RSS feed Get our RSS feed

News by Topic

business strategies

Results 26 - 50 of 337Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Oracle     Published Date: Nov 27, 2017
The need for closer collaboration between finance and HR has never been more important. Finance has become the co-pilot to the business, providing the forward-looking guidance management needs to capitalize on the next market opportunity. HR plays an essential role in ensuring that the business has the talent it needs to execute on digital strategies, and create a change-ready culture. Oracle commissioned new research by MIT Technology Review Custom, called Finance and HR: the Cloud’s New Power Partnership, to understand how closer collaboration between Finance and HR could support digital transformation and unlock new benefits.
Tags : it cooperation, cloud, provider, finance, partnership, collaboration, internal team, integration specialist
     Oracle
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
     Hewlett Packard Enterprise
By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
     Oracle Linux
By: VMware     Published Date: May 20, 2011
Discover how visionary business leaders are using Windows 7 migration strategies to build a virtualized desktop architecture that will deliver long-term strategic business advantage.
Tags : vmware, windows 7, migration, windows xp, business dividends
     VMware
By: Prophix     Published Date: Jun 03, 2016
Discover how best-in-class organizations are using financial consolidation as the catalyst to better strategic financial analysis and business decision making. Learn about how the best finance operations deliver faster, more accurate and more automated close and consolidations. Hear about Space Saver a Prophix customer and how his company uses Prophix for financial consolidation and to help them plan their product inventories, their product discounting strategies, and their product mix.
Tags : financial consolidation, best practices, prophix, productivity, competitive advantage
     Prophix
By: Socialbakers     Published Date: Aug 05, 2015
The benefits of running a truly social business are many - driving shorter sales cycles, improving customer care, innovating your talent recruitment strategies, and improving how you coordinate your organization from top to bottom in pursuing unified goals.
Tags : social media, social business, customer care, recruitment, recruitment strategies, marketing tools, social techniques, social media strategy
     Socialbakers
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. Discover the core characteristics of the modern enterprise, and the new ERP strategies adopted by rapidly growing enterprises like Williams-Sonoma and Knowledge Universe to support their growth.
Tags : business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software
     Netsuite DWASF Leads Display Q1 2015
By: Kaminario     Published Date: May 05, 2016
The most successful Software-as-a-Service (SaaS) businesses adopt infrastructure strategies that deliver the economics, agility, and user experience that support customer acquisition and retention.
Tags : storage management, performance management, best practices, application integration, software protection, business intelligence, infrastructure
     Kaminario
By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
     CloudHealth by VMware
By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
     Dell Server
By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
     Google
By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : cognizant, finance, digital
     Cognizant
By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
     CA Technologies
By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
     WNS
By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : network management, network
     HP - Enterprise
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
     Blue Coat Systems UK
By: Success Factors     Published Date: Jul 27, 2012
The complimentary 2011-12 Towards Maturity Benchmark report consolidates the experiences of more than 1,800 organizations over the last 8 years. It cuts through the hype to show how HR leaders in real organizations are using both established and new learning technologies to help improve performance and business agility. Download today.
Tags : success factors, sap, towards maturity, towards maturity benchmark, boosting business agility, learning technologies, learning strategies, technology-enabled learning
     Success Factors
By: Success Factors     Published Date: Jul 08, 2014
Engaging candidates must be a priority throughout the entire hiring process. Shifting organizational needs and changing business conditions keep recruiting strategies in a constant state of flux, and top candidates usually aren’t sitting on the sidelines waiting to be found. Responding rapidly and using a variety of strategies — from turning your employees into candidate advocates to creating talent communities to involving hiring managers earlier in the process — can be the difference between hiring a great candidate and missing out.
Tags : success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
     Success Factors
By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
     CA Technologies
By: Onbase     Published Date: Feb 18, 2016
During the past 10 years, organizations have adopted accounts payable (AP) automation technologies at an accelerating pace. Document imaging, data capture, and other solutions are radically transforming the way AP departments work with their traditionally most common medium, paper. At the same time, the promise of electronic transactions is quickly becoming more of a reality, with growth year after year in the number of transactions sent and received electronically.
Tags : accounts payable, account management, business practices, optimization strategies
     Onbase
By: Oracle ODA     Published Date: Dec 06, 2016
It’s no secret that data-driven business strategies have resulted in unprecedented data growth and management of more complex database structures. Not only that, but IT leadership continues to play a strategic role in the direction of the business, especially as these disruptive business strategies come into play. This white paper addresses some of the key considerations IT management should have as they evaluate their IT roadmap and infrastructure to meet these dynamic enterprise needs.
Tags : 
     Oracle ODA
By: GE Power     Published Date: Jan 26, 2017
2016 was a year of accelerating change that will impact the power industry across the entire Electricity Value Network. Power leaders determined to thrive in this rapidly changing landscape must understand these trends, how they will impact their business models and the transformative role of digitalization. In this Executive Brief, GE outlines the trends that warrant consideration by every power and utility executive as they develop strategies for success in 2017.
Tags : 2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids
     GE Power
By: RedPoint Global     Published Date: May 11, 2017
While they’re intensifying, business-data challenges aren’t new. Companies have tried several strategies in their attempt to harness the power of data in ways that are feasible and effective. The best data analyses and game-changing insights will never happen without the right data in the right place at the right time. That’s why data preparation is a non-negotiable must for any successful customer-engagement initiative. The fact is, you can’t simply load data from multiple sources and expect it to make sense. This white paper examines the shortcomings of traditional approaches such as data warehouses/data lakes and explores the power of connected data.
Tags : customer engagement, marketing data, marketing data analytics, customer data platform
     RedPoint Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics