functions

Results 1 - 25 of 277Sort Results By: Published Date | Title | Company Name
Published By: TopQuadrant     Published Date: Mar 21, 2015
Data management is becoming more and more central to the business model of enterprises. The time when data was looked at as little more than the byproduct of automation is long gone, and today we see enterprises vigorously engaged in trying to unlock maximum value from their data, even to the extent of directly monetizing it. Yet, many of these efforts are hampered by immature data governance and management practices stemming from a legacy that did not pay much attention to data. Part of this problem is a failure to understand that there are different types of data, and each type of data has its own special characteristics, challenges and concerns. Reference data is a special type of data. It is essentially codes whose basic job is to turn other data into meaningful business information and to provide an informational context for the wider world in which the enterprise functions. This paper discusses the challenges associated with implementing a reference data management solution and the essential components of any vision for the governance and management of reference data. It covers the following topics in some detail: · What is reference data? · Why is reference data management important? · What are the challenges of reference data management? · What are some best practices for the governance and management of reference data? · What capabilities should you look for in a reference data solution?
Tags : 
data management, data, reference data, reference data management, top quadrant, malcolm chisholm
    
TopQuadrant
Published By: Silwood Technology     Published Date: Nov 28, 2016
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: Silwood Technology     Published Date: Mar 21, 2017
Business functions in large organizations are usually handled by software application packages. Some of the most well-known of these are from SAP, Oracle, Salesforce and Microsoft. These packages all store their data in a database. Often however it is necessary to use that data with other IT projects. In this instance being able to understand the metadata that defines these databases is critical. The challenge is that their metadata is complex, opaque and difficult to access. This paper describes how the top application packages store and use their own metadata. It explores the importance of understanding that metadata and examines the obstacles in getting at that metadata in a timely and effective manner.
Tags : 
    
Silwood Technology
Published By: MariaDB     Published Date: Apr 02, 2018
Learn how to use JSON functions for semi-structured data This white paper explains step-by-step how to support semi-structured data with JSON functions, introduced in MariaDB Server 10.2, using a practical use case with sample data and queries for everything from creating, reading and querying JSON documents to enforcing data integrity with check constraints and functions. You will learn how to: • Create, read and update JSON documents • Index and query JSON documents • Enforce data integrity with JSON documents • Combine relational data and JSON documents • Return JSON documents as relational data • Return relational data as JSON documents
Tags : 
    
MariaDB
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Workday     Published Date: Mar 02, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
streamline workflow, increase visibility, global demand, modernize systems
    
Workday
Published By: Workday     Published Date: Mar 19, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
netflix, global demand, streamline workflow, modernize
    
Workday
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence
    
ASG Software Solutions
Published By: Cisco     Published Date: Dec 23, 2015
So what lessons can operators learn from the past experience with server virtualization? Beware of merely shifting costs from capital to operating expenditures. Be selective in virtualizing the right resources and functions driven by the business need, and not the technology lure.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, enterprise applications
    
Cisco
Published By: goTransverse     Published Date: Oct 15, 2015
Stratecast regularly examines the monetization processes and functions within the communications service provider (CSP) sector. This week’s SPIE looks at how other industries are now benefiting from monetization concepts first developed within telecom; and how taking advantage of the details within the monetization process itself enables innovation in surprising new ways. This report also assesses how one company—goTransverse—is enabling a variety of customers across various industries to change how they do business; applying monetization principles in somewhat unconventional ways.
Tags : 
    
goTransverse
Published By: HPE Intel     Published Date: Jan 11, 2016
The world of storage is being transformed by the maturing of flash arrays, an approach to storage that uses multiple, solid state flash memory drives instead of spinning hard disk drives. An all-flash array performs the same functions as traditional spinning disks but in a fraction of the time required and in more compact form factors. Given its superior performance in certain contexts, all-flash arrays are experiencing strong industry adoption. However, best practices and a true understanding of key success factors for all- flash storage are still emerging. This paper is intended to educate you on best practices based on real user experience drawn from ITCentralStation.com. We offer all-flash user advice in selecting and building the business case for a flash array storage solution.
Tags : 
    
HPE Intel
Published By: HPE     Published Date: Mar 02, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
    
HPE
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: LogMeIn     Published Date: Mar 19, 2015
Many organizations are making fundamental changes to their organizational structures, delivery models are changing, support organizations are adding new capabilities, and mission statements are changing at breakneck speed. Our support organizations are adding new services, taking on new roles and responsibilities, engaging in different ways with their customers, and consolidating many operational functions to create a scalable delivery model that is focused on customer success and outcomes within a cost structure that meets the company’s revenue, cost, and margin goals. This report will explore some of these issues, and how support organizations can make the shift needed to meet their customers' needs.
Tags : 
delivery models, customer support, support services, service offerings
    
LogMeIn
Published By: SAP     Published Date: May 03, 2016
Discover how the supply chain is undergoing tremendous change; once a complicated, siloed bundle of functions ranging from manufacturing to production and delivery, the supply chain is now extended to reflect the importance of networks to the modern business. Learn how these networks connect businesses to customers.
Tags : 
sap, supply chain, logistics, demand networks, manufacturing, production, delivery, networks, enterprise applications, data management, business technology
    
SAP
Published By: Adobe     Published Date: Sep 12, 2017
Read the Gartner MQ: Multichannel Campaign Management to learn why Adobe is a leader. Forrester states, "Consider Adobe Campaign for breadth of digital and offline campaign management capabilities and its tight link to the analytics and content management functions within Adobe Experience Cloud."
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle CX
Published By: Infosys     Published Date: May 30, 2018
APIs are a convenient way for enterprises, particularly in the financial services domain, to monetize their services with minimum expenditure. However, making sure that the APIs are always available, scalable, and secure is vital for the API economy to truly realize its potential. A major financial services firm built an API platform to earn revenue by exposing its backend functions, but needed a partner to make sure the platform was well supported and available 24/7 to partners and developers. See how Infosys helped and the five key takeaways from the project.
Tags : 
api, investment, platform, financial, services, domain
    
Infosys
Published By: TriNet     Published Date: Jan 17, 2012
HR is a necessity when you have employees. And what could be better than taking a set of duties - which although a necessity, are not a core competence - off your plate?
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, finance
    
TriNet
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.