure on organizations’ GRC functions.
Tags : 
risk, risk management, governance risk and compliance, grc, regulation complexity, finance
    
SAP
Published By: Comcast Business     Published Date: Feb 16, 2017
When you’re running your own business, you have to wear many hats. But it’s tough to be an expert in everything from strategy to day-to-day execution across multiple functions: finance, operations, sales and marketing, HR, and more. This comprehensive guide offers tips and advice from a wide range of experts across to help you build, run, and grow your business effectively.
Tags : 
    
Comcast Business
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.