it operations

Results 1 - 25 of 1142Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
Expanding analytic capabilities are critical to digitizing the business, optimizing costs, accelerating innovation, and surviving digital disruption Historically, manufacturers were almost solely focused on reducing costs by applying automation and analytics to engineering, R&D, manufacturing operations, and quality organizations. Even though the strategies used within these areas are still needed, they are not sufficient to ensure business survival and continuity in the age of Industry 4.0 and the IoT. Today, it is paramount that smart manufacturers broaden their scope because disruptive innovations in data acquisition, storage, and analytics technology have enabled an entirely new degree of automation and virtualization, promising a complete 360-degree high-fidelity virtual data-driven integrated views of all operations—from suppliers and supply chains, through equipment, processes, and manufacturing practices, to final product testing and customer satisfaction. Download this paper
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
Produced in collaboration with INFOPRO Digital with participation from Capgemini MAINTENANCE MADE EASY WITH THE HELP OF DATA Predictive maintenance involves gathering targeted data for analysis, the results of which will help anticipate potential failures before they occur. Companies opt for this type of maintenance to avoid predictable incidents and repair equipment, assembly lines, or machinery with minimum impact on their operations.
Tags : 
    
TIBCO Software APAC
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
    
Fiserv
Published By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Start the journey to operational and digital excellence by gaining a clear strategy for the first steps forward. This resource includes: • An executive summary of Smart Manufacturing • Benchmarking manufacturing operations management • The road to MOM 4.0 • Digital transformation is a vehicle, not a destination • Recommendations to achieve digital excellence Manufacturers need to start now and follow a clear path from corporate strategic objectives through to successful program implementation.
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This spotlight report examines: • How Manufacturing Operations Management (MOM) or Manufacturing Execution Systems (MES) are key enablers of data management and Digital Transformation. Companies can combine many other opportunities with manufacturing operations in a digital journey. • Product lifecycle management (PLM) as a high-value discipline to pair with MOM in discrete manufacturing, and the value of digital continuity across engineering, manufacturing operations, and supply chain. • A robust integration of MOM and PLM technologies and the advent of the Digital Twin (a virtual copy of the product and how it's made) to demonstrate maturity in Smart Manufacturing and the ability to make smart products in smart factories. The IIoT has opened up a world of opportunity for manufacturers. Take advantage of it.
Tags : 
    
Dassault Systèmes
Published By: IBM     Published Date: Apr 25, 2018
Experience IBM Watson Order Optimizer How can retailers efficiently leverage inventory from one channel to serve another without breaking the bank? See how IBM Watson Order Optimizer helps Fulfillment, Operations, and Inventory: Gain a holistic view of omni-channel operations across different functional areas Optimize in real-time against multiple, competing business objectives Utilize inventory at its most profitable price point Make better fulfillment decisions with cognitive insights
Tags : 
order optimizer, ibm watson, fulfillment, operations
    
IBM
Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Genesys     Published Date: Jul 13, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends. Forrester Research has identified 10 customer service trends in 2018 for AD&D and others who support customer service. Before you strategize on improving your quality of service, read this Forrester Report by Vice President and Principal Analyst Kate Leggett. You’ll learn which investments are critical and the advantages of: • Focusing on context and inquiry type to deliver the best customer experience • Using automation and AI to uncover new revenue streams and transform operations • Exploring new labor models to maximize human connections in a digital world
Tags : 
    
Genesys
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
    
Amazon Web Services
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: Epson     Published Date: Jun 12, 2018
Competition is growing fierce for restaurants — and not all of it comes from other local dining establishments. With grocery stores and meal kit services offering additional convenient and affordable dining options for customers to choose from, and with many restaurants turning to faster and smarter automation methods to power their operations, now is the time for your restaurant to step up its game. Ultimately, what your restaurant needs to do is offer a complete experience for your guests. The only way to effectively do this is to understand the whole diner journey and how the decisions you make along the way affect it.
Tags : 
    
Epson
Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap
    
SAP
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence
    
ASG Software Solutions
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Alcatel-Lucent     Published Date: Sep 30, 2009
Ensuring the reliability and efficiency of your data center operations requires a strategic partner that is qualified to minimize energy usage, reduce costs, and optimize space utilization, helping you meet critical business initiatives.
Tags : 
alcatel lucent, power, cooling, eco-sustainability, modular cooling, crac, opex
    
Alcatel-Lucent
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.