RSS feed Get our RSS feed

News by Topic

trend

Results 1 - 25 of 1838Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Aug 17, 2018
Dell EMC technology for Digital Manufacturing harnesses the workstation, HPC and storage capabilities that combine to enable better products, more efficient design and production processes, and meet rapidly changing customer preferences. Collecting, collating and digesting more and more data in the entire ecosystem, from product modelling to after-sales trends, are making the digital factory a powerful and necessary reality in the manufacturing landscape.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : internet, web, attacks, technology, ddos
     Akamai Technologies
By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
     CyberSource
By: Here Technologies     Published Date: Sep 26, 2018
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now.
Tags : 
     Here Technologies
By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : data infrastructure, big data, internet of things
     Hitachi Vantara
By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing
     Spredfast
By: Cisco     Published Date: Sep 27, 2018
Blockchain, called the “tech breakthrough megatrend” by PWC¹, is rapidly gaining broad acceptance. According to IDC, global spending on this innovative technology is expected to reach $2.1 billion in 2018.² Across the globe, industries are investigating ways to use blockchain to increase trust across their business value chains and address primary challenges around complexity, transparency, and security.
Tags : 
     Cisco
By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 42.3% of respondents in ASEAN countries saying they deal with more than 50 alerts each day. Shockingly, for 7% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in ASEAN.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
     Juniper Networks
By: ServiceNow     Published Date: Sep 18, 2018
What is a performance based business? A performance-based business is an organization guided by data-driven decisions. It is proactive, self-aware, and highly competitive. Data isn’t siloed in a business analytics department. Instead, the right people have the right data at the right time and in the right context. The top 5 reasons to become a performance-based business: 1. Get better results. 2. Align your entire business. 3. Make data-driven decisions. 4. Manage change more effectively. 5. Spot trends faster. Discover how ServiceNow Performance Analytics could benefit your business by downloading this eBook.
Tags : performance, business, data, servicenow
     ServiceNow
By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
     T Systems
By: Workday     Published Date: Aug 07, 2018
Meet the complex needs of your healthcare organization with a single cloud-based system that combines analytics, planning, finance, and HR for more comprehensive supply chain management. Read the datasheet to learn how you can: Reduce supply chain costs while improving inventory control, gain deep insight into the cost, quantity, and utilization of your supplies, and identify purchasing trends and standardize opportunities.
Tags : 
     Workday
By: Workday     Published Date: Aug 07, 2018
From the rise of data analytics to new needs in budgeting, the shift to value-based medicine is bringing a fresh set of challenges to healthcare CFOs. How can you best meet these new demands and turn change into opportunity? This Becker’s Hospital Review eBook compiles 10 must-read articles that offer executive tips, actionable insights, and noteworthy trends for healthcare finance technology.
Tags : 
     Workday
By: Workday     Published Date: Sep 14, 2018
This guide from GovLoop offers nine IT priorities that can help state and local governments stay on the cutting edge. Read the guide to learn how the latest trends in recruitment, procurement, and cloud computing technology can help you increase efficiency and reduce costs.
Tags : 
     Workday
By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do! ? Understanding variations and similarities in laws across jurisdictions ? Understanding how local laws relate to federal and state laws ? Identifying implications related to temporary and contract staff ? Ensuring compliance with notification, documentation, acc
Tags : paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
     XpertHR
By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do!
Tags : paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
     XpertHR
By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do!
Tags : paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
     XpertHR
By: Kronos     Published Date: Sep 24, 2018
This is the second in a series of three white papers that discuss proven strategies and best practices for optimizing three key elements of success — People, Process, and Technology — to address critical challenges and drive competitive advantage in today’s logistics industry. Keep reading to gain valuable insights into the “Process” trends and issues that are top of mind for managers across the logistics sector.
Tags : 
     Kronos
By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
     Pindrop Security
By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : data infrastructure, big data, internet of things
     Hitachi Vantara
By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
     Coyote Point Systems
By: ASG Software Solutions     Published Date: Mar 05, 2008
Because business success is tightly fused with technology, IT costs are rising, and this trend is expected to continue. As a result, businesses are demanding that IT be more than a static resource. IT is expected to deliver business results with a measurable contribution to the organization's bottom line.
Tags : asg, cmdb, bsm, itil, paradigm, btsm, sla, configuration management
     ASG Software Solutions
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
     StrongMail
By: Gigaom     Published Date: Oct 03, 2018
Mixing the cloud model with data warehousing can generate unexpected synergies. In this 1-hour recorded webinar, you will learn data warehousing fits into multi-cloud architectures.
Tags : attunity, cloud data warehousing, data warehousing, cloud, cloud computing, data lakes, cloud architecture
     Gigaom
By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     Cylance
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics