here

Results 1 - 25 of 5049Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. Theyre in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. Thats the modern reality of business lifeits happening everywhere at once. Not only that, its happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are its no longer 9 til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost centerthey are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: Improved infrastructure management and flexibility More time for IT to focus on strategic projects rather than manage data centers. Better IT cost management In fact, 49% of companies cite modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
Organizations are digitally transforming to take advantage of new ways of working. Download this infographic to learn how.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
With Citrix and Google Cloud secure digital workspace solutions, theres nothing to stop your organization from moving forward. Download this infographic to learn more!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Sage EMEA     Published Date: May 13, 2019
Your ERP system might be out of date and too complex to handle your industrys challenges. Should you upgrade to an enterprise management solution? Now you can. Here are 4 reasons why
Tags : 
    
Sage EMEA
Published By: Sage EMEA     Published Date: May 13, 2019
There is a better way for manufacturers, distributors, service providers and mid-market enterprises to drive their companies forward.
Tags : 
    
Sage EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployedits deployed on a frequent basis.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, because thats where the money is. While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes that is, botscan now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Rackspace     Published Date: May 06, 2019
The retail sector is increasingly difficult and volatile. Enterprises must adopt easily available technology to liberate themselves from the daily grind and better focus on achieving their core business objectives. To be cost-effective in doing this, retailers turn to Google Cloud Platform, the most affordable, reliable, innovative and intuitive cloud platform in the world, to drive operational agility and optimization of application performance. As the first managed services partner for Google Cloud Platform, and Google Clouds 2018 Global Migration Partner of the Year, Rackspace is helping retailers everywhere to accelerate innovation and cost savings, by taking over their intensive, day-to-day operations of the cloud. This e-book looks at how different retail brands work with Rackspace to ensure smooth and easy migration and operation on Google Cloud, as well as to gain added value from Rackspaces depth of knowledge and best practices to effectively tap Google Cloud Platform too
Tags : 
    
Rackspace
Published By: Uberall     Published Date: Apr 12, 2019
Your store locator is a critical component on your website; its the moment of truth when an online shopper becomes an offline customer. And while it may seem like a simple tool, there are several key factors that will transform the user experience from functional to best-in-class. See how you can optimize this key aspect of your customer journey.
Tags : 
locator, uberall, store locator, location marketing, local listings
    
Uberall
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesnt need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: S&P Global Platts     Published Date: May 24, 2019
Only months before the effective date of IMO 2020, there are a surprising number of shipping industry participants who believe that getting customers to pay for increased bunker costs will be smooth sailing. However, the reality may prove to be more complicated. This report explores how a lack of negotiating power and imperfect bunker cost recovery mechanisms could turn this shadow on the horizon into a dangerous storm for the shipping industry.
Tags : 
    
S&P Global Platts
Published By: HERE Technologies     Published Date: Jun 20, 2019
Driver recruitment and retention are proving to be major problems for the trucking industry. The truck driver shortage is worse than ever. While there isnt a single root cause, a combination of factors is causing truck drivers and fleet owners alike, to look within the industry to make a change. Truck driver turnover is at an all-time high. At the end of 2018, turnover rates for large truckload carriers was a staggering 87% and for smaller carriers it was 72%. This leaves fleet owners and trucking companies trapped in constant recruitment mode. This eBook empowers fleet owners with effective strategies to improve recruitment and retention within their fleets. Download your free eBook to discover: Effective ways to offer benefits, incentives and competitive pay Strategies to increase truck driver safety with technology How to attract two of the largest groups in the US labor force
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Heres how to get started. Read this insight to discover: key steps for building strong supplier relationships potential risk areas that must be managed why behaviour change is as important as processes and tools why aligning your own organisation is essential.
Tags : 
    
KPMG
Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity Minimizing the footprint of the systems to save space, cost and power consumption Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel
Published By: Intel     Published Date: May 22, 2019
Please note that this piece of content is in local language. This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel Silicon Photonics can meet demanding bandwidth requirements.
Tags : 
    
Intel
Published By: Intel     Published Date: Jun 18, 2019
This paper examines centralized and distributed network architecture intelligence splits and identifies areas where Intel Silicon Photonics can meet demanding bandwidth requirements
Tags : 
    
Intel
Published By: CheckMarx     Published Date: Jun 07, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
We live in an era of digital transformation. Software is the backbone of this digital transformation. Mobile, cloud, open source, Internet of Things, microservices and AI have made software more complex. Over 80% of the code in todays software applications is open source. Estimates show that there will be 30 billion connected IOT devices by 2020. Furthermore, 85% of customer interactions will be computer managed by 2020. Software is everywhere. While software has gotten more complex, timeto-market is the new name of the game and enterprises cant risk security slowing this down.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. Thats an indisputable fact. There are some places though, where dinosaurs dont belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur a mere relic maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
    
CheckMarx
Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scalesolving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.