RSS feed Get our RSS feed

News by Topic

asp

Results 351 - 375 of 524Sort Results By: Published Date | Title | Company Name
By: Astute IT DACH     Published Date: Feb 28, 2018
Viele Unternehmen, die einen Wechsel in die Cloud in Angriff nehmen, verlagern erst einmal sekundäre Daten vor Ort in den Cloud-Speicher. Bei Kosten von einem Bruchteil eines Cents pro Gigabyte ist der wirtschaftliche Aspekt sehr interessant – wer möchte nicht von drastisch gesenkten Speicherkosten profitieren? Die Entscheidung, Petabyte von Daten in die Cloud zu senden, sollte jedoch nicht leichtfertig getroffen werden. Wir bei Veritas wissen, dass eine solide Datenverwaltung in der Cloud vor allem globale Datentransparenz voraussetzt. Nachdem Sie Ihre Daten verstanden und visualisiert haben, können Sie: • SIE KLASSIFIZIEREN • SIE VERLAGERN • DATENANOMALIEN IDENTIFIZIEREN Im Folgenden finden Sie wichtige Tipps, mit denen sichergestellt wird, dass der Wechsel in die Cloud erhebliche Kosten einspart und gleichzeitig Datenrisiken vermeidet.
Tags : bestimmungen, cloud, astute, speicher, unternehmen
     Astute IT DACH
By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : cyber, threat, protection, av-test, cylance
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     BlackBerry Cylance
By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals
     Lane Telecommunications
By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
     SAS
By: SAS     Published Date: Jun 06, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
     SAS
By: Gleanster Research     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 229 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions and analysis of 32 solution providers. Most organizations today have business intelligence (BI) tools or at least some way of churning out reports. Fewer have a true business intelligence strategy or a well-architected BI platform for generating actionable insights. Broadly considered, BI encompasses all aspects of gathering, storing, cleansing, analyzing and distributing data. This Gleansight benchmark report reveals how Top Performers are justifying their investments in next-generation BI capabilities, how they're overcoming implementation and organizational hurdles, and how, as a result of their investments, they're now able to make more timely and better informed business decisions across multiple organizational functions.
Tags : gleanster, business, benchmark, business intelligence, roi, customer experience/engagement, market research, usability
     Gleanster Research
By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
     OnForce
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: Taleo     Published Date: Jan 25, 2012
Each area of payback overlaps as talent mobility is not a stand-alone practice. Internal talent redeployment connects with many aspects of overall talent management, especially talent acquisition and succession management. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : taleo, human resources, talent management, employee management, talent development
     Taleo
By: Intel Corp.     Published Date: Apr 26, 2012
This white paper provides best practices for integrating security planning into your cloud computing initiatives. Gain insights on key aspects of cloud security.
Tags : cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
     Intel Corp.
By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : whitelisting, security, application control, cyber attacks, blacklist
     Bit9
By: Switch Video     Published Date: Jun 05, 2013
When explaining your company’s value proposition, starting with why is always better than starting with how. Learn how an explainer video using emotional and aspirational messaging was able to not only increase Rypple’s online conversion rate by 20%, but also generated more qualified and engaged leads.
Tags : explainer video, animated video, whiteboard video, conversion rate, landing page conversion rate, marketing video, video marketing, online video marketing
     Switch Video
By: Datawatch     Published Date: Mar 21, 2014
Big Data is not a new problem. Companies have always stored large amounts of data—structured like databases, unstructured like documents—in multiple repositories across the enterprise. The most important aspect of big data is not how big it is, or where it should be stored, or how it should be accessed. It’s the efficacy of business intelligence tools to plumb its depths for patterns and trends, to derive insight from it that will give companies competitive advantage in an increasingly challenging business climate. Visualization allows companies to analyze big data in real-time across a variety of sources in order to make better business decisions.
Tags : visual data discovery, decision making software, data variety, business analysis, data visualization, big data, business analytics, business intelligence
     Datawatch
By: Office Depot     Published Date: Dec 01, 2015
How do you create a comfortable workplace that inspires creativity and productivity? There is no one right formula. This guide identifies some of the important aspects of workplace design – from office layout to ergonomic products and desk accessories – to help you make decisions that may make sense for your employees and your bottom line.
Tags : workplace design, creativity, human resources
     Office Depot
By: IBM     Published Date: Sep 11, 2013
Learn how a better grasp of "big data" from consumers will help retailers generate valuable insights for personalizing marketing and improving the effectiveness of campaigns among other things.
Tags : big data, retail, insights, marketing, campaigns, velocity of data
     IBM
By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : endpoint security, security, threat prevention, threat detection, security solution
     Symantec
By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : stack costs, online purchasing, promotion delivery, mobile retail
     IBM
By: IBM     Published Date: Dec 02, 2014
Across the automotive industry, organizations are using analytics to transform all aspects of their business. In the vast majority of instances, the analytics performed is on data that is already available within the organization or wider automotive ecosystem, but has not yet been tapped to use its full potential. Analytics can unlock the value held in this data, helping to answer key “what if” questions across the organization and the value chain. For example, what if dealerships could better understand their customers’ digital journey? Or what if manufacturing could improve visibility into parts, assembly and vehicle inventory?
Tags : automotive analytics, automotive ecosystem, automotive manufacturing, advanced analytics
     IBM
By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm
     IBM
By: IBM     Published Date: Sep 21, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : ibm, healthcare, implementation, hippa, rules
     IBM
By: IBM     Published Date: Nov 04, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : ibm, commerce, b2b, b2b integration, hipaa, hipaa rules, request for interpretation, hipaa implementation guides
     IBM
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
     Group M_IBM Q418
By: Microsoft Dynamics     Published Date: Jul 09, 2007
J.D. Byrider's franchisees experienced a high level of frustration due to an old system running on Linux using dBase files. Byrider made the decision to switch their development environment to Intel-based servers in a Microsoft SQL Server and ASP development environment. Download this paper to read about their results.
Tags : application integration, financial, finance, accounting, accounting software, enterprise software, business management, workflow
     Microsoft Dynamics
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics