discover

Results 1 - 25 of 1740Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analyticsbut the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Choosing Azure revolutionises your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: Terminate Zombie Assets Delete Aged Snapshots Rightsize Virtual Machines Rightsize SQL Databases Read 10 Best practices for Reducing Spend in Azure, to learn key strategies for optimising cloud spend and saving 10-20?% on your monthly Azure costs.
Tags : 
    
CloudHealth by VMware
Published By: Unit4     Published Date: Apr 12, 2019
Financial planning and analysis is evolving to support digital business initiatives. Application leaders supporting finance transformation must focus on new ways of managing financial performance by enabling broader integration with operational plans and actionable performance reporting. Download this complimentary Gartner report and discover how.
Tags : 
    
Unit4
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vis innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the citys ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get Scaling Inline Threat Prevention Tools to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Mar 14, 2019
Get a firsthand account of how Forcepoints CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
The EU General Data Protection Regulation (GDPR) is now in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development, application integration, enterprise software, software testing
    
Black Duck Software
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research reportpresented by Epicor Softwareyoull discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Anaplan     Published Date: Apr 02, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous years spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) canand thats whats driving its increasing adoption in these volatile economic times. Download this white paper to discover: Benefits of implementing a ZBB process at your organization 5 best-practice approaches to implementing ZBB Tips for leveraging ZBB in your organization in todays volatile economy
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Apr 09, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous years spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) canand thats whats driving its increasing adoption in these volatile economic times. Download this white paper to discover: Benefits of implementing a ZBB process at your organization 5 best-practice approaches to implementing ZBB Tips for leveraging ZBB in your organization in todays volatile economy
Tags : 
    
Anaplan
Published By: gyro     Published Date: Feb 01, 2019
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or worse damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
advertising, humor, qualitative research, quantitative research, b2b advertising
    
gyro
Published By: Intel     Published Date: Mar 19, 2019
Digital kiosks are fast becoming ubiquitous in quick-service restaurants, cinemas and retail stores as retailers grapple to embrace automated, digital solutions to keep up with rising labour costs, customer expectations and stiff competition. To maximise the value of self-ordering kiosks, retailers should not perceive digital kiosks as a means to an end but a critical touchpoint within the customer journey. Download the whitepaper to discover how the new generation of self-order kiosks Can resolve the challenges of acquiring, training and maintaining a workforce Can enhance customer experiences throughout the entire shopping and purchasing process Can facilitate better business decision making through access to valuable customer data
Tags : 
    
Intel
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, change management, server virtualization, application integration, business intelligence
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Dec 09, 2008
Generally, CMDBs populated by discovery tools alone simply aren't usable. They fail because they contain massive amounts of irrelevant information. You avoid this pitfall by correctly populating your CMDB in four simple steps.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application performance management, best practices, business activity monitoring
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: Gigaom     Published Date: Apr 10, 2019
In this 1-hour recorded webinar, viewers will discover why the data center of the future will need to co-exist with cloud environments for a long time to come.
Tags : 
nutanix, hyperconverged, cloud, public cloud, cloud environment, cloud computing, hci, infrastructure, convergence, storage management, application integration
    
Gigaom
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
123Together
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design
    
OneUpWeb
Published By: SuccessFactors     Published Date: Jun 21, 2012
Discover how you can leverage talent management processes to drive business execution.
Tags : 
human resources, talent management, business execution
    
SuccessFactors
Published By: Astaro     Published Date: Jan 19, 2011
This white paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content.
Tags : 
astaro, content retention, email content, legal discovery, data mining, knowledgement management, electronic content, content delivery, content integration, content management system
    
Astaro
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.