request

Results 1 - 25 of 183Sort Results By: Published Date | Title | Company Name
Published By: Cherwell Software     Published Date: Feb 24, 2017
Are you ready to transform your service desk and unleash the power of effective and affordable IT service management? Schedule your demo of Cherwell Service Management® today.
Tags : 
    
Cherwell Software
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection, anti spam, anti spyware, anti virus, internet security, security management, web service security, data protection
    
ESET
Published By: Dell EMC     Published Date: Aug 17, 2017
Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. We found that the Dell EMC™ VxRail™ P470F hyperconverged system with VMware® vSAN™ could allow you to do more database work than the HPE Hyper Converged 380 (HC 380) with StoreVirtual VSA. The four-node Dell EMC solution processed more orders with faster response times, so more users can fulfill requests quicker—whether they’re placing orders in a store, accessing databases of client info, or adding to company records.
Tags : 
database, database solution, hyperconverged system, database performance, database optimization
    
Dell EMC
Published By: ServiceNow     Published Date: Oct 02, 2015
ServiceNow ExpressSM brings together all the great features you need to address these common IT Service Management challenges and more. • Revolutionize request management with a self-service portal and automated routing • Track assets centrally though an integrated CMDB across all IT processes • Make reporting timely and informative with one-click reporting, dashboards and gauges
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 02, 2015
Only ServiceNow Express delivers all this as one enterprise-grade cloud service— designed to solve IT service management challenges for enterprises of all sizes. The 3 Pillars of IT Service Management Excellence arE: • Automated Request Management • Integrated Asset Tracking • Intuitive Reporting
Tags : 
    
ServiceNow
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Pega     Published Date: Aug 12, 2016
Today’s banks are facing enormous pressures that include regulatory requirements, hefty penalties, increasing customer service demands, and ferocious competition from other financial institutions rapidly embracing customer-centric technology. Despite these challenges, banks can’t afford to scale down any efforts to ensure the highest standards of customer service
Tags : 
pega, customer service, finextra, service requests, inquiry handling
    
Pega
Published By: Hyland Software     Published Date: Jun 16, 2016
Fueled by new technologies, expanding regulations and greater patient expectations, there’s a clinical content gold rush in the healthcare market. Sources and types of clinical content grow at an exponential rate and through increasingly refined input methods, including voice and improved OCR, clinicians capture more unstructured information about their patients than ever before. Making all clinically relevant content available together, in one place seems like a simple request. Must the response be so complex?
Tags : 
healthcare, technology, solutions, best practices, business management, process management, analytics, content management
    
Hyland Software
Published By: Sage EMEA     Published Date: Jan 29, 2019
Ready to work faster, simpler, and more flexibly? Now you can. With today’s technology advancements, there’s no need to settle for less when it comes to your enterprise management solution. And now, with the introduction of Sage Business Cloud, you can future-proof your business with the only management solution you’ll ever need. Sage Business Cloud enables you to come onto the platform at any stage of your business and allows you to grow over time by adding new products as you need them. These include core cloud products across accounting, financials, enterprise management, and HR, as well as a thriving ecosystem that draws from more than 200 ISVs. Request a business review and discover how the right enterprise management solution can help you manage growth, improve efficiency, make smarter decisions, and reduce IT cost and complexity.
Tags : 
    
Sage EMEA
Published By: Oracle     Published Date: Aug 09, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
As an HR leader, what keeps you up at night? Is it meeting your executives’ demands for a greater contribution to the company’s strategic vision? Is it the requests to cut operational costs while simultaneously increasing efficiency? Most likely it’s the daunting combination of the two. HR success today means: • Streamlining core HR processes to eliminate waste and increase staff productivity • Ensuring that your talent strategy aligns with company goals and drives bottom line success • Investing in the right technology to ensure both local agility and global scalability
Tags : 
oracle hcm, enterprise applications
    
Oracle
Published By: Pega     Published Date: May 24, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity, networking, knowledge management, enterprise applications
    
Akamai Technologies
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat, database development, web development, software compliance
    
Red Hat
Published By: SolidFire_NetApp     Published Date: Oct 10, 2016
With increasing demands being made on enterprise IT departments to keep up with the accelerating pace of business, infrastructure has to enable more dynamic, eficient application and IT service delivery. Unfortunately, more ofen than not, IT provisioning can be a bottleneck. Traditional means are ofen ineficient. When developers plan their projects and estimate the server, networking, and storage resources they need, they ofen overestimate and pad their requests to ensure what actually gets provisioned is adequate. The formal request comes via an IT ticket, and then the waiting begins. Days, possibly weeks go by before they get the resources they need, and all the while they’re unable to iterate on and evolve core business oferings.
Tags : 
    
SolidFire_NetApp
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Published By: Red Hat     Published Date: Nov 30, 2015
FICO, a financial services provider, wanted to address small-to-medium business (SMB) and midmarket customer requests for solutions without on-premise installation. To transition from an on-premise model to a cloud- and services-based infrastructure, FICO chose to build an OpenStack® cloud using Red Hat® solutions, including OpenShift by Red Hat and Red Hat Enterprise Linux® OpenStack Platform. As a result, FICO generated US$10 million in sales to new customers, reduced solution time to market by 50%, and lowered storage and overall infrastructure costs.
Tags : 
fico, smb, customer requests, enterprise applications
    
Red Hat
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security, risk management
    
Akamai Technologies
Published By: Staples Business Advantage     Published Date: Oct 13, 2016
Do you have days when you think everyone in the office is trying to drive you nuts? Last-minute requests piling up? Well, hang this list on the refrigerator in the breakroom. They’ll get the point.
Tags : 
office, breakroom, management, teamwork, etiquette, management fundamentals, training and development
    
Staples Business Advantage
Published By: Mirador     Published Date: Jul 18, 2016
Over the last several years, marketplace lenders have popped up to fill this significant gap between small business borrowers and access to credit. They typically offer fast approval turn-around – delivering requested funds in hours or days vs. weeks.
Tags : 
    
Mirador
Published By: Pure Storage     Published Date: Nov 02, 2017
FlashBlade fabric modules implement a unified network that connects all blades to each other and to the data center network. With full connectivity, all blades can serve as client connection endpoints, as authorities that process client requests, and as storage managers that transfer data to and from flash and NVRAM.
Tags : 
storage systems, network, hardware components, architectural, storage software, integrated software
    
Pure Storage
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.