• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

adopting

Results 226 - 250 of 365Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 22, 2013
In today's business environment, organizations of all sizes are struggling to maintain the advanced IT capabilities they need to be competitive while reining in cost and complexity. Shifting to off-premise hosted models, such as software-as-a-service (SaaS) and business process outsourcing, is a common activity undertaken to manage costs. One of the main challenges businesses face in adopting cloud and SaaS delivery models is the task of synchronizing data and integrating the multitude of systems already in datacenters with new cloud-based applications, not to mention within the cloud itself. Traditionally, this required organizations to leverage existing tools as well as custom development. This white paper looks at how two enterprises encountered problems with cloud integration and adopted IBM WebSphere Cast Iron to solve their immediate problems and extend use more broadly across their organizations.
Tags : 
saas, ibm, ibm websphere, websphere, cloud computing, web sphere, service oriented architecture, software compliance
    
IBM
By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications
    
E-SignLive by Silanis
By: Box     Published Date: Jan 16, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services, it management
    
Box
By: Avaya     Published Date: Jun 15, 2016
Smart Campus: Break down classroom walls with a smart technology strategy 70% of K-12 and IT administrative decision-makers said preparing students for the future workforce was one of the main drivers for adopting classroom technology. Read how to prepare your network for a digital-first classroom experience in this report.
Tags : 
technology, workforce, digital, smart campus, best practices, business intelligence, productivity
    
Avaya
By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
1,400 IT Security professionals from around the globe report their organizations have been adopting cloud at a rapid pace and trusting more sensitive data to reside there.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
By: McAfee     Published Date: Mar 31, 2017
1,400 IT Security professionals from around the globe report their organizations have been adopting cloud at a rapid pace and trusting more sensitive data to reside there.
Tags : 
cloud, cloud usage, cloud security
    
McAfee
By: Emarsys     Published Date: Feb 14, 2018
There is no downside to adopting AI, unless you have to hire third parties who aren’t fully integrated with the rest of your platform. Then you’ve got a “bought, not built” solution that can’t give you all the functionality that AI has to offer. But that’s not the worst conclusion you could come to. That category would be reserved for doing nothing at all and resisting AI despite all the evidence we’ve seen from the companies who have piloted, implemented and expanded their AI solutions.
Tags : 
marketing, integration, optimization, platform, solutions
    
Emarsys
By: VMware     Published Date: Dec 18, 2012
An analysis of organizations adopting a centralized virtual desktop (CVD) computing environment with the use of VMware View shows that investment in the technology can result in significant business value with very high return on investment.
Tags : 
virtual desktop, virtualization, cloud, roi, analysis, cost savings, desktop management
    
VMware
By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application, mobile computing, application integration
    
VMware AirWatch
By: Sitecore     Published Date: Mar 03, 2016
By hearing their story, you’ll get the following questions answered: What are key steps to consider when adopting customer-centric business objectives? In what ways has Sitecore been a sustainable platform for Uponor’s digital growth? What methods can you use to develop your organization's digital vision? Start on the road to marketing maturity!
Tags : 
    
Sitecore
By: Cumulus Networks     Published Date: Dec 30, 2016
By the year 2018, it is expected that over 25% of enterprise customers will adopt web-scale networking to build modern data centers. This rapid adoption can be attributed to businesses' increasing dependence on their data centers, while at the same time facing reduced IT budgets and limited staff to address their growing business needs. Fill out the form to download a TCO report on how organizations have saved an average of 45% on CapEx and approximately 74% on OpEx by adopting web-scale networking solutions from Cumulus Networks. You’ll learn how Cumulus modeled a real-life TCO calculator on the actual production path their customers took to build an agile, scalable, and cost-efficient data center.
Tags : 
    
Cumulus Networks
By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
By: Ring Central     Published Date: Aug 28, 2013
Nothing is more important to business success than communicating professionally and promptly with customers and colleagues. The way businesses communicate and handle incoming calls, and everything from faxes to conference calls, affects public perception of the company. Evolving businesses can better serve customers and enhance the way employees work by adopting the most readily available and affordable technology. In today’s world, leading edge communication begins and ends with a high-speed Internet-enabled, cloud-based, IP-connected phone service from RingCentral.
Tags : 
cloud based system, business phone system. cloud based, telecom, business process, business communications, corporate communications, enterprise applications
    
Ring Central
By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : 
email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
By: Aria Systems     Published Date: Jan 28, 2015
Recent Gartner research indicates that roughly half of U.S. businesses currently have or are considering adopting a recurring revenue model. If you’re reading this paper, then chances are that half includes you. Gartner estimates the revenue opportunity at greater than $300 billion per year and growing. Even a small piece of that pie would look good on your bottom line. This growing trend toward recurring revenue monetization strategies presents both opportunities and challenges for your company. Opportunities include reaching new customers and markets, and creating reliable and predictable revenue streams.
Tags : 
recurring revenue success, revenue opportunity, monetization strategies, it management, enterprise applications
    
Aria Systems
By: RingCentral     Published Date: May 14, 2013
Headquartered in San Francisco, with offices in Chicago, Los Angelos, and Miami, TRUSTe helps businesses build consumer trust and increase engagement across online properties. When a company moves to a new location, it has the opportunity to start fresh. Moving to the new offices, TRUSTe decided to explore the benefits of adopting a hosted phone system and doing away with their traditional PBX infrastructure. Learn why TRUSTe finds time savings and independence with RingCentral.
Tags : 
ringcentral, hosted phone systems, phone systems, time savings, independence
    
RingCentral
By: Dropbox for Business     Published Date: May 07, 2015
An IDC analysis of organizations adopting Dropbox for Business shows high end-user satisfaction and a strong return on investment (ROI) impacting both end-user productivity and IT infrastructure savings.
Tags : 
roi, dropbox for business, dfb, employee productivity, infrastructure management, enterprise, cloud adoption, mobile adoption, shifting applications, mobile computing, application integration, employee performance, productivity
    
Dropbox for Business
By: VMware SD-WAN by VeloCloud     Published Date: Dec 19, 2014
Are you adopting cloud apps in your Enterprise and looking for ways to assure WAN performance? Planning to increase branch and width capacity and looking for ways to do it efficiently?
Tags : 
hybrid, wan, dsl, cable, 4g-lte, cloud-delivered, it organizations, software development
    
VMware SD-WAN by VeloCloud
By: SAP     Published Date: Sep 10, 2009
To meet evolving regulatory mandates, companies around the world are adopting International Financial Reporting Standards (IFRS), a set of methodologies and disclosure requirements for the preparation and presentation of financial statements. Yet making the transition to IFRS is not just a rote accounting exercise.
Tags : 
sap, business objects, business intelligence, ifrs, financial reporting, cash flow, spend management, iasb, sec, erp, epm, business integration, business management, hipaa compliance, it spending
    
SAP
By: OKTA     Published Date: Mar 30, 2018
"As a modern organization, you embrace powerful new cloud apps to fuel your organization's growth. You know adopting, using and even building the best technologies will be a big driver for your future success. But did you realize that identity is the lynchpin for the modern cloud ecosystem? It's the new security standard in a world where there is no perimeter anymore. We've talked with technology and security leaders from small to large enterprises and organizations across every industry. You'll want to know the five key elements of an identity solution they said you need to have."
Tags : 
    
OKTA
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
    
OKTA
By: SAS     Published Date: Mar 06, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics, and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. With the right end-user tools, a data lake can enable the self-service data practices that both technical and business users need. These practices wring business value from big data, other new data sources, and burgeoning enterprise da
Tags : 
    
SAS
By: NewField IT     Published Date: Aug 19, 2008
There has been an increased interest in companies adopting Managed Print Services to improve efficiency and reduce costs. Industry analysts have produced substantial amounts of material on the benefits and reasons why one should go down this road... but have they been listening to vendors too much?
Tags : 
knowledge management, document management
    
NewField IT
By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware
    
BlackBerry
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter