rim

Results 1 - 25 of 1375Sort Results By: Published Date | Title | Company Name
Published By: Global Payments     Published Date: May 02, 2019
China is becoming one of the most important markets for luxury goods in the world. The rise of the Chinese luxury consumer is bringing a world of opportunities to luxury retail giants across the globe. By 2025, it is expected that consumers in China will account for 44% of the $339 billion in luxury goods spending worldwide. This infographic highlights these projected luxury sales increases and identifies the primary drivers and the preferred payment methods for Chinese consumers.
Tags : 
luxury goods, global payments, unified commerce, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments
    
Global Payments
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: 3D Systems     Published Date: May 24, 2019
Per pi di due secoli la produzione industriale in fabbrica si distinta in quattro aspetti chiave: ripetibilit del processo, durata delle parti prodotte, produttivit nel flusso di lavoro e un costo totale operativo ridotto. I flussi di lavoro in fabbrica sono stati ottimizzati per produrre le parti migliori in grande quantit e nel modo pi economico possibile. Qualsiasi nuovo metodo di produzione o processo del flusso di lavoro che si proponga di affiancarsi a questo processo standard deve soddisfare o altrimenti migliorare questi elementi, che sentono ormai il peso del tempo.
Tags : 
    
3D Systems
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks but root out threats that have by-passed traditional preventive defenses.
Tags : 
    
Fidelis Cybersecurity
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In todays highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative DevOps-style delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The age of digital transformation is firmly here, and with it comes a seismic shift in how businesses must operate if they intend to stay relevant and profitable. Though the role of process in digital transformation is often over-hyped, in truth, it remains a critical element in the fight to win, serve, and retain customers. In this digital age, businesses must holistically reframe their investment in process automation. In short, a compelling vision for process excellence must underpin this digital transformation, thereby transforming customerfacing processes and digitizing operational processes. The change is so profound that Forrester has renamed the category from business process management (BPM) to digital process automation (DPA). This shift, while continuing to drive down costs and drive up employee productivity, makes customer experience and digital transformation the primary success factors. This represents a powerful and necessary change of focus. In July 2017, IBM commission
Tags : 
    
Group M_IBM Q2'19
Published By: Forcepoint     Published Date: May 14, 2019
In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Pre-Crime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Pre-Crime Division, empowered to intervene before a violation is ever committed. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
    
Forcepoint
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, networking, it management, knowledge management, enterprise applications
    
Adlib Software
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
123Together
Published By: VoIP Logic     Published Date: Sep 11, 2012
This white paper provides a primer on the considerations around designing and launching Enterprise VoIP Hosted PBX services.
Tags : 
    
VoIP Logic
Published By: Dell EMC     Published Date: Aug 23, 2018
Si les outils de conception 3D existent depuis quelque temps dj, la consumrisation de la ralit virtuelle fait merger des solutions de visualisation un rythme sans prcdent. La visualization a atteint un tel niveau que les concepteurs peuvent dsormais crer des images photoralistes de produits dans des environnements naturels avec plus de rapidit et de prcision. Cela permet une commercialisation encore plus rapide et donne aux clients la possibilit dexprimenter le produit par eux-mmes, sans encourir les cots rels de prototypage et de modlisation. Ce guide est conu pour vous donner un aperu des tout derniers dveloppements en matire de visualisation et prsente nos nouveaux centres dexcellence sur la ralit virtuelle, situs Limerick, Cork, Paris, Francfort, Duba, Santa Clara et Austin, o vous pourrez dcouvrir les atouts de ces technologies. Rahul Tikoo Directeur excutif et directeur gnral Dell Precision
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 23, 2018
Bench gli strumenti di progettazione 3D siano disponibili da tempo, la consumerizzazione della realt virtuale offre nuove opzioni di visualizzazione a un ritmo senza precedenti. La visualizzazione ha raggiunto livelli tali da permettere ai progettisti di produrre immagini fotorealistiche dei prodotti in ambienti naturali in modo pi rapido e accurato, velocizzando il time-to-market e consentendo ai client di sperimentare autonomamente il prodotto, il tutto senza i costi associati alla realizzazione di prototipi e modelli. Questa guida offre una panoramica degli sviluppi pi recenti della visualizzazione e presenta i nostri nuovi centri di eccellenza per la realt virtuale di Limerick, Cork, Parigi, Francoforte, Dubai, Santa Clara e Austin, dove si potranno constatare concretamente i vantaggi. Rahul Tikoo Executive Director e General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: Dell SB     Published Date: Mar 11, 2019
La srie Dell Precision, optimise par les processeurs Intel, dompte les applications les plus exigeantes avec des solutions puissantes, fiables et polyvalentes. Ralisateurs et animateurs prims, architectes et ingnieurs de talent : tous trouvent, dans notre large portefeuille, les options permettant de personnaliser une station de travail en fonction de leurs besoins de cration.
Tags : 
    
Dell SB
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, fr die ganz unterschiedliche Lsungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und beraus effektive Mglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefhrden. Erfolgreiche Lsungen mssen daher Sicherheitslcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das mglich? In diesem Bericht gehen wir auf browserbasierte Lsungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance fr den Endnutzer verbessern. Wir untersuchen verschiedene Techniken fr den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaen verbessern knnen.
Tags : 
    
Akamai Technologies
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog wont deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. Thats a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Nimble Secondary Flash array represents a new type of data storage, designed to maximize both capacity and performance. By adding high-performance flash storage to a capacity-optimized architecture, it provides a unique backup platform that lets you put your backup data to work. Nimble Secondary Flash array uses flash performance to provide both near-instant backup and recovery from any primary storage system. It is a single device for backup, disaster recovery, and even local archiving. By using flash, you can accomplish real work such as dev/test, QA, and analytics. Deep integration with Veeams leading backup software simplifies data lifecycle management and provides a path to cloud archiving.
Tags : 
    
Hewlett Packard Enterprise
Published By: Workplace by Facebook     Published Date: Dec 21, 2018
Today, people are shopping across multiple channels. There is a need for the retail industry to evolve and create great digital experiences that seamlessly blend the purchase journey. Download this info-graphic now to learn how retailers are experimenting with technology and how tools like Workplace by Facebook can help retailers innovate.
Tags : 
    
Workplace by Facebook
Published By: HPE     Published Date: Jan 04, 2016
HP 3PAR StoreServ Storage provides a single product family across midrange, high-end, and all flash arrays designed to meet the demands of ITaaS. It is the only primary storage platform you need to respond to change with agility and efficiency.
Tags : 
    
HPE
Published By: HPE     Published Date: Jan 04, 2016
HPE 3PAR StoreServ Storagethe only primary storage architecture you need.
Tags : 
    
HPE
Published By: HPE     Published Date: Jan 04, 2016
Think you cant afford flash? Think again. If youre looking to make a primary storage investment in the near future, you cant afford not to consider an all-flash or converged flash array. HPE offers the only architecture on the market that is flash-optimized without being flash-limitedso you wont have to make business-limiting decisions when it comes to implementing flash, such as inserting a new silo into your environment or undergoing painful hardware rip-and-replace.
Tags : 
    
HPE
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Increased access to data and more channels of communication have given citizens renewed civic power. Public-sector agencies must be just as responsive as any other enterprise with which citizens interact. If youre an optimist, imagining the results of a hyperconnected citizenry is exciting. As long as government is responsive, greater citizen involvement could help reduce problems that plague modern society, including poverty, disenfranchisement and even crime.
Tags : 
data access, technology development, public sector, data security
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.