work practices

Results 26 - 50 of 377Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jun 21, 2019
Understanding cloud environments and making decisions about multiloucd management can be complex. Questions arise, such as how organizations need to change in this multicloud world. Working with enterprise customers, IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations. This covers the following key pain points: • Cost transparency and visibility • Dynamic, up-to-date Catalog • IT to operate in two, connected models • Standardized consumption • Aggregated services for added value • Integration remains a necessity • Control without obstruction • Challenges of user management • Primary consumption: Machine-to-machine purchase • Internal and external IT role changes
Tags : 
    
IBM APAC
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design
    
Cisco
Published By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 02, 2018
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices
    
Red Hat
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover how HPE Advisory Consulting Services consolidates and modernizes workloads and technology siloes, simplifying administration, and improving automation. Learn how IT organizations can support on-demand IT services and enable DevOps, self-service IT and agile development practices, while reducing equipment and operating expenses. This HPE Blueprint provides them with an overview of the steps they need to consider to achieve this outcome. This is valuable information to the IT person, particularly when they don’t know where to begin.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices
    
Cleversafe
Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage, raid, storage area networks, storage management, storage virtualization, application integration, application performance management, best practices, data deduplication
    
Cleversafe
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper explores the BYOD trend, examines its intersections with workforce management, and provides recommendations on how organisations can maximise the return on their workforce management investments and practices in an increasingly mobile environment.
Tags : 
workforce software, byod, enterprise applications, mobile strategy, mobile devices
    
Workforce Software
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : 
network management, best practices, network optimization, network applications, application management, technology, telecommunications
    
SolidFire_NetApp
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimate’s award-winning UltiPro® suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization
    
SolidFire_NetApp
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 19, 2015
Many organizations that have realized the benefits of server virtualization are ready to move to network virtualization. By combining hardware and software resources and functionality into a single, software-based administrative entity, these organizations can reap the benefits of greater data center agility
Tags : 
best practices, network, virtualization, data center, software
    
Juniper Networks
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Xactly     Published Date: Sep 06, 2016
This guide takes apart Sales Compensation, to figure out just what works and what best practices you need to achieve inspired performance.
Tags : 
sales, sales compensation, best practices, finance
    
Xactly
Published By: Juniper Networks     Published Date: Sep 10, 2014
To learn how to improve business agility and your network architecture, download the Whitepaper on building a business case for virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
network architecture, virtualization, secure network, juniper, best practices
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
To find out how a simple, open and smart network accelerates the deployment and delivery of applications, read the Whitepaper on network virtualization best practices. Find out how to transform and bridge the virtual and physical network.
Tags : 
network virtualization, best practices, overcoming challenges, network acceleration, deployment, delivery of applications
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Download this Ponemon Institute Report on the value of emerging network security technologies. Get the views of 4,500 IT security practitioners and find out which of the rapidly emerging technologies really are effective.
Tags : 
network security, security technology, emerging technology, juniper, best practices
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 28, 2014
To learn how to simplify network operations to bring apps to market more quickly and reliably, get our eBook on network automation. Read about how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : 
network automation, cloud, juniper, best practices
    
Juniper Networks
Published By: Level 3     Published Date: Mar 04, 2016
It’s time to think differently about your network security. Forget the fragmented and reactive approach you’ve used in the past with patchwork point solutions under separate IT silos. According to Frost & Sullivan’s report, you need a holistic approach to network security.
Tags : 
level 3 communications, frost and sullivan, network security, best practices, isp, malware protection, apt protection
    
Level 3
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library