third party

Results 76 - 100 of 286Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
     IBM
By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : data integration, lifecycle management, hybrid environment, cloud-based data, information governance, decision making
     IBM
By: EMC Corporation     Published Date: May 27, 2014
Get in-depth insights from a new global survey of executives by The Economist Intelligence Unit, which confirms significant change in how organizations like yours deliver and use IT services, and advocates a blended model of internal and third-party services.
Tags : emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
     EMC Corporation
By: hybris software     Published Date: Aug 01, 2012
It's true that deploying B2B e-commerce platform involves many unique requirements not commonly found in B2C operations, such as incorporating a complex product port-folio, multiple distribution channels, and integrating with third party systems And yet, it's possible to complete an initial out-of-the-box B2B implementation within three months, if all the right critical path steps are followed. Additional features and functionality can be added after the initial launch, provided that the chosen out-of-the-box platform is designed to be used over the long run.
Tags : information technology, finance, analytics, maerchandising, product management, marketing, mapping, requirements gathering, design, construction, deployment, e-commerce, b2b, on premise, on demand, agility of solution, systems integration, speed, branding
     hybris software
By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : diligence systems, risk management solutions, integrated due diligence, compliance
     NAVEX Global
By: Delphix     Published Date: May 28, 2015
In a world of privacy regulation, intellectual property theft, and cybercrime, only a masking solution can secure vital data and enable outsourcing, third party analysis, and cloud deployments. Delphix delivers rapid deployment of masked data in minutes, service-based masking of production systems, and the ability to ship masked data across sites, to third parties, and into the cloud, with minimal network footprint.
Tags : 
     Delphix
By: BitSight Technologies     Published Date: Jan 27, 2016
During this webinar, BitSight CTO and Co-Founder Stephen Boyer shows you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target (or other third party) brings to your information ecosystem.
Tags : cybersecurity, security risk, acquisition target, security ratings, risk-based conversations, security
     BitSight Technologies
By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management
     BitSight Technologies
By: K2     Published Date: Aug 24, 2015
This white paper follows the story of Kim, head of the IT department for a large financial-services company, as she navigates the transition from Microsoft SharePoint 2010 to SharePoint 2013. Kim can’t wait to use the latest SharePoint technology, but she also knows she’ll need a third-party solution to expand the capabilities of SharePoint. She needs a solution that helps increase mobility, flexibility and collaboration between departments within her company.
Tags : 
     K2
By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
     K2
By: K2     Published Date: Oct 08, 2015
This paper addresses key workflow limitations in SharePoint 2013 and SharePoint 2010 and what to consider when looking for a third-party product, so you can quickly and easily build the SharePoint workflow apps you need without the challenges of custom code.
Tags : 
     K2
By: K2     Published Date: Oct 08, 2015
The tips provided here can help you determine what is most important for your SharePoint environment so that you can select the best third-party solution to suit your needs.
Tags : 
     K2
By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
     Mimecast
By: Rimini Street, Inc.     Published Date: Oct 07, 2015
Cancelling the ERP vendor's maintenance agreement isn't right for everyone. The options for replacing the vendor's support need to be understood to ensure there is an independent support option that satisfies the enterprise's needs within a tolerable level of risk. However, cancelling can play an important role in enabling an enterprise to run current mature application releases more cost-effectively, shift funds to business growth initiatives, and position itself flexibly for the best-fit future application platform. Download this Gartner report to learn more about what to consider before cancelling your ERP Vendor's Maintenance Agreement and Switching to Third-Party Support.
Tags : 
     Rimini Street, Inc.
By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : technology, enterprise applications, best practices, business optimization, technology architecture
     MuleSoft
By: IBM     Published Date: Jul 28, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : ibm, omnichannel, omnichannel retail success, fitforcommerce, commerce, analytics
     IBM
By: IBM     Published Date: Oct 11, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : ibm, commerce, b2c, b2c ecommerce, ecommerce, omnichannel, retail success
     IBM
By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, it’s becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
     Determine (Selectica)
By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
     Determine (Selectica)
By: Datastax     Published Date: Aug 03, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 27, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Datastax     Published Date: Aug 28, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com