RSS feed Get our RSS feed

News by Topic

technologies

Results 326 - 350 of 3620Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : akamai, akamai gaming, infrastructure, distribution channel, technological advancements
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
     Akamai Technologies
By: TIBCO Software     Published Date: Oct 03, 2018
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today's market. Now there has been a shift away from these "black box" applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : artificial intelligence, machine learning, dynamic pricing, predictive claims, real-time fraud, contextual customer experience, operational effectiveness
     TIBCO Software
By: TIBCO Software     Published Date: Jul 22, 2019
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today’s market. Now there has been a shift away from these “black box” applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
     TIBCO Software
By: Act-On     Published Date: Apr 29, 2016
Traditionally, sales and marketing haven't always seen eye-to-eye. Our 2015 Sales and Marketing Alignment Survey clearly shows that in order to exceed revenue goals, outdated traditions need to change. In the eBook, we will show you the direct relationship between alignment and revenue performance and how the use of the right technologies will support business success.
Tags : market, management, marketing, business optimization, business strategies, sales, technology
     Act-On
By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
     Stratus Technologies
By: KPMG     Published Date: Oct 15, 2019
The alternative investment industry is increasingly feeling the impact of digital technologies, but are hedge funds and private equity firms moving quickly enough to adapt to the digital world? Read now KPMG's report Alternative investments 3.0 and understand how the alternative investment industry can embrace disruption and accelerate digital innovation.
Tags : 
     KPMG
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Offrire un'esperienza a cinque stelle è più difficile che mai. Per conquistare realmente l'interesse e la fedeltà dei clienti occorre che le applicazioni e i servizi assicurino esperienze affidabili e soddisfacenti per gli utenti, siano abbastanza scalabili da supportare le loro esigenze in evoluzione e vengano aggiornate regolarmente con le più recenti innovazioni.
Tags : 
     CA Technologies EMEA
By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : cloud-computing, malware, cisco, malware infection, amp, security
     Cisco
By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
     Cymfony
By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity
     Akamai Technologies
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : api, application programming interface, psd2, open banking, json, github
     CA Technologies EMEA
By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Every enterprise has a wide variety of IT requirements where integration is needed. The rapid proliferation and adoption of cloud and mobile technologies has accentuated the financial impact of these needs. In response, the integration space has matured to include feature-rich stacks from enterprise integration vendors that provide full, multi-layer platforms in the form of an Enterprise Service Bus (ESB) or SOA suite. But with these very broad capabilities comes complexity—multi-layer stacks can be difficult and costly to install, debug, administer and secure.
Tags : 
     CA Technologies
By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : password, password management, access control, server access, network management, windows, windows management, user access
     ElcomSoft
By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
     CA Technologies
By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Ultimus     Published Date: Aug 16, 2007
In the coming years, we believe that BPM will become the most important technology-driven business initiative for most companies. It leads you toward a focus on using technology to support your business processes, rather than adapting your business processes to support your technologies. It provides strong, sustainable ROI and competitive advantage.
Tags : ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
     Ultimus
By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
     SAS
By: Zebra Technologies     Published Date: May 02, 2018
Near-perfect inventory visibility is critical to transforming the customer experience and competing in the retail revolution. Yet inventory accuracy across retail sectors hovers at around 60%. That shortfall causes retailers to lose out on potential sales and puts customer loyalty at risk.How do retailers address this issue? RFID—or radio frequency identification—is 10 times more efficient at cycle counting and can increase inventory accuracy across the supply chain by up to 99.5%, enabling retailers to truly compete in the highly competitive omnichannel world. Launch a successful RFID technology pilot program in your retail operation with our free How-to Guide: Five Steps to Piloting RFID for Unprecedented Inventory Visibility. This guide takes you from Step 1 (a KPI checklist) to Step 5 (execution and monitoring), so you can launch a pilot program and effectively measure its ROI before moving to full deployment. Download the free Guide today.
Tags : rfid, program, inventory, guide, risk, customer
     Zebra Technologies
By: IBM     Published Date: Sep 11, 2017
There's a new wave of work automation now starting to impact businesses. Yes, partly this is enabled by Machine Learning technologies and techniques: but there's more to it. The new wave of automation brings advances in interaction, insights and integration. This report lays out the landscape.
Tags : work automation, machine learning, integration, interaction, automation
     IBM
By: Dell EMC     Published Date: Aug 03, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance
     Dell EMC
By: Dell EMC     Published Date: Nov 02, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : emc, afa, enterprise, hdd, array, storage
     Dell EMC
By: IBM     Published Date: Dec 21, 2012
Recent Gartner research indicates that the confluence of information generated by new technologies and sources such as cloud computing will create a nexus of forces that could be even more disruptive than the dot-com and e-business booms of the 1990s
Tags : ibm, company, business intelligence, analytics, information, nexus of inforamtion
     IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics