sign act

Results 151 - 175 of 955Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which can have both a positive and negative impact on their businesses.
Tags : 
emerging threats, user experience, digital transformation, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 28, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: Overcome the worldwide shortage of experienced data center professionals Understand how out-tasking data center operations can benefit you & your clients Identify key characteristics of a strong data center operations partner
Tags : 
data center,  business growth,  schneider electric
    
Schneider Electric
Published By: Bloomberg Government     Published Date: Sep 19, 2011
Sign up today to download the latest report on the impact of Dodd-Frank on financial firms.
Tags : 
government, bloomberg, legislative, issues, regulatory, congress
    
Bloomberg Government
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: VMware     Published Date: Aug 23, 2011
The road map outlines a set of evolving objectives, challenges, required competencies, and success measures needed to transform IT from a cost center to a strategic value driver. It is designed to address key success factors at the executive sponsorship level and at the infrastructure level.
Tags : 
vmware, cloud computing strategy, virtualization, private cloud, it value transformation, roadmap
    
VMware
Published By: IBM     Published Date: Sep 22, 2011
Find and solve performance problems without adding costs IBM InfoSphere Optim puts performance management in the spotlight! Optim solutions are designed to deploy quickly and easily out of the box for immediate benefit. Business-value assessment services are also available to help you design a custom solution - complete with full financial analysis. Either way, you can realize immediate ROI interms of cost and performance if you keep performance-management best practices in mind.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity
    
IBM
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: ServiceNow     Published Date: Feb 24, 2017
At the highest level of organizations, a new management directive has emerged to meet the changed nature of customer demands and interactions as well as the need to differentiate within the market. This directive has one goal: providing a differentiated customer service experience. As products become increasingly commoditized, organizations can set themselves apart from their competitors by providing a unique customer service experience that creates a "relationship" based on intangible benefits that their customers will find hard to give up. While this vision is theoretically sound, it requires a significant tactical shift in business thinking and processes. The modern customer's habits and service requirements have changed radically. Meeting these needs challenges many historically held beliefs and practices regarding the customer and modes of interaction.
Tags : 
    
ServiceNow
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: CA Technologies     Published Date: Nov 02, 2016
Customer obsession has created a business environment of continual disruption. Constant change is forcing execs to recognize that traditional planning and delivery practices don’t sustain the ability to focus on strategy while delivering new capabilities. To adapt to an environment where change is the new normal, project management office (PMO) leaders and enterprise architecture (EA) strategists are expanding Agile methods, but scaling Agile to the enterprise requires significant process, organization, and cultural change. This report identifies best practices for tackling this challenge.
Tags : 
    
CA Technologies
Published By: Collective Health     Published Date: Nov 28, 2016
Collective Health offered a contemporary health benefits infrastructure that was able to use the data that’s surrounding us in the healthcare space and leverage it in a way that was new and exciting to us,” said Milt. Combining technology, design, and humans, Collective Health’s holistic approach brought Activision Blizzard’s benefits goals to life.
Tags : 
    
Collective Health
Published By: Deluxe     Published Date: Mar 15, 2017
The financial services industry has been significantly impacted by the increasing use of technology from smartphones to wearables. This transformation in methods of transacting has enabled more personalized engagement, allowing customers to use multiple channels simultaneously to engage in seamless, multi-dimensional banking. This has also increased both the potential and complexity of creating a positive customer experience.
Tags : 
    
Deluxe
Published By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
    
Deluxe
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: ServiceNow     Published Date: Oct 24, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
servicenow, cmdb, deployment, management
    
ServiceNow
Published By: Intapp     Published Date: Jan 09, 2019
New researchconducted by Intapp found that, while Mid Law firms attest that data-driven strategies are highly important in all areas of the client lifecycle, a significant gap exists as to how or whether they are currently deploying enabling technologies such as intelligent automation. Read the ebook to discover the full breadth of this gap, and learn best practices for how you can use technology to drive growth in the client-empowered era.
Tags : 
law firm time, law firm better time, law firm automated time, law firm time sheet, law firm timesheet, law firm better time sheet, law firm better timesheet, law firm automated time sheet
    
Intapp
Published By: 3D Systems     Published Date: May 17, 2019
This new world is not only delivering better quality components at lower cost but is offering whole new design possibilities, new business models and new markets. The key is to know when to use metal additive manufacturing instead of or complementing conventional milling or casting. Read this executive brief to learn about the transformative value of the fifth wave of metal 3D printing, as well as compelling use cases for direct metal printing from the aerospace, automotive and industrial sectors.
Tags : 
    
3D Systems
Published By: Intel     Published Date: Apr 11, 2019
Robots play a major role in making manufacturing processes more efficient and less labor intensive. They can help control costs and improve quality, as well as increase productivity. The complexity of robotic system design, however, creates obstacles for many manufacturers, and this is made more difficult by the need to identify and integrate subsystems from multiple vendors. NexCOBOT, a NEXCOM company, offers a flexible, modular robotics solution integrating artificial intelligence (AI) with machine vision and powered by the new Intel® Vision Accelerator Design products. The solution brings together the insight of artificial intelligence, the mobility of robotics, and the capabilities of machine vision, providing a new level of precision and optimization for manufacturing and industrial implementations
Tags : 
    
Intel
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Globalisation, increasing competition, the constant need to expand revenue bases while cutting costs are among the many changes significantly impacting modern businesses. Are you trying to gain faster insight into business data from multiple sources and devices? Are you trying to recover agility, responsiveness and reduce overhead costs? Get the whitepaper and discover what’s the right enterprise management solution for you to remain competitive.
Tags : 
    
Sage Software (APAC)
Published By: Capita     Published Date: Jun 26, 2019
Connectivity is the beating heart of today’s enterprise – critical to its very survival. The key metric of its strength or weakness is ECG: Enterprise Connectivity Grading, and the effects of an unhealthy one will be felt in every corner of the business. Download the infographic and discover how; the key warning symptoms that may be signalling that your ECG isn’t on the pulse, and the wide-ranging ripple effect that could be having as its impact radiates outwards. Learn more>>
Tags : 
    
Capita
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: