business technology

Results 576 - 600 of 1233Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Feb 13, 2018
Today’s customers want something different. They want a real experience. The kind that is memorable because a business actually knows them. Connecting in this powerful way takes the right marketing technology, understanding, and follow through. See why we have the highest position for our Completeness of Vision and Ability to Execute in Gartner’s 2017 Marketing Quadrant for Digital Marketing Hubs.
Tags : 
     Adobe
By: Adobe     Published Date: Feb 13, 2018
Today’s customers want something different. They want a real experience. The kind that is memorable because a business actually knows them. Connecting in this powerful way takes the right marketing technology, understanding, and follow through. See why we have the highest position for our Completeness of Vision and Ability to Execute in Gartner’s 2017 Marketing Quadrant for Digital Marketing Hubs.
Tags : 
     Adobe
By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
     Red Hat
By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
     Red Hat
By: Red Hat     Published Date: Jun 19, 2019
Business success is increasingly based on your ability to react to change. As new disruptive players enter markets and technology upends what consumers expect, organizations increasingly need to change plans in much shorter cycles than ever before. Modern software architectures and processes can make organizations more effective at dealing with this change and emerging as winners in their markets. A new architectural framework called agile integration brings together three important architectural capabilities: containers, distributed integration, and application programming interfaces (APIs). This framework addresses how these key capabilities promote agility and power new processes within your organization to create competitive advantage. Industries like travel and hospitality have been transformed by new ways of doing business—new services are now offered, and consumers interact with services differently. This trend of disruptive change is extending across other major industries—from
Tags : 
     Red Hat
By: BMC ASEAN     Published Date: Dec 18, 2018
Digital transformation encompasses both technological and human components. While many initiatives focus on ensuring that a company’s multi-cloud infrastructure is agile enough to meet changing demands around cloud mobile, Internet of Things (IoT), and big data, it’s equally important to empower business workers with the modern digital tools they need to be successful today. Artificial intelligence and machine learning can play a vital role on both of these fronts. In fact, 78 percent of CIOs and senior IT leaders are already looking to AI to address complexity,1 and by 2019, 30 percent of IT service desks will utilize machine learning to free up support capacity.2 The magnitude of change has forced companies to take stock of the experience they offer employees. As digital natives3 enter and advance in the workforce, talent retention is now a top priority. These workers expect to have the best tools; 93 percent of millennials cited modern and up-to-date technology as one of the most
Tags : 
     BMC ASEAN
By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
     Blue Prism
By: ttec     Published Date: Jul 24, 2019
Fraud prevention and content moderation take center stage. Trust & Safety is good business Change your password often. Keep your virus software up to date. Beware of so-called princes from Nigeria. These are the costs of doing business online. Since its inception, the internet has always had its share of bad guys. And as nearly all companies move to a more digitally enabled world, the thieves, con artists, and hackers are finding new ways to steal money, information, and disrupt the world in a bad way. Having a trustworthy and safe brand is now a differentiator, especially from companies that operate primarily online. But it’s becoming harder to keep up as technology advances and information moves quicker every day. This eBook details how companies can protect their brand and keep customers safe by enabling fraud prevention and content moderation strategies and tactics.
Tags : 
     ttec
By: Workday UK     Published Date: Apr 25, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle – especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday UK     Published Date: Apr 25, 2019
HR can do more for your organisation than just day-to-day tasks. In fact, many of your peers are using it to help achieve growth goals and other business objectives. This eBook explores how technology can transform HR into a more strategic partner for the whole organisation. Read now.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: KPMG     Published Date: Jul 03, 2019
Business growth. Everyone wants it, but only a few achieve it on a sustainable basis in today’s uncertain climate. This expert guide explores the key pathways that are essential junctures in any business’s growth journey, and shines light on the personal stories and key decisions from the CEOs who have been there and done it. The report offers practical guidance to private businesses from multi-generational family and Private-Equity backed businesses through to owner-managed and fast-growing scale-ups. Read this report to understand: •Going Global: how to navigate and launch an international business •Acquisition: how to identify the right target, assess its value and oversee a successful integration •Innovation and technology: how to enable innovation to flourish and how to harness the power of technology to accelerate your business •Team: how to ensure you have the right people and skills to take your business to the next stage •Investment: how to secure the right type of fund
Tags : 
     KPMG
By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network, network infrastructure, infrastructure, application workload, application delivery, application delivery controllers, adc, platform, platforms, data center
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 21, 2014
Applications are the lifeblood of any business. If you spent time or budget to develop or acquire an application, then it’s important—and it should work. However, tectonic shifts in technology are making it increasingly difficult to achieve this simple objective. Today, the majority of applications are accessed via the web and cloud become the preferred application development platform. Against this backdrop of change, the sheer volume of applications is staggering. Given these rapid, drastic changes, organizations are left to grapple with how to deliver applications in a secure, timely, and reliable manner. Read this whitepaper to learn how your business can tackle this feat by implementing a new architectural vision for delivering application services.
Tags : f5 networks, f5 synthesis, applications, constraint, application performance, application development, application development platform, cloud, mobile, application deployment, application delivery, networking, platforms
     F5 Networks Inc
By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
     Cherwell Software
By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : cloud, cloud computing, hybrid environment
     F5 Networks Inc
By: Cisco     Published Date: Nov 17, 2015
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : cisco, connected factory, internet of things, iot solutions, data management, convergence, business process management, data integration, data analytics, networking, it management
     Cisco
By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
     Amazon Web Services
By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure, uc solutions, mobility solutions, cloud solutions, enterprise business solutions, data center cloud service, it disaster recovery, network services, video collaboration
     Black Box
By: Brother     Published Date: Nov 23, 2015
Brother conducted a series of interviews with value-added resellers (VARs) that work closely with businesses to select the right technology solutions. These VARs have a unique understanding of how IT professionals think; as a result, they have witnessed many missteps that have led to “less than optimal” IT technology integrations. What follows are five common - yet significant - mistakes identified during these discussions.
Tags : it management, brother, productivity, cost reduction, value-added resellers, technology integration
     Brother
By: Vendor Guru     Published Date: Dec 21, 2007
Managing customer relationships profitably is a challenge many businesses face. Increasingly available information and customer choices translate into a decrease in automatic loyalty. New distribution and communication channels create more complex customer interactions. Implementing powerful technology enablers may be prohibitively expensive for many firms.
Tags : crm, customer relationship management, crm solution, crm software, loyalty, customer loyalty, customer satisfaction, customer interaction, profitability, vendorguru, vendor guru, quinstreet, vendor guru general campaign
     Vendor Guru
By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product, direction, sedna, 6.0, .net, web services, soa, service oriented arthitecture, architecture, tier, flexibility, usability, future
     Pivotal CRM
By: Entrust Datacard     Published Date: Jul 21, 2014
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities.
Tags : cybersecurity, small and medium businessess, technology, protect, smbs, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
     Entrust Datacard
By: F5 Networks Inc     Published Date: Jul 08, 2009
New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.
Tags : big-ip, big-ipv10, resource, functionality, domain, administrative, application, function, investment, delivery, solution, business, technology, roi, management, enterprise applications
     F5 Networks Inc
By: HP Data Center     Published Date: Feb 18, 2009
Today's data centers are embarking down a path in which "old world" business, technology, and facility metrics are being pushed aside in order to provide unparalleled service delivery capabilities, processes, and methodologies. The expectations derived from today’s high-density technology deployments are driving service delivery models to extremes with very high service delivery capabilities adopted as baseline requirements within today’s stringent business models. Part of the "revolution" that is driving today's data center modeling to unprecedented high performance and efficiency levels is the fact that computer processing advances with regard to high-performance and smaller footprints have truly countered each other.
Tags : hp data center, data center enfironment, high density computing, rack-mount servers, mep mechanical, electrical, and plumbing, virtualization, consolidation, it deployments, server consolidation, networking, storage
     HP Data Center
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com