Skip to main content
 

aps

Results 601 - 623 of 623Sort Results By: Published Date | Title | Company Name
Published By: JBoss Developer     Published Date: Oct 21, 2016
Rather than simply enhancing and supporting traditional methods, the use of digital technologies should enable brand new types of innovation and creativity. However, most of us have grown up with rigid, legacy technology-based business systems—process-oriented and mostly built around predictable, repeatable steps. If this sounds familiar, your business model may now be under threat from “digital Darwinism”—a tipping point caused by digital technologies and downstream market effects. Or perhaps nimbler, lower cost-base competitors are about to overtake you with a more innovative approach, better use of data or smarter use of technology. In this climate, “business as usual” is certainly no longer good enough.
Tags : 
digital transformation, api, security, ebusiness, cloud
    
JBoss Developer
Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, hybrid it operations, cloud, mss, managed security services
    
IBM
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
By refreshing servers in a timely fashion, IT can avoid operating costs that increase significantly in years 4-6 of a server’s life span while benefiting from improved performance and agility. In fact, operating costs in years 4-6 of a server’s life span increase to 10x the cost of the initial server acquisition cost. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
By refreshing servers in a timely fashion, IT can avoid operating costs that increase significantly in years 4-6 of a server’s life span while benefiting from improved performance and agility. In fact, operating costs in years 4-6 of a server’s life span increase to 10x the cost of the initial server acquisition cost. Intel Inside®. New Possibilities Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi, celeron
    
DellEMC and  Intel®
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, windows, technology, endpoint protection
    
Palo Alto Networks
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : 
data protection, sensitive data, data security, identity governance, digital assets
    
IBM
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
    
Lookout
Published By: Zebra Technologies     Published Date: Sep 05, 2018
Retailer taps mobile computing to optimize markdowns, omnichannel fulfillment, and enhance the shopper experience
Tags : 
    
Zebra Technologies
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle OMC     Published Date: Nov 30, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle OMC
Published By: Tricentis     Published Date: Jan 08, 2018
More than just an evolution, the software testing field is in the midst of a period of extreme change. What exactly does this change entail? How can software testers prepare for this change? And, perhaps most importantly, what change has yet to come? To answer these questions and more, we turned to 12 well-respected, highly seasoned software testing leaders.
Tags : 
    
Tricentis
Published By: Intapp     Published Date: May 20, 2019
In our technology-enabled era, most law firms have moved away from manual processes to embrace electronic timekeeping. However, many continue to struggle with time entry accuracy and bill rejections related to noncompliance with outside counsel guidelines (OCGs). All stakeholders— finance, operations, lawyers, and clients—want to solve this problem; not only does it result in inefficiencies of process and reduced realization due to write-offs, but it also impacts client goodwill. Firms know something needs to change, but so far, they haven’t found the answer. In short, they have arrived at a crossroads. This ebook explores the gaps and inefficiencies in the current state. Insights into how current
Tags : 
    
Intapp
Published By: FICO EMEA     Published Date: Aug 28, 2019
Synthetic Identity Fraud is growing in both scope and complexity. As your fraud protection efforts succeed in some areas of your business, fraudsters are devising new ways to penetrate your defenses. Do you understand the concepts of Bust Out Fraud, Data Furnishing, and Piggybacking? These are just some of the new techniques that fraudsters are using to exploit the holes in your fraud defenses. Download the eBook "Synthetic Identities: Are You Chasing Invisible Footprints?" This insightful eBook illustrates the aggressive techniques that fraudsters are using and answers questions such as: What are the six major factors driving the growth in Synthetic Identity Fraud? How are synthetic identities used? What are Bust Out Fraud, Data Furnishing, and Piggybacking, and how do they work? Perhaps more importantly, what are the state-of-the-art strategies used to fight these increasingly sophisticated fraud techniques?
Tags : 
synthetic identity fraud, manage fraud
    
FICO EMEA
Published By: Here Technologies     Published Date: Apr 01, 2019
Many on-demand companies are starting to rely on fast, accurate and robust mapping and location technologies in order to stay competitive and to provide superior end-user experience. Leveraging location data can assist you in accurately locating each delivery address, matching demand with available supply and exceeding your customer’s expectations. Discover a variety of ways in which on-demand transportation can be optimized by maps and location services such as those created by HERE. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to improve transportation efficiency and safety.
Tags : 
location data, transport & logistics, location services
    
Here Technologies
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Oracle EMEA     Published Date: Jun 04, 2019
IT Teams are reporting satisfaction with their organisation’s performance, but the gaps between their aspirations to drive innovation and thei ractions to see it through tell a different story. Across the organisation, respondents are not clear which department owns innovation. On top of that, the organisation is burdened by too many projects, which creates a conflict between quality and quantity. As a result, globally and across all lines of business, the majority of innovation projects do not make it to market. This problem is exacerbated by a lack of collaboration and clear leadership. Fortunately, organisations are placing value on the customer experience, thereby helping to move the business forward. Unfortunately, this momentum is hindered by the lack of priority that the organisation places on talent. Overall, organisations are generating ideas but struggling to execute them due to poor process and lack of focus. As a result, there is a big gap between ambition and ability, a
Tags : 
    
Oracle EMEA
Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode
Published By: Apptio     Published Date: Jul 16, 2019
Get the poster that maps AWS, Azure, and GCP services to a standard IT taxonomy. The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Download the Cloud Cost Management Poster for best practices to: - Map AWS and Azure billing to a standard taxonomy - Better understand cloud costs and usage to avoid surprises and drive accountability - Optimize resources by taking action on underutilized and idle instances
Tags : 
    
Apptio
Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Published By: SAP Concur     Published Date: Sep 25, 2019
"This IDC study reviews the competitive market for travel and expense management software in 2018. ""Industry leaders need to leverage advanced technologies to augment their capabilities for streamlining approvals, combating fraud, and maintaining compliance. Many of these technologies have taken large leaps forward in terms of usability and accuracy over the past 24 months,"" said Kevin M. Permenter, research manager for Enterprise Applications with IDC. There is no magic formula to rid the business of the burden of noncompliance. Download this report to find out how organisations can minimize risk for noncompliance and fraud amidst rapid international growth. "
Tags : 
    
SAP Concur
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.