it operations

Results 1 - 25 of 930Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
This book helps you understand both sides of the hybrid IT equation and how HPE can help your organization transform its IT operations and save time and money in the process. I delve into the worlds of security, economics, and operations to show you new ways to support your business workloads.
Tags : 
hpe synergy, api, infrastructure, hybrid it, workloads, code
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Carbonite     Published Date: Oct 04, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration. Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target.
Tags : 
migration mistakes, operations, dependencies, expectation setting, contingency planning
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Cloud Backup continues to be a hot topic, and its adoption has increased during the past two years, albeit from a small base. Infrastructure and operations leaders should leverage public cloud infrastructure as a service to reduce their data center server backup footprints.
Tags : 
iaas, backup, recovery, cloud, infrastructure, data center
    
Carbonite
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Epicor     Published Date: Nov 07, 2017
Enterprise resource planning (ERP) software is the backbone of modern manufacturing information systems, enabling the digital transformation that’s changing operations and customer expectations. As the movement toward a digital workplace evolves, your ERP system must keep pace. Epicor commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) of deploying Epicor ERP. Several manufacturers using Epicor ERP found: • Faster access to data and improved real-time visibility enabled better decision-making • Improved multi-company operational efficiency • Increased competitiveness with faster turnaround of customer quotes and improved pricing accuracy • Increased versatility with the Epicor ERP cloud offering • Access to deep expertise in manufacturing best practices Read the study to find out how else Epicor ERP has helped manufacturers.
Tags : 
    
Epicor
Published By: Juniper Networks     Published Date: Aug 08, 2017
Mainstream enterprises should start taking advantage of the new capabilities being delivered by software-defined networking architectures. This research identifies a pragmatic roadmap for infrastructure and operations leaders to leverage the benefits associated with SDN.
Tags : 
    
Juniper Networks
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
    
Oracle HCM Cloud
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The pressures of speed, efficiency, and cost will push more applications and data outside the trusted network and into a service provider’s clouds, where those benefits can be realized. The growth of cloud services and movement of sensitive data between private and public clouds means that those services will become increasingly valuable as targets of attack. As enterprises cloud-enable their operations, gaps in control, visibility, identity, and security are the most likely paths to data breaches. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, optimization, speed, efficiency, costs, applications, data, services, sensitive data
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The foregoing use cases—all with varying levels of complexity—are an overview of the creative development opportunities afforded by OpenDXL. We hope these have inspired you to start your own OpenDXL project. Bookmark and explore these pages for core resources. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
opendxl, integrate, orchestrate, expedite, security, operations
    
McAfee EMEA
Published By: UPS     Published Date: Sep 28, 2017
This series explores the role of modern digital technology in the evolution of manufacturing production, defined here as the value chain of internal and external contributors to the manufacture and delivery of products. Each chapter is designed to help operators visualize how they can build-out production of the future, and how to leverage help from the value chain to make faster progress.
Tags : 
manufacturing production, digital supply chain, smart operations, digital transformation, industrial internet of things
    
UPS
Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap
    
SAP
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence
    
ASG Software Solutions
Published By: Red Hat     Published Date: Nov 08, 2017
Industry-leading organizations are now exploiting interoperable business process management (BPM) and mobile application platforms (MAPs) so that process-oriented mobile applications can help transform the way they do business. This paper examines the phenomena driving this trend, and the common approaches to digital transformation that contribute to the enterprise in motion. Read this analyst paper from 451 Research to learn more.
Tags : 
business process management, mobile application platforms, digital transformation, customer experience, adaptive business operations
    
Red Hat
Published By: Alcatel-Lucent     Published Date: Sep 30, 2009
Ensuring the reliability and efficiency of your data center operations requires a strategic partner that is qualified to minimize energy usage, reduce costs, and optimize space utilization, helping you meet critical business initiatives.
Tags : 
alcatel lucent, power, cooling, eco-sustainability, modular cooling, crac, opex
    
Alcatel-Lucent
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: AlienVault     Published Date: Oct 20, 2017
Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook! You'll get an in-depth look at how organizations with limited resources can set up a successful operations center for monitoring, detecting, containing, and remediating IT threats across applications, devices, systems, networks, and locations. The chapters you'll read focus on: • The roles and responsibilities involved in a security operations team • The key processes you'll need to build a security operations center • The essential security monitoring tools needed for a fully functional security operations center • How threat intelligence is used in a security operations center • Real world examples of how organizations have used AlienVault USM to power their security operations center For many organizations (unless you work for a large bank), building a SOC may seem like an impossible task. With limited resources (time, staff, and budget), setting up an operations center supported b
Tags : 
    
AlienVault
Published By: SAP     Published Date: Feb 03, 2017
As the global business world shifts to all digital, real-time operations, the legacy two-tier ERP architecture so many businesses have relied on to bridge headquarters with subsidiaries can no longer compete effectively. A simple and comprehensive answer exists in SAP S/4HANA. Available in cloud and on-premise, SAP S/4HANA gives organizations the ability to utilize the same product family across a multi-tier deployment.
Tags : 
    
SAP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.