ap report

Results 1 - 25 of 1095Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jul 19, 2019
AI applications and especially deep learning systems are extremely demanding and require powerful parallel processing capabilities. IDC research shows that, in terms of core capacity, a large gap between actual and required CPU capability will develop in the next several years. IDC is seeing the worldwide market for accelerated servers grow to $25.6 billion in 2022, with a 31.6% CAGR. Indeed, this market is growing so fast that IDC is forecasting that by 2021,12% of worldwide server value will be from accelerated compute. Download this IDC report to find out why organizations like yours will need to make decisions about replacing existing general-purpose hardware or supplementing it with hardware dedicated to AI-specific processing tasks.
Tags : 
    
IBM APAC
Published By: Stripe     Published Date: Aug 06, 2019
Platform businesses are reshaping our economy and disrupting entire markets by seamlessly connecting buyers and sellers. However, processing payments and the exchange of value on a platform or marketplace can be challenging. Stripe commissioned Forrester Consulting to evaluate the challenges that platforms and their sellers face, and the solutions they seek. Through a global online survey of 2,030 platform sellers and four in-depth interviews, Forrester found that platforms struggle to provide their sellers with much-needed payment capabilities, reporting, and customer support services with in-house resources alone. Meanwhile, sellers demand that platforms provide these services and will prefer platforms that are service-rich over platforms that are service-poor. KEY FINDINGS • The complexities of managing a platform force executives to divert resources, which stalls growth. • Going global is easier said than done. • Sellers will flock to platforms that simplify the process of sellin
Tags : 
global payments inc, payment solutions, payment processing, platform as a service (paas), platforms
    
Stripe
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Schneider Electric     Published Date: Jul 01, 2019
Data-driven asset performance management can help food & beverage manufacturers leverage tools such as equipment efficiency solutions, augmented reality and secure asset connection to transition from a reactive to a prescriptive approach. This will not only help reduce CapEx and OpEx, but also empower the workforce, whilst meeting manufacturing KPIs. This report from Frost & Sullivan shows how manufacturers can achieve 20-30% cost savings by changing their asset maintenance approach.
Tags : 
asset performance, food and beverage, manufacturing
    
Schneider Electric
Published By: Juniper Networks     Published Date: Jul 31, 2019
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download this report to find out what else Ovum has discovered about security practices in Asia Pacific.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Google     Published Date: Aug 05, 2019
"Agile BI requires more than just agile dashboards. True agility means prototyping data models quickly so business users can continuously iterate on them. Application development and delivery professionals working on BI initiatives should consider adding DWA platforms to their BI toolbox. This Forrester report discusses how seven data warehouse automation vendors bring Agile options to all phases of BI/analytics application development. Read more to find out how these platforms help facilitate shorter development cycles."
Tags : 
data warehouse automation, forrester, agile solutions, business intelligence, analytics
    
Google
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
analyst, artificial intelligence, intelligent automation, rpa
    
Automation Anywhere APAC
Published By: S&P Global Platts     Published Date: May 24, 2019
A surge in new petrochemical production capacities across China, mainly for paraxylene, is likely to be the key factor that will heavily impact the sector globally, with US-China trade tensions next in line. Both factors have the potential to cause disruptions and change trade flows, while triggering fluctuations in margins. Volatile upstream markets, such as crude oil and naphtha, are not making these markets any more predictable either, and 2019 is set to be a year full of challenges. This special outlook report takes an in-depth look at the key themes expected to shape key Asian petrochemical markets in the months ahead.
Tags : 
    
S&P Global Platts
Published By: HERE Technologies     Published Date: Aug 28, 2019
Mapping, tracking, positioning and real-time data arekey to supporting defense and intelligence initiatives. Governments and agencies need location data they can trust to track and adjust fixed and mobile resources to address rapidly changing events and circumstances. With Ovum's Location Platform Index: Mapping and Navigation, agencies can assess location platform industry leaders and identify the platform that best meets their product development demands. This year, HERE Technologies cemented its role as the industry leader, earning the highest ranking, and besting Google, for the second time in a row. Download your free report to learn: The relative strengths and weaknesses of each vendor, including data, enablers and features Vendor strategies to keep up with changes in technologies and trends The specific workings of the location platform market, and to better understand what constitutes a healthy location platform and which provider offers the correct portfolio and the necess
Tags : 
data, platform, mapping, developers, index, vendors, capabilities, maps
    
HERE Technologies
Published By: KPMG     Published Date: Sep 05, 2019
Leveraging procurement bots is the next logical step as organisations look to benefit from advancements in digital capabilities. Like every transformative technology, the implementation of procurement bots, while exciting, is not without challenges. Read this report to discover: • the five steps procurement organisations can take to create a partnership between bots and employees • the key characteristics of organisations doing this successfully • a phased methodology to ensure stakeholder change.
Tags : 
    
KPMG
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Dell EMC     Published Date: Aug 01, 2019
Software might run the world, but software still runs on hardware. It’s a misperception that hardware has little value anymore. Every application, every workload, every data set runs on physical servers. Read “Hardware Does Matter: Global Server Brands are Perceived as Superior for Driving Digital Business,” a Frost & Sullivan report of 500 IT decision makers, on the value of global server brands vs. commodity servers. Look beyond commodity status to discover: • Key server purchase criteria • How top brands directly compare • How to choose based on workload Server brands very significantly, and a commodity brand may not provide the outcomes you need, especially for new and next-generation applications. Download this analyst report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: MicroStrategy     Published Date: Aug 28, 2019
Over the last decade, the enterprise analytics landscape has dramatically transformed. Vendors have come and gone, and platforms have continually expanded their offerings to include new functionality and keep pace with the demands of the businesses they serve. Originally envisioned as an IT-centric tool for enterprise reporting, analytics today has evolved into a business solution—empowering a range of users across every line of business, including front-line employees, field personnel, and executives. The rise of self-service analytics over the past decade has played a key role in promoting a data-driven mindset within every business function. However, this practice is limited to a skilled few. The vast majority of business professionals lack the time, analytical skills, or inclination to conduct their own analyses, and fail to effectively use analytics on a day-to-day basis. The result? Despite decades of investments, BI adoption at most organizations remains at 30%. The failure of e
Tags : 
    
MicroStrategy
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: TIBCO Software     Published Date: Sep 16, 2019
La manera en que ponemos en marcha nuestros vehículos, calentamos nuestros hogares e impulsamos nuestras industrias está cambiando de manera radical. Las tecnologías que se han implementado a gran escala pero que resultan ser ineficientes, como los automóviles que utilizan motores de combustión interna, están siendo reemplazadas con alternativas electrificadas y más efectivas. Y las energías renovables como la solar, la eólica y la térmica, entre otras, apoyadas por el almacenamiento en baterías de próxima generación, están atendiendo un porcentaje cada vez mayor de la demanda de energía. Este reporte aborda cómo el proveedor líder de infraestructura de tecnologías de la información, TIBCO, está impulsando la transformación digital al permitir tomar mejores decisiones y realizar acciones más veloces e inteligentes a través de TIBCO® Connected Intelligence Cloud. Los siguientes ejemplos muestran cómo la tecnología de TIBCO está ayudando a las empresas de la industria energética:
Tags : 
    
TIBCO Software
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Apptio     Published Date: Jul 16, 2019
We know that digital transformation is changing the economics of IT, but is this influencing CXO dynamics and strategic decision-making? To determine this, the Financial Times (FT) Focus partnered with Apptio to survey more than 550 C-suite leaders in technology and finance globally. Download this FT Focus report to discover how to: - Bridge the trust gap and ease tensions between the Office of the CIO and the CFO with accountability and real-time data - Leverage digital transformation to foster greater collaboration and avoid creating blurred responsibilities across the C-suite - Help leaders at global brands embrace AI, reskilling, cloud, Agile, and decentralized decision-making to move at hyperspeed and deliver value.
Tags : 
    
Apptio
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: BetterUp     Published Date: Mar 06, 2019
Despite the huge amount of time, money, and resources invested in L&D solutions, most simply deliver information without effecting lasting transformational change. In fact, after a year, only about 30% of employees successfully transfer their learnings to the workplace. A new approach is required as most L&D solutions are failing us. In this report, we share the five shortcomings of L&D solutions today and offer insights into how you can create a program that delivers the business outcomes you need, while enabling your people to thrive.
Tags : 
    
BetterUp
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: Lepide     Published Date: Jan 16, 2013
This white paper article is a compendium encompassing the key features of The Lepide Active Directory Management & Reporting (LADMR)
Tags : 
    
Lepide
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: