as service

Results 4201 - 4225 of 4331Sort Results By: Published Date | Title | Company Name
Published By: Docker     Published Date: Feb 21, 2019
Docker’s Windows Server application migration program is the best and only way to containerize and secure legacy Windows Server applications while enabling software-driven business transformation. With industry-leading Docker Enterprise 2.1 and our best-in-class, industry-proven tools and services specifically designed for Windows Server application migration, customers can quickly and easily migrate and modernize legacy Windows applications while driving continuous innovation across any application, anywhere.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker
Published By: SilverSky     Published Date: Mar 26, 2014
This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.
Tags : 
silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration, security solutions, cloud based email provider, platforms, email security, security management, information management, messaging, email archiving, cloud computing, data center
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.
Tags : 
silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions, email storage, email monitoring, data protection, email service provider, it spending, content delivery, messaging, secure content management, email archiving, cloud computing
    
SilverSky
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla), software development, it management, itil
    
Stratus Technologies
Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection, service provider, springcm, spring cm, it management, enterprise applications, ebusiness, web services, web service security, service oriented architecture, web service management, content delivery, content integration
    
SpringCM
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 25, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, enterprise applications
    
HP Enterprise Services
Published By: Informatica     Published Date: Jul 07, 2011
Build your business case for MDM with an illustrated, step-by-step approach that shows executives and managers how MDM generates a single, reliable data set to empower customer- and partner- facing teams to improve sales, customer service and channel operations.
Tags : 
informatica, master data management, mdm, data set, competitive advantage, channel coverage, customer view, bad data, sales performance
    
Informatica
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube, blog, blogs, wiki, communication, control conversations, reputation management, web 2.0, media channels, collaboration, collaborative, alerts, saas
    
Visible Technologies
Published By: Panasonic Business Mobility Solutions     Published Date: Feb 09, 2017
As vehicles get smarter and connected, service organizations are finding rugged mobile devices are a “must have” in their tool bag to provide roadside emergency service or normal maintenance. Here’s why.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: IBM     Published Date: Jul 20, 2016
Please join us to get answers to those questions and: - Better understand today’s enterprise email market and how to assess the value of different email solutions - Find out why IBM was named worldwide market share leader in enterprise social networks for the sixth consecutive year - Learn why customers who left IBM are coming back - Expand your understanding of IBM’s range of products, solutions and services in this area, including Notes/Domino and Verse
Tags : 
ibm, enterprise social solutions, enterprise email market, ibm social business, engagement social, enterprise applications
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
If a retailer views “Buy Online, Pickup In-Store” as purely e-commerce, they’re losing. Each transaction in which customers pickup in-store is a chance to add value to the relationship. Whether that means speed, cross-selling, or a unique bit of customer service that amplifies the visit, BOPIS plays just as important a role as the rest of the brick-and-mortar experience. Some trips may not translate to additional purchases right then and there, but the way a retailer handles pickup can dictate how the customer feels about the brand. To get the most out of BOPIS, retailers should ask themselves a few important questions.
Tags : 
    
Group M_IBM Q3'19
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security, access control, anti virus, application security, hacker detection, internet security
    
MX Logic
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform purpose-built for heterogeneous multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Aternity     Published Date: Feb 24, 2016
In this brief, the focus will be on how companies are relying on more mobile applications to run their businesses. As these mobile applications become more important, it is critical for companies to ensure a quality mobile user experience in order to deliver quality service to ensure customer satisfaction and brand loyalty. A unified approach to mobile end user experience monitoring is the proven way enterprises can ensure this quality user experience.
Tags : 
aternity, mobile strategy, mobile apm, unified monitoring, mobile applications, brand loyalty, it management, knowledge management, enterprise applications
    
Aternity
Published By: Limeade     Published Date: Mar 25, 2015
It’s easy to get caught up in product functionality when evaluating an employee wellness and engagement solution. Learn five ways to uncover the advantages of a partner that can deliver value on your terms, not theirs, through a different kind of service delivery.
Tags : 
employee engagement, engagement solution, engagement platform, talent management, employee performance, company culture, employee health, employee well-being, rewards and recognition, health screening, data integration, engagement expertise, engagement experts, engagement strategy, human resources
    
Limeade
Published By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : 
real-time payment, p2p payment
    
FICO EMEA
Published By: Infosys     Published Date: May 22, 2018
When the opportunity emerged for one bank to acquire the other, the deal went through as quickly as regulations and compliance requirements would allow. As a result, no integration plans were in place at the time of acquisition. For a long time, the two companies continued to operate separately, albeit under a single name. This was particularly true of the mobile banking experience where two entirely different apps were in use. Since the two companies delivered complementary services, there was an opportunity to cross-sell to customers who might require the services of both; but only if they could deliver a seamless experience. We were invited to tackle the challenge of creating an integrated banking app experience across both companies.
Tags : 
banking, finance, app, technology
    
Infosys
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Lenovo     Published Date: Sep 16, 2014
Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.
Tags : 
vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity, project management, service management
    
Lenovo
Published By: NetProspex     Published Date: May 12, 2014
NetProspex analyzed the success rate of hundreds of email open rates and thousands of phone calls. The statistics proved that trigger-based emails had significantly higher conversion rates, but email sent on optimized days also did well. Download this guide on the best days to send emails.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services, database cleansing, b2b data cleansing, b2b data quality, b2b contact database, business contact database, b2b technology data, global contact list, marketo data quality, eloqua data quality, marketo database cleaning, eloqua database cleaning, marketing data enrichment
    
NetProspex
Published By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure, best practices, business intelligence, cloud computing, infrastructure
    
BMC Software
Published By: CrownPeak     Published Date: Jun 30, 2009
The content management market has exploded in size in recent years with the availability of platforms like Open Source and SaaS giving way to scores of solutions in a variety of sizes and complexities. While companies are spoiled for choice, the unprecedented volume of solutions makes selecting the right content management system (CMS) for an organization an increasingly difficult task. Learn more today!
Tags : 
cms, saas, software-as-a-service, crownpeak, content management system, open source, end-to-end process, collaboration, compliance, media management, it resources
    
CrownPeak
Published By: AppFirst     Published Date: Oct 10, 2013
White Paper: The Need for Application Operations in the Dynamic Data Center and the Cloud.
Tags : 
appfirst, it as a service, cloud computing, cloud, data center, apm, application performance, server monitoring, it management
    
AppFirst
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Start   Previous    160 161 162 163 164 165 166 167 168 169 170 171 172 173 174    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.