sla

Results 126 - 150 of 515Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 03, 2015
This SlashGuide discusses the results of a recent Slashdot Media survey that looks at the challenges facing developers today, how the primary development target is evolving, and how strategies are changing to embrace public, private, and hybrid-Cloud models. Respondents to the survey were asked four questions regarding their challenges in development and their needs regarding infrastructure and PaaS. Here are the results.
Tags : hybrid cloud targets, multiple mobile platforms, slashdot media, primary development targeting, it management, enterprise applications, data management
     IBM
By: Thawte     Published Date: Oct 05, 2015
Wenn Sie Ihr Unternehmen und Ihre Kunden vor Angriffen schützen wollen, sollten Sie mit Wissen gewappnet sein. Das ist jedoch nicht einfach, denn die sich ständig ändernde Bedrohungslage und die kontinuierliche Weiterentwicklung der Abwehrmaßnahmen sind der perfekte Nährboden für Missverständnisse. In unserem Leitfaden können Sie nachlesen, was tatsächlich hinter den 10 hartnäckigsten Gerüchten über die Website-Sicherheit steckt.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: Juniper Networks     Published Date: Jan 11, 2016
Sicherheit im Rechenzentrum ist eine der wichtigsten Prioritäten für Unternehmen. Laden Sie sich dieses IDC White Paper herunter, um einen topaktuellen, umfangreichen Einblick in die Themen zu erhalten, von der Bedrohungslandschaft bis hin zu Vorhersagen sowie aktuellen Lösungen.
Tags : 
     Juniper Networks
By: Datalink     Published Date: Aug 21, 2009
This white paper provides: An objective approach to making decisions about data recovery technologies. (disk-based enhanced data recovery or traditional tape-based) The disk-based architectures for enhanced data recovery.
Tags : data recovery, disaster plan, data backup, disaster recovery, tape backup, disk backup, disk-based, tape-based, sla, service level, service-level, datalink
     Datalink
By: DocuSign     Published Date: Aug 16, 2016
Introduction Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This document provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
     DocuSign
By: Act-On     Published Date: Apr 20, 2015
One of the most heavily debated topics in today's digital marketing circles is whether or not success on social media translates to a bump in search ranking in the major search engines.
Tags : act-on, seo, search engine, search ranking, social, marketing
     Act-On
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
That’s why we’ve taken some of the old business preconceptions – whether service specific or not - ripped them up and rewritten five new business rules, designed to debunk some time-honoured myths and help you and your organisation take a leap towards that much-feted goal of customer centricity. Read on for the new rules we recommend, maybe take those and mix them with your own, why not share them @OracleCX? At a minimum we hope these new ways of looking at business will help provoke the questions you, and others, need to ask of your organisation – in fact, we’ve included key questions that will help provoke some conversations, so you can start to build a picture of what’s going well and where there may be room for more discussion and investigation.
Tags : customer service, customer behavior, sla, service metrics, business outcomes, vision for delivery, digital customer
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Cisco     Published Date: Dec 21, 2016
This study showed that as companies adopt cloud strategies for sourcing and building IT services, they are both expecting and achieving significant gains in business key performance indicators (KPIs) including revenue growth, strategic IT budget allocation, IT costs, quicker time to provision, and increased ability to meet SLAs. Further, our study showed that as businesses increased their orientation to cloud, these KPI benefits accelerated. IDC has identified five stages of cloud maturity: ad hoc, opportunistic, repeatable, managed, and optimized (in increasing maturity), and while there are immediate benefits from moving even from ad hoc to opportunistic, the benefits accrue and grow as you move up the adoption curve. Organizations studied are realizing $1.6 million in additional revenue and $1.2 million in reduced costs per cloud application.
Tags : 
     Cisco
By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract, transform, load, spatial analysis, operational data stores, ods, spatial data, etl, cdi, point of sale, retail floor space management, rfsm, alteryx
     SRC,LLC
By: MuleSoft     Published Date: Apr 15, 2019
The healthcare industry has been affected by disruption and the need for healthcare innovation. Legislative, market, and technology pressures make it imperative for healthcare organizations — including hospitals and health systems, payers, and life sciences companies — to become more agile. IT teams in the industry are considering a microservices-based architecture as a means of accelerating healthcare innovation and increasing project delivery speed. MuleSoft research suggests that application development productivity increases of up to 10x are possible. Healthcare specifically stands to benefit from this architectural paradigm. This whitepaper will address: Why microservices matter for healthcare IT teams and for healthcare innovation Design principles for a microservices architecture How Anypoint Platform can help you implement microservices best practices
Tags : 
     MuleSoft
By: Mimecast     Published Date: Oct 02, 2018
Informationen zur aktuellen Bedrohungslage, zu fehleranfälligen Schutzmechanismen und zu menschlichem Versagen –und wie eine Cyber Resilience Strategie Sie vor Cyber Angriffen schützt.
Tags : 
     Mimecast
By: IBM     Published Date: Jul 08, 2015
For years, organizations have recognized that a better understanding of customers can translate to more sales, increased customer satisfaction and reduced customer churn. Initiatives focused on a 360-degree view of the customer have gone a long way toward providing those benefits by synthesizing customer profiles, sales history and other structured data from multiple sources across the enterprise. But today, customer-centric organizations are discovering that there is more opportunity for growth when they enhance that 360-degree view with information from more sources, both within and beyond the enterprise (see Figure 1). Information in email messages, unstructured documents and social media sentiments—previously beyond reach—is now extending the 360-degree view.
Tags : ibm, e360, customer satisfaction, customer retention, sales history, big data, it management, enterprise applications
     IBM
By: AtTask     Published Date: Apr 29, 2013
Work chaos comes in many forms: random input processes, disconnected activities, poor visibility into work and more. Read this eBook: "How to Slay the Dragon of Enterprise Work" and learn how slaying the work chaos dragon will help you simplify your processes, connect team members, save time and money, and more. Get the eBook today.
Tags : cross-project team insight, enterprise project management, gantt chart, it project, online project management, ppm, project collaboration, project management, project visibility, resource management, task management, team member accountability, time tracking software, workflow software, resource planning, capactiy planning, portfolio management, productivity, work management, project portfolio management
     AtTask
By: Workday Netherlands     Published Date: Apr 30, 2019
Bent u een finance leader die wil zorgen voor een digitale inhaalslag? We hebben aan de hand van inzichten van 650 internationale finance leaders dit rapport opgesteld met de topprioriteiten voor financiële transformatie en een waardevol stappenplan om de functie van finance een nieuwe definitie te geven. Nu het rapport downloaden.
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday Netherlands     Published Date: May 21, 2019
Bent u een finance leader die wil zorgen voor een digitale inhaalslag? We hebben aan de hand van inzichten van 650 internationale finance leaders dit rapport opgesteld met de topprioriteiten voor financiële transformatie en een waardevol stappenplan om de functie van finance een nieuwe definitie te geven. Nu het rapport downloaden.
Tags : 
     Workday Netherlands
By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : security, metrics, business metrics, security management, information management, aligning, alignment, business integration, preventsys
     Preventsys
By: Mimecast     Published Date: Jul 15, 2019
The Mimecast Supervision solution enables compliance personnel to systematically review and discover targeted data among the volume of communications organizations face today. Integrated with the industry leading Mimecast Cloud Archive, users can facilitate an auditable, managed supervision review process, flexible to meet the needs of the business while utilizing a scaleable, immutable SEC 17A-4 validated and tamper proof archive with guaranteed 7 second SLA search capabilities. To reduce the number of false positives in sampling data, targeted detection rules can focus on specific senders/recipients and to accelerate the process. In addition, queues can be configured with an upper limit upon which to be populated with email. This helps limit the amount of email a reviewer must go through while still identifying risk. Today’s supervision demands require reviewers to be highly productive.
Tags : 
     Mimecast
By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : network security, it security, firewall, resource optimization, security management
     McAfee
By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungen sind wertvolle Tools für Unternehmen aller Größen. Sie ermöglichen Kunden die Kommunikation mit Kunden, Interessenten, Mitarbeitern, Partnern und anderen IT-Systemen. Webanwendungen sind naturgemäß offen, interaktiv und stets zugänglich. In ihrem Bericht beleuchten die Analysten von Frost & Sullivan, welche Anbieter von Web Application Firewalls (WAF) es gibt, wie die aktuelle Bedrohungslage für Webanwendungen aussieht und wie die Anbieter diesen Bedrohungen durch Skalierung entgegentreten.
Tags : 
     Akamai Technologies
By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformación de la TI es un concepto que ahora resulta aún más atractivo para las empresas que hace 12 meses. Aunque este término no es sinónimo de la transformación digital, los dos conceptos están estrechamente vinculados, porque una transformación digital eficaz no puede ocurrir sin la transformación de la TI. Una empresa que transforma su infraestructura de TI ya no tiene que depender de tecnologías existentes rígidas, manuales y en sistemas aislados. Observa un aumento en la velocidad operacional, la eficiencia, la escala y la rentabilidad de la TI, ya que se automatizan las tareas, se optimizan los procesos y se liberan los recursos. Esas mejoras en el nivel de la TI impulsan una transformación digital de mayor escala, lo que permite que la empresa prospere en la economía digital actual. Puede superar a la competencia en innovación, mentalidad y avances, lo que en última instancia le permitirá convertirse en una empresa innovadora en lugar de sufrir interrupciones. Obtenga
Tags : 
     Dell EMC Storage
By: DocuSign     Published Date: Apr 12, 2017
Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This whitepaper provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
     DocuSign
By: Keynote Systems     Published Date: Mar 25, 2011
Learn about the challenges of monitoring web application performance in increasingly complex cloud application ecosystems
Tags : cloud, apm, service level agreement, sla, performance, monitoring
     Keynote Systems
By: GFI     Published Date: Sep 04, 2008
Today, more than ever before, legal and compliance issues are driving the case for email archiving. Email archiving legislation is complex and varies greatly from country to country. Unless companies are well versed in compliance law, the various regulations affecting email can be a minefield.
Tags : gfi, sox, sox compliance, sarbox, sarbanes oxley, sarbanes-oxley, compliance, email, email archive, email archiving, archiving, archive, storage
     GFI
By: Mimecast     Published Date: Sep 30, 2008
Infrastructures of potentially dozens of servers have built up around corporate email systems to provide better governance, reduced risk and improved legislative compliance - anti-virus, anti-spam, attachment handling, encryption, disclaimers, archiving and hot-standby mail servers to name a few.
Tags : mimecast, saas, software as a service, email archive, cpr, email evidence, ediscovery, medium-size business, esg, storage
     Mimecast
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
     Trend Micro SaaS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com