Share us:
 

erp

Results 276 - 300 of 8234Sort Results By: Published Date | Title | Company Name
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable, applications, servers, storage, model, it management, cloud computing
    
HP
Published By: IBM     Published Date: Dec 11, 2012
You've got a scanner, and you have a lot of paper to manage. Now what? Scanning documents one by one may fall short of modern approaches in terms of efficiency and time. There are plenty of solutions, but which one is right for you?
Tags : 
capture, ibm, file capture, data management, efficiency, time, technology, enterprise applications
    
IBM
Published By: CA Technologies     Published Date: Jan 09, 2015
This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.
Tags : 
api management, business security, components of api management, api solutions, enterprise level api management, access control, application security, application performance management, business activity monitoring
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
    
Aditi
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Most enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago—through VPNs, proxies, and remote desktops—but new and growing realities are forcing enterprises to take a different path. Read this whitepaper to learn five reasons why enterprises need a new access model.
Tags : 
enterprise, remote access, vpn, proxies, model
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Today, enterprises are providing employees and third parties with remote access to their applications in much the same way they did 20 years ago – through VPNs, proxies, and remote desktops. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Logicalis     Published Date: Sep 23, 2014
Learn the top considerations for choosing the right cloud partner to help you deliver software-as-a-service.
Tags : 
logicalis, iaas, saas, vmware, healthcare, enterprise software, cloud partner, cloud services provider, it management, cloud computing
    
Logicalis
Published By: Box     Published Date: Jun 22, 2018
• As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now. • Download the latest AIIM Tip Sheet, 5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy to learn: o Why you should reexamine traditional ECM-defined processes o How to optimize your SaaS processes o Why SaaS should be part of your content management strategy
Tags : 
    
Box
Published By: Polycom     Published Date: Sep 15, 2015
Read this handy infographic to learn about five ways Microsoft Lync and Polycom can bring unified communications and reduce costs for Enterprise Voice.
Tags : 
communications, skype, polycom, voice, wireless communications, telecom
    
Polycom
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had just two choices for their integration needs, complex and expensive platforms like EAI or write custom code. Learn about the "hidden costs" of custom code and discover five reasons why companies are switching to Integration Appliances that use a simple “configuration, not coding” approach to integration.
Tags : 
integration, enterprise application integration, eai, application integration, castiron, cast iron, enterprise applications, business integration, data integration
    
Cast Iron Systems
Published By: Silver Peak     Published Date: Feb 11, 2016
he WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. .
Tags : 
wan, enterprises, saas, broadband internet, data, connectivity, connection, cloud, technology, bandwidth management, storage virtualization, data integration, cloud computing, infrastructure
    
Silver Peak
Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm, backup and recovery, business continuity, as/400, data protection
    
Vision Solutions
Published By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
    
OKTA
Published By: Brainshark     Published Date: Nov 05, 2013
SiriusDecisions identifies five planning assumptions that must drive the agenda of sales enablement executives in the year ahead. From onboarding to demand creation to tackling mobile and social media, discover how to build integration between the marketing, sales, training and operations teams with the new sales enablement organizational model.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing, onboarding sales, sales new hires, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, video marketing
    
Brainshark
Published By: Workday     Published Date: Nov 07, 2017
Wie Workday die Grenzen traditioneller ERP-Systeme überwindet
Tags : 
    
Workday
Published By: Macola     Published Date: Sep 26, 2016
Manual business processes are cumbersome and time consuming, so how do you know when the time is right for your business to upgrade? Download now and consider these five signs.
Tags : 
exact, exact software, macola, erp, manufacturing, distribution, manufacturing, distribution, enterprise resource planning, business activity monitoring, customer service, eprocurement, supply chain management, desktop management
    
Macola
Published By: Netsuite     Published Date: Dec 08, 2016
'Read how switching from MYOB has helped Aussie businesses like Atlassian rapidly grow by 200%
Tags : 
erp, cloud computing, it infrastructure management
    
Netsuite
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace, security, internet security, security management, data quality, desktop management
    
KACE
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service