RSS feed Get our RSS feed

News by Topic

leverage

Results 51 - 75 of 976Sort Results By: Published Date | Title | Company Name
By: Glint     Published Date: Sep 19, 2017
When building an employee engagement survey, one question outweighs all others: How can the results be made as actionable as possible? This white paper explores new approaches being leveraged by enterprises today.
Tags : employee engagement, hr metrics, employee engagement survey, employee engagement strategies, employee engagement strategy
     Glint
By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
     Oracle CX
By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
     Oracle CX
By: SAP EMEA Global     Published Date: Dec 13, 2017
For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing. (IDC defines IoT as a network of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity.) These scenarios more tightly integrate “things” with other information, processes, and even value chains. Further, we demonstrate how companies in these industries leverage technology to create business value today and disruptive opportunities tomorrow.
Tags : 
     SAP EMEA Global
By: KPMG     Published Date: Nov 21, 2018
Many BPO providers have already invested heavily in robotic process automation (RPA), providing an opportunity to renegotiate your BPO contract to reflect the cost savings they are making as a result. But there’s more. Contract renegotiation also creates an opportunity to leverage providers’ investment to accelerate automation in your own business. Read this to discover: • the benefits of automating business processes and the impressive level of cost savings this can deliver • the impact of automation on the BPO market and the implications this has for BPO contracts • a five-step processing for assessing and renegotiating your outsourcing contract • three options for starting your automation journey.
Tags : 
     KPMG
By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
     Oracle
By: MediaRadar     Published Date: Nov 21, 2018
What are the latest native trends, which are the product categories spending the most? How can you successfully implement native advertising and fully leverage this high-cpm ad format? Find out in our latest trend report. You’ll Learn: Which product categories are spending the most on native The major challenges with and benefits of native advertising Ways in which you can successfully implement native advertising What’s next for native advertising
Tags : 
     MediaRadar
By: Dell EMC Storage     Published Date: Aug 15, 2019
The digital era has ushered in a proliferation of data that powers modern businesses. When leveraged properly, organizations are seeing the potential of data to drive better outcomes across all aspects of their business. Using data to support different workflows, analytics, and activities transforms it into data capital — a digital asset that will drive value for the business. The extent to which an enterprise aligns its organization around this data capital mindset — in both the way they use data and the way they invest in data technology — can have lasting impacts on the success of the business. In February 2019, Dell EMC and Intel commissioned Forrester Consulting to evaluate whether the ability to harness and apply data and analytics at every opportunity is fast becoming a prerequisite for success. To test this, Forrester conducted a global survey of 516 IT decision makers. The survey found that companies with more mature data capital practices — leveraging more data types, managin
Tags : 
     Dell EMC Storage
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
     Fortinet EMEA
By: HP Inc.     Published Date: May 20, 2019
With a couple of swipes, a like and a share, what’s in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fastspreading global pop culture that determines what’s hot, and what’s not, almost instantly. By creating unique printed and digital assets that engage consumers and drive social media posts (and a whole lot of likes and shares), brands can leverage the “Instagram effect” to attract customers. Start with these trends, and keep reinventing!
Tags : 
     HP Inc.
By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
     Akamai Technologies
By: Dell     Published Date: Nov 19, 2015
Here is a simple guide to help you truly leverage the power of cloud now, without creating stumbling blocks in your overall journey.
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 09, 2015
While the EDW plays an all-important role in the effort to leverage big data to drive business value, it is not without its challenges. In particular, the typical EDW is being pushed to its limits by the volume, velocity and variety of data. Download this whitepaper and see how the Dell™ | Cloudera™ | Syncsort™ Data Warehouse Optimization – ETL Offload Reference Architecture can help.
Tags : 
     Dell EMC
By: Zebra     Published Date: Oct 12, 2011
Re-pricing products in the store has become a strategic tool that retailers apply to increase traffic and sales. This white paper explains how retailers are profiting from mobile markdown printing and how stores can leverage different printing applications to create more value.
Tags : zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions
     Zebra
By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : dns< security breach, cyber security
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
     Akamai Technologies
By: TriNet     Published Date: Nov 26, 2012
Download this white paper for insights on specific techniques startups and growing businesses can use to leverage the benefits and avoid the pitfalls of social media.
Tags : social media, employee engagement, social media policy, social networking
     TriNet
By: Collaborative Consulting     Published Date: Dec 20, 2013
The explosion of Big Data represents an opportunity to leverage trending attitudes in the marketplace to better segment and target customers, and enhance products and promotions. Success requires establishing a common business rationale for harnessing social media and determining a maturity model for sentiment analysis to assess existing social media capabilities.
Tags : collaborative consulting, big data, social media, customer sentiment, influence sentiment, govern sentiment, maturity model, generate revenue
     Collaborative Consulting
By: HP     Published Date: Mar 23, 2015
Increase productivity for small and midsize business with HP ProLiant Gen9 servers. Today, business executives are seeking ways to become more productive so that they can deliver new products and services faster, increase operational efficiencies, grow revenue, increase margin and gain market share. Increasing the productivity of IT resources and staff is critical for their success. New innovations now make it possible for small and midsize businesses (SMB) to leverage the performance and efficiencies that were once only affordable by large enterprises. Businesses of all sizes face similar issues as they look to grow their business efficiently.
Tags : 
     HP
By: HPE     Published Date: Mar 23, 2015
Increase productivity for small and midsize business with HP ProLiant Gen9 servers. Today, business executives are seeking ways to become more productive so that they can deliver new products and services faster, increase operational efficiencies, grow revenue, increase margin and gain market share. Increasing the productivity of IT resources and staff is critical for their success. New innovations now make it possible for small and midsize businesses (SMB) to leverage the performance and efficiencies that were once only affordable by large enterprises. Businesses of all sizes face similar issues as they look to grow their business efficiently.
Tags : 
     HPE
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Dell EMC     Published Date: May 10, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace. In this IDC white paper, learn how to leverage converged infrastructure as a cost-effective and efficient platform to support virtual client computing environments with Dell EMC. Download this white paper from Dell EMC and Intel® to learn more.
Tags : 
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics