RSS feed Get our RSS feed

News by Topic

asp

Results 226 - 250 of 526Sort Results By: Published Date | Title | Company Name
By: HiQ Labs     Published Date: Apr 18, 2017
Experts predict the number of M&A transactions will increase in 2017, but the nature of M&A is changing. The old ways of collecting data are getting to be too slow, too expensive, and too subjective. The ideal M&A transaction relies on accurate, actionable scientific insights into the target’s workforce to support the investigation, due diligence and integration aspects of M&A. hiQ Labs applies scientific rigor to publicly available data sets to forecast which employees are at risk of leaving, map the target workforce’s skills onto the buyer’s company, and identify which employees have the skills critical to the deal’s success, so M&A leaders get a faster, cheaper, and accurate solution based on science.
Tags : hiq labs, m&a, talent
     HiQ Labs
By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : product development, engineering, companies, plm, product lifecycle management, market, designs, budget
     Dassault Systèmes
By: Kronos     Published Date: May 30, 2018
Employee engagement is being challenged by the increasing diversity of today’s workforce. From aspiring Millennials to aging Baby Boomers — working in a complex mix of full-time, part-time, contingent, temporary, and contract roles — the 21st-century workforce is more diverse than ever, challenging organizations to build and support a corporate culture that fosters employee engagement and drives the employment brand.
Tags : 
     Kronos
By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 24, 2018
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.APIs sind nicht unbedingt eine neue Technologie, aber in der heutigen digitalen Welt ist ihre Bedeutung gewachsen, und sie sind für jeden Aspekt des Unternehmens wichtig geworden. Dies wiederum hat den Bedarf an einem effektiven API Management erhöht. Aber wie sieht eine effektive Lösung aus?Im API Management Playbook wird erläutert:• Warum die digitale Transformation in der Application Economy unerlässlich ist• Warum APIs die Bausteine der digitalen Transformation sind• Auf welche wichtigen Interessenvertreter in Ihrem Unternehmen APIs Auswirkungen haben• Was der API-Le
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 25, 2018
Molte delle aziende più grandi e di maggior successo nel mondo utilizzano CA Project & Portfolio Management (CA PPM) come chiave di volta della strategia di Business intelligence (BI). Questo permette a CA di monitorare costantemente l'andamento del mercato, e l'evoluzione relativa ad aspettative ed utilizzo, man mano che le aziende adottano tecnologie BI.
Tags : sette, trend, nella, business, intelligence
     CA Technologies EMEA
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: Veeam '18     Published Date: May 01, 2019
Downtime & Data Loss are Business Problems, not IT Issues Data protection and backup are often among the least appreciated aspects of IT, both in terms of budget and the perception of creating “business value” for the broader organization. Arguably, data protection and backup aren’t always respected even when compared to other facets of IT — until something fails, breaks, is overwritten, or corrupted accidentally or on purpose.
Tags : 
     Veeam '18
By: Uberall     Published Date: Oct 08, 2018
Your store locator is a critical component on your website; it’s the moment of truth when an online shopper becomes and offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : store, locator, experience, optimize, local marketing, customer journey
     Uberall
By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Apr 10, 2018
L'evoluzione sempre più rapida delle aspettative (elevate) degli utenti fa sì che il panorama software si modifichi a un ritmo febbrile, per offrire software di maggiore qualità: e il testing deve essere in grado di stare al passo. CA Technologies ha collaborato con Paul Gerrard, Principal di Gerrard Consulting, per individuare alcune delle nuove sfide che l'economia digitale presenta per l'attività di testing, e i trend emersi per superarle. Alcuni di questi argomenti sono illustrati in questo e-book e in un libro tascabile.
Tags : 
     CA Technologies EMEA
By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric
     Riverbed
By: Riverbed     Published Date: Nov 02, 2016
"As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services. But what IT leaders are failing to grasp is that this cultural shift also requires modifications to the underlying application performance management (APM) technologies and processes that have historically been used to manage IT service delivery. Read this analyst paper to explore: Key challenges IT organizations face as they roll out DevOps practices Additional APM tools and capabilities needed to support DevOps Recommendations for forming the right organizational structure and processes"
Tags : 
     Riverbed
By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : security, virtualization, security approaches, kaspersky
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
The Security Technologies for Mobile and BYOD guide reveals the essential security technology options for protecting enterprise networks, systems and data.
Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
     Kaspersky
By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
     Kaspersky
By: Burton Group     Published Date: Apr 08, 2008
Most large enterprises have launched an initiative to adopt service-oriented architecture (SOA), but SOA is not a solution that comes in a tidy little box. SOA is a new way to design systems, and it is more about culture than it is about technology. SOA will impact many aspects of an organization—from software development and operations to accounting and incentive systems. Governance is critical.
Tags : soa, service oriented, service-oriented, burton group, governance, soa governance
     Burton Group
By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
     Burton Group
By: F5 Networks Inc     Published Date: Jan 22, 2009
SAP®, the world’s largest business software company, provides a comprehensive range of enterprise software applications and business solutions to empower every aspect of business. Organizations deploying SAP have invested a significant amount of time and money in these powerful applications. By taking advantage of F5’s Application Ready infrastructure for SAP, tested and validated at SAP, organizations can achieve a secure, fast and available network infrastructure that reduces the total cost of operation and increases ROI. And F5’s FirePass SSL VPN, BIG-IP Local Traffi c Manager and WANJet appliance have been certified by SAP for integration with SAP ERP 6.0 based on NetWeaver 7.0.
Tags : application ready network guide, sap, enterprise software applications, network infrastructure, sap, netweaver, soa, application
     F5 Networks Inc
By: VMware/Intel Server Refresh and Cost Savings     Published Date: Mar 22, 2009
In an economic environment that is repeatedly heralding the message "do more with less" the efficiency of hypervisors are an oft-overlooked aspect of virtual infrastructure acquisition that has massive impact on total price.
Tags : vmware, virtualization, total cost of acquisition, tca, tco, total cost of ownership, hyper-v, server virtualization
     VMware/Intel Server Refresh and Cost Savings
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics