adoption

Results 426 - 450 of 915Sort Results By: Published Date | Title | Company Name
Published By: Tricentis     Published Date: Nov 15, 2018
The following maturity model is designed to help you assess your team’s progress on the journey to BDD maturity. This guide will give you a framework for understanding where your team is now on the road to BDD maturity and help you chart a direct course for taking it to the next level. The transition to BDD often comes with significant bumps in the road, but in our experience it is well worth the effort. Teams with mature BDD practices report higher levels of collaboration across functions and also tend to be more advanced in their DevOps release processes. By shifting testing left with BDD, these teams are delivering faster without sacrificing quality. By downloading this ebook, you will learn: o Five BDD maturity levels based on the adoption patterns we’ve seen among our user base and the industry at large o Strategies for achieving the significant process changes that BDD requires, both within and outside the QA team o Where your team is today and the milestones that will get you
Tags : 
    
Tricentis
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: Veeam '18     Published Date: May 07, 2019
Alors que les entreprises accélèrent l'adoption de divers services cloud comprenant les clouds publics, privés et hybrides, la nécessité d’administrer ces environnements multicloud et d’en tirer parti devient critique. Veeam assure la disponibilité de ces environnements en protégeant les données vers, depuis et à l’intérieur des infrastructures multicloud.
Tags : 
    
Veeam '18
Published By: NetApp     Published Date: Jun 16, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : 
netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
    
NetApp
Published By: NetApp     Published Date: Jun 19, 2014
As the amount of data created by organizations grows, efficient management of these resources is becoming increasingly important. Simply retaining data is not enough; effective organizations must be able to leverage their IT and intellectual resources to deliver business value. This Evaluator Group report looks at the popular trend of the adoption of IT as a Service (ITaaS), also known as cloud services. As well as the several technologies needed to deliver ITaaS or Cloud.
Tags : 
netapp, evaluator group, enterprise storage, it as a service, itaas, cloud services, it management, data center
    
NetApp
Published By: Brocade     Published Date: Sep 07, 2010
The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher-education campuses fertile ground for wireless LAN technology.
Tags : 
brocade, wireless lan, open learning, wlan, intrusion protection system, ips, internet security, intrusion detection, intrusion prevention, wireless hardware, wireless infrastructure, wireless security
    
Brocade
Published By: Okta     Published Date: Apr 29, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
mfa, authentication. mobile, applications, okta, security, it management
    
Okta
Published By: Trend Micro     Published Date: May 03, 2018
This whitepaper looks to address the Top 3 challenges your team faces when building in the cloud and what it means for your business. Although the capabilities and cost of select SecOps solutions have kept pace with the widespread adoption of the Amazon Web Services (AWS) Cloud, many organizations try to protect their expanding cloud workloads without the proper support.
Tags : 
    
Trend Micro
Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery, security policies, database security
    
Symantec
Published By: Workday     Published Date: Sep 08, 2015
This paper explores five business trends driving the rapid adoption of SaaS business solutions.
Tags : 
saas, saas business solutions, five businesses trends, hr leaders, hr services, human resources, workforce, why saas, software compliance, service management, benefits, business issues and trends, management fundamentals, technology
    
Workday
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
Sixty-three percent of data breaches involve weak, default, or stolen passwords. Why? To put it simply, password fatigue. Think of all the passwords you keep track of for your personal needs—your mobile banking app, your Gmail, your Facebook account, your Amazon Prime… the list goes on. Best practices tell us that we should use a unique and complex password for every service, but due to increased cloud adoption—enabling anytime access to applications from any device—users lean toward convenient but risky password practices.
Tags : 
    
F5 Networks Inc
Published By: Arcserve     Published Date: Jul 23, 2010
This report is designed to help IT organizations more effectively plan for the adoption of solutions that can help bring together a unified view of IT service performance as it impacts business outcomes. Download now!
Tags : 
ca technologies, ema radar, business service management, bsm, vendor, application performance management, infrastructure manager, service desk, infrastructure, business management, service management, desktop management
    
Arcserve
Published By: NaviSite     Published Date: Sep 02, 2014
This whitepaper is structured for business leaders evaluating enterprise cloud services, and uses real-world customer experiences to examine the business impact of the Cloud.
Tags : 
the full value of the cloud, the business impact of the cloud, cloud adoption, navisite, mobile computing, mobile data systems, mobile workers, cloud computing, virtualization, infrastructure
    
NaviSite
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: ClickExpress     Published Date: May 01, 2013
The path forward is clear: the best practices organizations have already taken the first steps to establish a stronghold with the application of Mobile Workforce Management Solutions. They are already at the vanguard of technology adoption, implementation, and usage. However, as the global services economy continues to expand, all services organizations that expect to compete successfully in their respective market space will need to embrace the state-of-the-art technologies that will allow them to survive – and thrive – in an increasingly competitive marketplace.
Tags : 
stage, practice, service, performance, organizations, management solutions, implementation
    
ClickExpress
Published By: HP     Published Date: Jul 29, 2008
Join IDC and HP on this webcast about Mission Critical Services. Matt Healey of IDC provides insights on the adoption of consolidation, virtualization and Service Oriented Architecture as aggressive strategies to align IT more closely with business goals.
Tags : 
erp, mission critical, itsm, service management, soa, service-oriented, service oriented, enterprise resource planning, service oriented architecture
    
HP
Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway, governance, infrastructure
    
Tideway Systems
Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management, information overload, productivity, integration, pivotal, pivotal crm, quinstreet, application integration, enterprise software
    
Pivotal CRM
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Appian     Published Date: Jun 28, 2010
Leveraging Rapid Process Application Development, Deployment, Adoption and Use for Business Value.
Tags : 
appian, bpm, business process management, process application development, application performance management, business management
    
Appian
Published By: CollabNet     Published Date: Dec 20, 2011
Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption
Tags : 
cloud, development, alm, agile, software development, collaboration, dev team, production, hosting, convergence, .net, c++, database development, java, middleware, open source, software outsourcing, quality assurance, scripting, soap
    
CollabNet
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.