capabilities

Results 176 - 200 of 1661Sort Results By: Published Date | Title | Company Name
By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : sap, best practices, business intelligence, analytics strategy, technology
     SAP
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : security, best practices, web services, amazon, workload, aws, data centers, enterprise
     Evident.io
By: Workforce Software     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
     Workforce Software
By: WFS Australia     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
     WFS Australia
By: IBM APAC     Published Date: Nov 22, 2017
Using IBM Watson’s cognitive capabilities, companies can quickly differentiate their customer service quality by being more pro active and responsive to customer needs. Simply put, chatbots and virtual agents are the future of customer interactions. Building apps from scratch that incorporate natural language processing, speech to text recognition, visual recognition, analytics, and artificial intelligence requires broad expertise in these disciplines, large staffs, and a huge financial commitment. Making use of IBM Watson cognitive services brings these capabilities in-house quickly and without the capital investment that would be needed to develop the technologies within an organization.
Tags : decision making, deeper data, insights, cognitive, analytics, ibm, watson, virtual agents
     IBM APAC
By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement, enterprise applications
     CA Technologies
By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : email, mobile, collaboration, smartphone, tablets, productivity
     Citrix
By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform
     ColdSpark
By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development
     IBM
By: Interactive Intelligence     Published Date: Feb 14, 2012
In the insurance industry, call centers have become increasingly sophisticated in terms of their business capabilities and enabling technologies.
Tags : 
     Interactive Intelligence
By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : data security, ibm, converged network security, security risk, networking, security, it management, data management
     IBM
By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.
Tags : network management, network security, enterprise management, security technology, converged security systems, application protocols
     IBM
By: SAS     Published Date: Nov 04, 2015
Big data evolution: forging new corporate capabilities for the long term is an Economist Intelligence Unit report, sponsored by SAS. It explores how far along companies are on their data journey and how they can best exploit the massive amounts of data they are collecting.
Tags : sas, big data, big data evolution, economist intelligence unit, eiu, data journey, networking, it management
     SAS
By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
     Collaborative Consulting
By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : mobile security, corporate intranet, blackberry, secure connectivity
     BlackBerry
By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : ibm, blockchain, electronics
     IBM
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
     Group M_IBM Q2'19
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Over the last several years CA Technologies has acquired a number of companies and their respective products, to augment its continuous delivery suite and, especially, its DevTest portfolio. In particular, it has recently acquired Grid-Tools and Rally Software. Bloor Research has been asked to explore how Grid Tools’ products – now known as CA Test Data Manager (formerly Datamaker and CA Datafinder) and CA Agile Requirements Designer (formerly Agile Designer) expand and augment the capabilities provided by CA Service Virtualization (previously iTKO’s LISA) and CA Agile Central (formerly Rally), making the whole greater than the sum of the parts.
Tags : technology, business value, ict investments, research services, consultancy projects, bloor research, continuous testing, testing effort
     CA Technologies EMEA
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
     Group M_IBM Q2'19
By: Red Hat     Published Date: Nov 08, 2017
This BPM.com whitepaper examines the role of business process management (BPM) software in enabling physical things to be connected to digital processes in the context of the Internet of Things (IoT)—exploring both the required capabilities for the next generation of BPM platforms as well as the benefits offered by BPM and IoT.
Tags : digital transformation, digital interface, business process management, internet of things, big data
     Red Hat
By: Bright Computing     Published Date: Nov 29, 2014
Delivering a cost-effective HPC solution to Cisco Unified Computing System (UCS) customers has become easier thanks to Bright Computing. Bright Cluster Manager is a powerful software solution for managing HPC clusters cost-effectively. Cisco UCS is a highly successful integrated server solution that offers a wide range of capabilities from a single vendor. Read more to Learn how these products provide an HPC cluster solution that offers cost-saving features.
Tags : 
     Bright Computing
By: HP AppPulse Mobile     Published Date: Jun 05, 2015
Businesses need a mobile strategy to transform into a digital business. A well-executed strategy will ensure that customers are continually engaged with your firm and employee productivity is optimized via mobile apps. Use this report to understand which core capabilities and features you should look for in a good mAPM solution.
Tags : mobile, applications, customer satisfaction, performance management, mapm, engagement
     HP AppPulse Mobile
By: CDW     Published Date: Apr 04, 2016
Cloud computing is increasingly being adopted as a way for IT organizations to decrease costs, improve efficiency, and enhance business agility. NetApp has been helping companies succeed in cloud deployment to achieve tangible results since long before the term cloud entered the popular lexicon. NetApp has the people, technologies, and partnerships in place to help organizations evolve existing IT infrastructure into an efficient cloud-based service delivery model. The NetApp® Unified Storage Architecture and clustered Data ONTAP® operating system integrate all storage capabilities into a single, easy-to-use platform. By choosing NetApp when making the transition to a private cloud or a hybrid cloud, organizations will be able to meet their storage business needs now and in the future.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW
By: CDW - NetApp     Published Date: Apr 07, 2016
Cloud computing is increasingly being adopted as a way for IT organizations to decrease costs, improve efficiency, and enhance business agility. NetApp has been helping companies succeed in cloud deployment to achieve tangible results since long before the term cloud entered the popular lexicon. NetApp has the people, technologies, and partnerships in place to help organizations evolve existing IT infrastructure into an efficient cloud-based service delivery model. The NetApp® Unified Storage Architecture and clustered Data ONTAP® operating system integrate all storage capabilities into a single, easy-to-use platform. By choosing NetApp when making the transition to a private cloud or a hybrid cloud, organizations will be able to meet their storage business needs now and in the future.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology
     CDW - NetApp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com