guidance

Results 176 - 200 of 303Sort Results By: Published Date | Title | Company Name
Published By: Jive Software     Published Date: Feb 24, 2014
With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective social business software solution.
Tags : 
jive, human resources, social software, social media, workforce, workforce magagement, social business, social business software, software solution, third party vendor, software development
    
Jive Software
Published By: Coupa Software     Published Date: Mar 05, 2015
For mid-size and larger organizations, it's critical to have efficient eProcurement and Procure-to-Pay (P2P) solutions that work closely with their installed financial structure (most likely ERP systems, like those from Oracle and SAP). This report provides guidance not only around the technical steps involved in integrations, but also the human and organizational readiness required to make cloud P2P and ERP integration a success - along with a real-life implementation case study.
Tags : 
sap, erp integration, eprocurement, financial structure, cloud p2p, it management
    
Coupa Software
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
This report provides an overview of the LMSs market, along with guidance and a nine-step process to help you in selecting this type of system for your company.
Tags : 
learning management system, lms marketplace, lms solution provider, process design
    
SumTotal, a Skillsoft Company
Published By: IBM     Published Date: Oct 13, 2017
Blue Hill provides guidance on 1) the Customer Journey leading to a new generation of analytic tools, 2) key value propositions associated with moving to tools such as IBM Cognos Analytics and IBM Watson Analytics, and 3) recommendations for best practices in maximizing the value of insightful and predictive analytics for enterprise data.
Tags : 
blue hill research, data analytics, ibm cognos, watson analytics, enterprise data
    
IBM
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organization’s journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: Cisco     Published Date: Jan 13, 2016
Time and technology — never enough of the former, and how to best deploy the latter — often shape the daily existence of modern B2B sales professionals. If you're looking for an additional edge in beating your quota next year, this research report will provide actionable guidance around how web conferencing solutions can help you make better, faster, and more effective connections with today’s savvy buyers.
Tags : 
    
Cisco
Published By: IBM     Published Date: Mar 28, 2008
The purpose of this Redbook is to provide guidance for the preparation of business process models, developed with the WebSphere® Business Modeler, which will ultimately be monitored by the WebSphere Business Monitor.
Tags : 
analytical applications
    
IBM
Published By: SAS     Published Date: Jun 05, 2017
"The connected customer is an individual who is intimately connected to the data, outcomes, decisions and staff associated with any relationship to an organization.  To create personalized experiences, companies across all industries must pursue a more connected relationship with their customers through technology and processes focused on delivering relevant personalized experiences whenever possible. In this report, Blue Hill explores the key traits associated with supporting the connected customer through the internet of things, and provides guidance on why the internet of things will be essential across the general business landscape. "
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
With the support of SAS, the Internet of Things Institute developed the 2017 Internet of Things ROI Research Study to gather real-world insights, lessons learned and future guidance from current users of IoT technology and advanced analytics. This selective sample of IoT users offers valuable insights to both IoT innovators and organizations still waiting to see how the technology evolves before investing. Multiple business layers and functions have input into IoT decision making. Discover which layer was most critical to success for those organizations that have achieved the highest percentage of their targeted ROI. Learn about the main drivers of success for IoT users achieving higher returns. Lastly, the results highlight six primary factors that can undermine an IoT initiative and how they can be prevented.
Tags : 
    
SAS
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Get no nonsense, practical guidance on how to succeed as a cloud provider in the marketplace. Focusing on reality and not hype, this whitepaper addresses how to best evaluate cloud services/offerings, implement operations and approach customer engagement.
Tags : 
ibm, cloud business, providers, service, service providers, strategy, ecosystem, business services, business strategy, cloud computing, cloud market, hardware, virtualization
    
IBM Cloud Business
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
This whitepaper features valuable insights pertaining to cloud usage and implementation scenarios for test cloud environments. Includes helpful guidance and scenarios for IT Managers and CIOs alike regarding public, private and hybrid testing clouds.
Tags : 
cloud computing, environment, hardware, ibm corp., scenario, virtualization
    
IBM Cloud Business
Published By: IBM     Published Date: Nov 09, 2012
The objective of this book is to help customers plan their migration strategy effectively and efficiently by providing the right information, facts and guidance. It will ensure you that you will reap the cost savings and benefits of DB2 10.
Tags : 
db2 10, z/os, ibm, cost savings, business benefits, simplified database management, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Jul 09, 2012
This white paper offers guidance onhow to build a business case to justify a managed file transfer initiative.
Tags : 
ibm, technology, software, technology, migration factory, storage
    
IBM
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, it management, business technology
    
CDW
Published By: CDW     Published Date: Jun 25, 2015
Cloud apps can help you reach new heights. But without proper guidance, deployment and implementation can present some obstacles along the way, too. Here are some things to keep in mind when considering cloud apps.
Tags : 
productivity, management, implementation, cloud, applications
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : 
data management, business practices, data center. data application, rack cable management, data center
    
CDW
Published By: Teradata     Published Date: Jan 22, 2014
Analytics is moving to the cloud. That may be exciting news for many IT leaders, but some are still unclear about what the cloud really means. Others are overwhelmed by the wealth of new service options and cloud-based deployment models. In the following pages, you’ll find practical guidance to help determine the right solution for moving your business forward.
Tags : 
cloud-based analytics, big data, public cloud, private cloud, cloud infrastructure
    
Teradata
Published By: Microsoft Azure     Published Date: Apr 11, 2018
What you need to know now about moving your enterprise to a cloud computing strategy In the second edition of the Enterprise Cloud Strategy e-book, we've taken the essential information for how to establish a strategy and execute your enterprise cloud migration and put it all in one place, so you can quickly understand topics like: What to consider when choosing between hybrid, public, or private cloud environments How cloud reduces costs, and even benefits on-premises computing New analytics and IoT capabilities Security and compliance considerations This valuable asset for IT and business leaders provides a comprehensive look at moving to the cloud, as well as specific guidance on topics like prioritizing app migration, working with stakeholders and cloud architectural blueprints.
Tags : 
    
Microsoft Azure
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: CDW-Lenovo     Published Date: Oct 15, 2015
This document is the Lenovo reference architecture (RA) for OpenStack from Red Hat Enterprise Linux OpenStack Platform. The RA focuses on achieving optimal performance and workload density using Lenovo hardware while minimizing procurement costs and operational overhead. The document shows different operational models using a variety of Lenovo servers and networking products with design considerations and guidance on how to size each part of the solution. Some examples of different reference designs are provided together with an appendix containing the hardware bill of materials.
Tags : 
    
CDW-Lenovo
Published By: CDW - APC     Published Date: Apr 07, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : 
data management, business practices, data center. data application, rack cable management, data center
    
CDW - APC
Published By: Qlik     Published Date: Nov 10, 2015
Gain your competitive advantage by downloading IDC’s MaturityScape: Big Data and Analytics in Financial Services.
Tags : 
qlik, big data, analytics, data analytics, financial data, data integration
    
Qlik
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 10, 2018
Where to invest next: Identifying the people, processes and technology you need for an effective cybersecurity strategy Building your organization’s cybersecurity maturity doesn’t happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you’ve made an initial investment in security. This white paper, “Where to Invest Next: Guidance for Maturing Your Cyber Defenses,” offers practical advice on achieving the level of cyber defense maturity that’s right for your organization. Learn why developing a security program that takes into account your risk level and the current state of your security posture is critical. You’ll also see why ensuring that everyone in the organization, from the leadership to the rank-and-file, is working toward the goal of cyber maturity is crucial to your success. Gain important insights into the cybersecurity maturity process incl
Tags : 
    
CrowdStrike
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept