business impact

Results 151 - 175 of 612Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jun 09, 2015
Freeform Dynamics Executive Briefing Guide - Orchestrating the DevOps Tool Chain: An enterprise-level approach to continuous delivery. Dale Vile says that business stakeholders are increasingly looking for faster and more frequent delivery of high-impact, high-quality output from IT teams. DevOps is an approach designed to enable the rapid and continuous delivery of value to the business to support the needs of the digital world, he adds. Open source software tools can help organizations adopt this DevOps approach but can cause efficiency, complexity and scalability issues, so Dale believes it is helpful to create a consistent orchestration layer using an enterprise class release automation solution.
Tags : 
     CA Technologies
By: Capita     Published Date: Jun 26, 2019
Connectivity is the beating heart of today’s enterprise – critical to its very survival. The key metric of its strength or weakness is ECG: Enterprise Connectivity Grading, and the effects of an unhealthy one will be felt in every corner of the business. Download the infographic and discover how; the key warning symptoms that may be signalling that your ECG isn’t on the pulse, and the wide-ranging ripple effect that could be having as its impact radiates outwards. Learn more>>
Tags : 
     Capita
By: Oracle     Published Date: Sep 24, 2015
The Business Impact Of Marketing Maturity In The Age Of The Customer
Tags : modern marketing, forrester report, becoming a modern marketer
     Oracle
By: bChannels     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
     bChannels
By: Intel     Published Date: Aug 26, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
     Intel
By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : network management, network
     HP - Enterprise
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
     BMC Software
By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: FinancialForce     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
     FinancialForce
By: Juniper Networks     Published Date: Jul 31, 2019
The Security Operations Center (SOC) is the first line of defense against cyber attacks. They are charged with defending the business against the many new and more virulent attacks that occur all day, every day. And the pressure on the SOC is increasing. Their work is more important, as the cost of data breaches are now substantial. The Ponemon Institute’s “2017 Cost of Data Breach Study” says the average cost of an incursion is $3.62 million. The study also says larger breaches are occurring, with the average breach impacting more than 24,000 records. And with new regulations such as the EU’s General Data Protection Requirement (GDPR) putting stiff financial penalties on breaches of personal data, the cost of a breach can have material impact on the financial results of the firm. This trend toward increasingly onerous statutory demands will continue, as the U.S. is now considering the Data Privacy Act, which will bring more scrutiny and accompanying penalties for breaches involving
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Quick Base     Published Date: Dec 18, 2017
IT leaders are in a tough spot. Business leaders need help improving processes, but IT needs to focus resources on its own mission-critical innovation projects. Over the past 18 months IT backlogs have risen by 29%, resulting in growing tensions between IT and the business. Across industries, IT leaders are increasingly turning to no-code application development to free themselves from the burden of the backlog. In this 30-minute webinar, Adam Hoover, Solutions Engineer at Quick Base, Inc. will discuss how a no-code application development platform can enable you to drastically reduce your backlog and keep your team focused on the projects that have the greatest impact. He’ll cover how to identify partnership opportunities between the business and IT – and share three effective models for working together while maintaining high quality across the IT ecosystem.
Tags : 
     Quick Base
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: Monetate     Published Date: Oct 12, 2018
Product recommendations are a proven way for marketers to drive sales, boosting the revenue potential of every shopping experience and increasing customer engagement overall. However, most current recommendations tools have not kept up with the level of personalisation that customers have come to expect, and they often fall short of the precision that marketing teams need to create meaningful business impact. It may be time to reevaluate whether your solution is doing all it can to meet the needs of your customers and your team.
Tags : product, recommendation, solution, customer, experience, monetate
     Monetate
By: ServiceNow     Published Date: Oct 22, 2018
A single outage can be the thread that causes business services to unravel. Can you quickly identify the root cause of an outage and its impact on your business? See how ServiceNow helps customers seamlessly connect their IT infrastructure to transform the customer experience for business stakeholders.
Tags : business, service, operations, insights, servicenow
     ServiceNow
By: ServiceNow     Published Date: Mar 13, 2019
A single outage can be the thread that causes business services to unravel. Can you quickly identify the root cause of an outage and its impact on your business? See how ServiceNow helps customers seamlessly connect their IT infrastructure to transform the customer experience for business stakeholders.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: Mar 13, 2019
IT asset data that is complete, current across its lifecycle, accurate, and useful is required for running IT as a business. This is only possible when all the disparate data sources are brought together for a unified understanding on a single, rationalized basis. See the changing role of ITAM policy, process, technology, function, and its impact to your business with this white paper.
Tags : 
     ServiceNow
By: ServiceNow     Published Date: Oct 24, 2019
IT asset data that is complete, current across its lifecycle, accurate, and useful is required for running IT as a business. This is only possible when all the disparate data sources are brought together for a unified understanding on a single, rationalized basis. See the changing role of ITAM policy, process, technology, function, and its impact to your business with this white paper.
Tags : servicenow, itam, lifecycle, data, technology
     ServiceNow
By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
     Splunk
By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 01, 2019
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Attunity     Published Date: Feb 12, 2019
Read this checklist report, with results based on the Eckerson Group’s survey and the Business Application Research Center (BARC), on how companies using the cloud for data warehousing and BI has increased by nearly 50%. BI teams must address multiple issues including data delivery, security, portability and more before moving to the cloud for its infinite scalability and elasticity. Read this report to understand all 7 seven considerations – what, how and why they impact the decision to move to the cloud.
Tags : cloud, business intelligence, analytics, cloud data, data lake, data warehouse automation tools, dwa, data warehouse, security and compliance, data movement, hybrid cloud, hybrid cloud environment, cross-platform automation, portability
     Attunity
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
     F5 Networks Singapore Pte Ltd
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com