RSS feed Get our RSS feed

News by Topic

hr technology

Results 1 - 25 of 589Sort Results By: Published Date | Title | Company Name
By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There has been much speculation (not to mention exaggeration) over recent years about the fabled dark web. We’ve heard how this shady underworld is the refuge of the cybercriminal elite, and even nation-state threat actors. That this is their “Wolf’s Lair,” where they gather to plot the breaching of businesses, the downfall of governments, and the hacking of celebrities. As with much mainstream reporting of technology, and cyber threats in particular, there’s a grain of truth here. This less accessible and more volatile corner of the internet as we know it does offer those with less honourable motive a secret marketplace for their wares. The confusing terminology around what the dark web is or isn’t shouldn’t be a barrier to defenders realizing the anonymous communities, and how it can be used to produce valuable threat intelligence.
Tags : 
     Recorded Future
By: SAP     Published Date: Feb 03, 2017
Companies across the globe are all facing the same economic headwinds: business change in the form of competitive threats and new opportunities is coming at an unprecedented pace. The watchword for meeting these challenges is innovation – both in terms of business processes as well as the underlying technology that enables those processes. The sum of the experiences discussed in this report showcase how SAP S/4HANA, running on-premise or in the cloud, can form the basis for a broad-based business transformation that does not require a big bang implementation to succeed.
Tags : 
     SAP
By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
     SAP
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
     Red Hat
By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
     QTS
By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
     BigCommerce
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Mar 14, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. For years, Cisco has been warning defenders about escalating cybercriminal activity around the globe. In this, our latest annual cybersecurity report, we present data and analysis from Cisco threat researchers and several of our technology partners about attacker behavior observed over the past 12 to 18 months.
Tags : 
     Cisco EMEA
By: Akamai Technologies     Published Date: Sep 12, 2017
The modern digital experience is very much a visual experience. It's through images that we tell our stories, market our products, impart news, and entertain — and forge an emotional connection with our customers. However, delivering today's increasingly image-rich experiences is fraught with complexity. It requires dozens of renditions to optimize an image for all the devices that customers are using, not to mention their current network connection. Without an automated system, it's a daunting task. Dynamic imaging technology is the solution.
Tags : digital experience, imaging, imaging solution, system automation, customer experience
     Akamai Technologies
By: Avaya     Published Date: Jun 15, 2016
Engage everywhere to improve everywhere Two out of three executives under the age of 35 are frustrated by technology at work, but believe they can be more productive with information sharing, and that better communications will positively impact business growth. Find out how else the digital revolution is impacting midsize businesses.
Tags : technology, productivity, communications, best practices, digital
     Avaya
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
     Hewlett Packard Enterprise
By: HP Enterprise Business     Published Date: Jan 20, 2017
Gain complete visibility and control of your entire IT environment with 110+ tool and technology integrations for Operations Bridge. Download now to learn more.
Tags : 
     HP Enterprise Business
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
     Cisco
By: Time Warner Cable Business Class     Published Date: Apr 04, 2016
This guide gives you an overview of the steps you need to build a foundation for sustainable growth—the kinds of investments, drivers and differentiators that are involved. It does so through the words and experiences of fellow decision makers who’ve overcome daunting technology challenges, and in doing so realized their greatest achievements. Use the guide to get ready for great achievements of your own.
Tags : time warner cable, business class, internet, voice, television, network services, cloud
     Time Warner Cable Business Class
By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : pentaho, analytics, platforms, hadoop, big data, predictive analytics
     Pentaho
By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
     Aria Systems
By: Hewlett Packard Enterprise     Published Date: Apr 13, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the MIT Technology Review interview with HPE’s Kawalec and FireEye's Vitor Desouza in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
     Hewlett Packard  Enterprise
By: Jamf     Published Date: Mar 29, 2018
If you’re anything like your peers, you are evaluating your education technology on an annual basis to determine if it’s time for a refresh. While most schools conduct their device refreshes during the summer because teachers, staff and students are not present, this timing can prove costly as the market is flooded with devices from schools doing the same thing. To help school districts re-think their technology spending to focus more on total cost of ownership and residual value, as opposed to upfront cost, we’ve partnered with Diamond Assets — a technology buyback company — to explain: • The true value and cost of iPad and Chromebook in education • When schools receive the most trade-in value for their technology • How to prepare for and execute technology refreshes
Tags : 
     Jamf
By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     IBM
By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
     Dome9
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Whether you know it as Industry 4.0, the 4th Industrial Revolution, or Smart Industry, Manufacturing is going through a deep transformation, with changes that are centered around digitalization. While most industries are already on this digitalization path, the disruption is more visible and pronounced in manufacturing because it is expanding virtual data and processes into environments that have been fundamentally about physical products. This transformation has already started, and its impact is expected to be massive. Technical, economic, and social changes are expected across the whole manufacturing ecosystem, with jobs shifting from offshoring back to nearshoring. Strong technology elements driving this digital revolution include 3D printing, robotizing and automation, smart factory with IoT and machine learning, and supply chain digitization. Their impact is profound.
Tags : 
     TIBCO Software GmbH
By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : apis, risks of apis, apis can increase organization's risks, api security
     CA Technologies
By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management
     Collaborative Consulting
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics