erp

Results 251 - 275 of 7857Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 09, 2015
This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.
Tags : api management, business security, components of api management, api solutions, enterprise level api management
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
     CA Technologies
By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
     Aditi
By: Akamai Technologies     Published Date: Feb 23, 2017
Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago—through VPNs, proxies, and remote desktops—but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.
Tags : enterprise, remote access, vpn, proxies, model
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 27, 2017
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago – through VPNs, proxies, and remote desktops. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : vpn, proxies, security, security breach, technology
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Logicalis     Published Date: Sep 23, 2014
Learn the top considerations for choosing the right cloud partner to help you deliver software-as-a-service.
Tags : logicalis, iaas, saas, vmware, healthcare, enterprise software, cloud partner, cloud services provider, it management
     Logicalis
By: Box     Published Date: Jun 22, 2018
• As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now. • Download the latest AIIM Tip Sheet, 5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy to learn: o Why you should reexamine traditional ECM-defined processes o How to optimize your SaaS processes o Why SaaS should be part of your content management strategy
Tags : 
     Box
By: Polycom     Published Date: Sep 15, 2015
Read this handy infographic to learn about five ways Microsoft Lync and Polycom can bring unified communications and reduce costs for Enterprise Voice.
Tags : communications, skype, polycom, voice
     Polycom
By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications
     Cast Iron Systems
By: Silver Peak     Published Date: Feb 11, 2016
he WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. .
Tags : wan, enterprises, saas, broadband internet, data, connectivity, connection, cloud, technology
     Silver Peak
By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : high availability, disaster recovery, vision, vision solutions, ibm
     Vision Solutions
By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
     OKTA
By: Brainshark     Published Date: Nov 05, 2013
SiriusDecisions identifies five planning assumptions that must drive the agenda of sales enablement executives in the year ahead. From onboarding to demand creation to tackling mobile and social media, discover how to build integration between the marketing, sales, training and operations teams with the new sales enablement organizational model.
Tags : sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing, onboarding sales, sales new hires, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, video marketing
     Brainshark
By: Workday     Published Date: Nov 07, 2017
Wie Workday die Grenzen traditioneller ERP-Systeme überwindet
Tags : 
     Workday
By: Macola     Published Date: Sep 26, 2016
Manual business processes are cumbersome and time consuming, so how do you know when the time is right for your business to upgrade? Download now and consider these five signs.
Tags : exact, exact software, macola, erp, manufacturing, distribution, manufacturing, distribution, enterprise resource planning
     Macola
By: Netsuite     Published Date: Dec 08, 2016
'Read how switching from MYOB has helped Aussie businesses like Atlassian rapidly grow by 200%
Tags : erp, cloud computing, it infrastructure management
     Netsuite
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace, security
     KACE
By: BMC Software     Published Date: Dec 21, 2011
Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service.
Tags : scheduler, enterprise, enterprise workload, automation, bmc, productivity, control
     BMC Software
By: IBM     Published Date: May 08, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : application security, software applications, cybersecurity
     IBM
By: IBM     Published Date: Mar 30, 2016
It is important for healthcare organizations to become data driven. IBM can help organizations leverage a wide range of big data to deliver clinical and financial benefits, and the provide the steps organizations should take to become data driven.
Tags : ibm, healthcare, big data, healthcare analytics, enterprise analytics systems
     IBM
By: Lexmark     Published Date: May 28, 2014
This paper provides the 5 steps to effective MPS assessments.
Tags : lexmark, mps assessments, 5 steps to effective mps assessments
     Lexmark
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com