RSS feed Get our RSS feed

News by Topic

play

Results 801 - 825 of 1167Sort Results By: Published Date | Title | Company Name
By: HP Ecommerce     Published Date: Aug 05, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance — as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
     HP Ecommerce
By: WePow     Published Date: Sep 02, 2015
Do you want to win the talent war when it comes to connecting with eager college graduates? Download this free playbook to learn how to implement these strategic recruiting tips to position your organization apart from competitors.
Tags : video interviews, hr technology, recruitment, candidate screening, talent acquisition, university relations, college hiring, campus recruiting
     WePow
By: VMware AirWatch     Published Date: Dec 09, 2016
What is desktop transformation? What role can it play in your organization? And what benefits can it deliver to your IT team and your employees? This resource explores these and other questions, as well as a new desktop strategy that can help you streamline operations, improve productivity, enhance security, and give your end users freedom. Access now and you’ll take a look at eight frequently asked questions about desktop transformation and how you can get your project started today.
Tags : 
     VMware AirWatch
By: IBM     Published Date: Mar 28, 2016
Big data. We've heard the phrase for quite some time, but how can human resource leaders get into the action? One way is through the development and implementation of talent analytics strategies. Talent analytics is fundamentally changing the way organizations and practitioners are thinking about the role of HR and organizations uncovering never before seen insights.
Tags : ibm, smarter workforce, talent management, talent analytics
     IBM
By: Rosetta Stone     Published Date: Dec 07, 2017
The new federal law, Every Student Succeeds Act (ESSA), creates new opportunities to secure funding for language programming. Funding is available, but the strategies to secure the money must be carefully measured. Taking a strategic approach to this opportunity is critical. Download the whitepaper to read more about the funding sources that should play into your strategies.
Tags : language programs, k-12, rosetta stone, every student succeeds act (essa), federal funding strategies
     Rosetta Stone
By: Dell Software     Published Date: Aug 31, 2016
This white paper displays how you can have maximum ROI when using Dell software.
Tags : 
     Dell Software
By: Dell Software     Published Date: Aug 31, 2016
This white paper displays how Rapid Recovery helps you get your apps back in business, fast.
Tags : 
     Dell Software
By: Schneider Electric     Published Date: Aug 15, 2017
Schneider Electric is integrating datacenter infrastructure management (DCIM) software, big-data analytics and cloud services into the management of customers’ datacenters. Its recently launched StruxureOn cloud offering signals a new wave in datacenter operations, using a combination of machine learning, anomaly detection and event-stream playback to give operators real-time insights and alarming via their smartphones. More capabilities and features are planned, including predictive analysis and, eventually, automated action. Schneider’s long-term strategy is to build a partner ecosystem around StruxureOn, and provide digital services that span its traditional datacenter business.
Tags : incident tracking, historical trending, troubleshooting, operational analysis, prediction model, schneider equipment, maintenance, firmware updates
     Schneider Electric
By: SAP     Published Date: Sep 10, 2010
The forces of consumerization are sweeping over the mobile world, with workers bringing their personal devices into the office and increasingly asking for IT support for those devices. How you respond to this challenge will say a lot about the mobile environment of your organization as a whole, and a lot as well about just how productive these mobile users can be. This strategic PlayBook and accompanying Webcast will offer you very practical ways to grab hold of this mobile trend of consumerization and help your mobile workers to be more effective and productive.
Tags : sap, consumer mobile devices, iphone, adoption, mobility, wireless, smartphones
     SAP
By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone
     SAP
By: SAP     Published Date: Mar 24, 2011
Nearly all companies realize that the way to gain a competitive advantage is to obtain better data, interpret them quickly, and distribute them in easier-to-use formats. However, there are many obstacles to the effective use of data and few companies surmount them all-a fact that results in a lot of unused corporate data. How are companies using information to beat their rivals and create a more level playing field? This report from the Economist Intelligence Unit examines how their practices are evolving and offers examples of data use at some highly successful companies.
Tags : competitive advantage, corporate data, data use, data usage
     SAP
By: SAP     Published Date: Apr 07, 2011
In companies of all sizes, the chief financial officer (CFO) is the crucial link between strategy and execution. The CFO acts as a trusted advisor to the chief executive officer (CEO) in mapping out your company's strategic vision, and plays a key role in making sure that vision is realized in all business activities in a profitable way.
Tags : financial planning, budgeting, forecasting, sap, business intelligence
     SAP
By: SAP     Published Date: Apr 14, 2011
Display marketers are eager to launch mobile campaigns. But they face challenges such as audience fragmentation, a chaotic vendor landscape, and myriad new technologies and devices. In order to navigate these challenges, we recommend that marketers focus on creating convenient mobile experiences by building mobile display campaigns that are simple, immediate, and contextually relevant to the section of their audience most likely to use them.
Tags : mobile display, melissa parrish, mobile marketers, tracking, audience fragmentation, mobile campaign, mobile experience, forrester
     SAP
By: 123Together     Published Date: May 27, 2008
Email has become THE mission critical application for businesses large and small. As a growing business continually striving to increase productivity, collaboration and corporate success, you understand the important role that Microsoft Exchange Server plays in any profitable business. Small and mid-size businesses alike see the productivity benefits of utilizing an enterprise-class solution but since many do not have the financial or human resources to bring it in house, more and more of them are turning to a hosted solution.
Tags : 123together, it strategies, economy, stability, migration, collaboration, green it, outsourcing
     123Together
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : artificial, intelligence, enterprise
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : artificial, intelligence, cybersecurity, machine
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : malware, predictive, test, response
     BlackBerry Cylance
By: OKTA     Published Date: Apr 24, 2018
"It’s important to understand the role that an Identity platform plays in modern enterprise IT. In the past, Identity and Access Management systems were an afterthought. They were put into place after making many of your other architectural decisions. With the move to web, cloud and mobile, IAM has become a key variable in hardware and software deployment, as well as in operational strategy. This webinar will reveal why leveraging an IAM platform, built as a single cloud-based platform for security across on-prem and cloud, can solve these issues."
Tags : 
     OKTA
By: VMware     Published Date: Apr 11, 2011
The HP Insight Software portfolio includes HP Insight Control and HP Insight Dynamics, which play a central role in reducing overall data center operating expenses and differentiating HP offerings from competitive offerings. Download this whitepaper to learn more.
Tags : vmware, hp insight software, server management, data center operating, optimization
     VMware
By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
     SAS
By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
     SAS
By: AON     Published Date: Oct 25, 2016
In his webinar, Creating a Culture of Employee Engagement, Aon Partner Don MacPherson discusses employee engagement and its influence on organizations. Don offers a unique insight into the drivers of engagement, the role of employees and leadership in institutionalizing engagement, and the steps companies can take to establish a culture of engagement.
Tags : 
     AON
By: IBM     Published Date: Oct 09, 2015
In this white paper, IDC Energy Insights discusses the current and future challenges that utilities face in meeting their business objectives and the role analytics will play.
Tags : ibm, analytics, research, data, demand growth, utilities, energy
     IBM
By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : e-training, etraining, e-learning, elearning, employee education, education, training, collaboration
     WebEx Communications
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics