source

Results 1 - 25 of 3677Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UKs biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: how data and analytics can transform operational performance the benefits of using decision-support tools in the middle office key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG
Published By: Intapp     Published Date: Nov 01, 2019
Pricing matters and engagements accurately and profitably poses a challenge to many firms. However, developing effective pricing strategies has become more important than ever, as clients demand more transparency and alternative fee arrangements become more popular. Technology can help law firms develop both tactical and strategic approaches to pricing. Download this ebook to learn how an AI-enabled approach to pricing can help your firm: Price matters more accurately and profitably Scope and resource matters to ensure better margins Monitor engagements as they proceed and track budget to actuals Improve client relationships with more transparency, accountability, and success
Tags : 
    
Intapp
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel to learn more.
Tags : 
    
Dell EMC
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, database development, middleware, software testing, web development, linux, windows
    
Black Duck Software
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property, business intelligence, business management, database development
    
Black Duck Software
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development, business intelligence, project management, database development, web development
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development, application integration, enterprise software, software testing
    
Black Duck Software
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if youre working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
La combinaison de Citrix Networking et de Google Cloud aide le service informatique relever plusieurs dfis pour la fourniture et la gestion des applications. Voici comment: Grer un cloud hybride Dplacer les charges de travail sur site et hrites Fournir une mise en rseau native sur le cloud pour les microservices et les applications de conteneur Amliorer les performances pour l'accs distance aux ressources du cloud Fournir un accs utilisateur intgr
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Sage     Published Date: Oct 17, 2019
Manufacturing is constantly evolving Its an industry driven by customer demand and technology. And as manufacturing businesses grow to a certain size, globalization becomes a factor. Interacting with the world offers lucrative opportunities and creates a higher demand for products and sources of cheaper raw materials that often impact the entire supply chain.
Tags : 
    
Sage
Published By: TIBCO Software     Published Date: Jul 22, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product wasteand the need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Organizations in the global industrial products industry face significant challenges: cost pressures, increased regulations, disruptive technologies and the increasingly costly delivery of raw resources. High volatility in commodity prices has put severe pressure on company margins and can quickly expose inefficient operations.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Energie, Wasser, Luft und noch viel mehr die KISTERS AG entwickelt Software rund um das effi ziente Management von Ressourcen. Zu ihrem Kundenstamm gehren unter anderem Nahversorger, Stadtwerke, Energieerzeuger, Behrden und Unternehmen aus dem Arbeitsschutzumfeld. Die weltweit ttige Aktiengesellschaft mit Sitz in Aachen bietet neben Softwarelsungen fr den Energiemarkt, die Wasserwirtschaft und Luftqualitt auch 3D-Viewer, Ingenieurleistungen, Umweltconsulting sowie Groformat-Drucker und -Scanner.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Le Big Data et les charges analytiques constituent une nouvelle frontire pour les entreprises. Les donnes collectes manent de sources inexistantes il y a 10 ans. Les donnes des smartphones, celles gnres par des machines et par les interactions avec les sites web sont collectes et analyses. De plus, dans un contexte o les budgets IT sont dj sous pression, les empreintes Big Data stendent et posent dnormes problmes de stockage. Ce livre blanc dlivre des informations sur les problmatiques lies aux applications Big Data pour les systmes de stockage et explique en quoi le choix de la bonne infrastructure de stockage peut rationaliser et consolider les applications danalyse du Big Data sans faire sauter la banque.
Tags : 
    
Infinidat EMEA
Published By: Alert Logic     Published Date: Oct 25, 2019
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host. Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include: Planning for maximum portability Setting permissions for users and system resources Creating an action plan based on log monitoring and IDS data
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: Oct 25, 2019
As the variety and sophistication of exploits continues to grow, even large, mature Fortune 100 security teams feel unprotected. How well are your security systems and tools doing blocking threats from the most sophisticated cybercriminals? Download this resource to learn about a threat management approach designed to address todays evolving cybersecurity threats, expanding compliance risks, and all-too-common resource constraints.
Tags : 
    
Alert Logic
Published By: ServiceSource     Published Date: Jun 24, 2019
The B2B sales landscape has shifted dramatically, with prospects expecting a much more simplified purchasing experience, personalized and powered by data. Have you been meeting their needs, or falling short?
Tags : 
    
ServiceSource
Published By: ServiceSource     Published Date: Nov 12, 2019
Its important to grow your customer base and market share. But by focusing all of your attention on net new sales, youre only scratching the surface of your revenue potential. While this strategy might work out in the short term, its a surefire recipe for stagnation down the road. Its time for a different approach one that is focused not only on continuously improving customer outcomes, but also increasing the profitability of your relationship with them. Download our playbook, Mining for Value: A Comprehensive Guide to Customer Expansion, to learn how you can maximize the value of your existing customers.
Tags : 
    
ServiceSource
Published By: ConnectWise     Published Date: Aug 22, 2019
Youve talked through problems and solutions with your prospect and have developed a relationship, and now youre ready to offer your proposal. You know that the proposal is the first solid evidence of your work product. Invest in your proposal platform and process. Having a repeatable process based on the latest technology and streamlined with your business management platform or CRM will ensure an efficiently processed order. Devote time and resources into training everyone associated with sales on the proposal process. And finally, invest in your branding, image, and marketing to get that professional look that epitomizes who you are. Put these five steps together, and your proposal will stand out against a sea of lackluster competitors.
Tags : 
    
ConnectWise
Published By: ConnectWise     Published Date: Aug 22, 2019
Smart pricing based on a sound strategy is fundamental to the success of your technology business. While you may think you cant afford to spend time and resources defining and enforcing a pricing strategy, the truth is, you cant afford not to. Sticking to a plan for pricing will help grow your profits, while veering off course can cause devastating effects. Even one or two margin points have the potential to substantially impact your bottom line. ConnectWise Sell is designed to help guide you and your sales team to greater profitability with easy-to-use price management tools.
Tags : 
    
ConnectWise
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, youre tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When youre doing your job well, nobody notices. And when something goes wrong, youre the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: Resolver     Published Date: Nov 01, 2019
Based on what Resolver has learned by working with hundreds of security leaders, theyve found there isnt a one size fits all model for creating workflows that effectively responds to every security incident. Even within an organization, not every incident will be able to go through the same process. Thats why theyve developed an incident workflow template for your corporate security team. This a great framework to get you thinking about the various stages that could be involved in a single incident. Download this resource to uncover: - Best practices on how to keep incident submission simple to ensure adoption across the organization - Important factors to consider for the portal and triage step of incident submission - How to include notification and task assignment to your incident workflow - A sample list of key metrics used by industry-leading security professionals - Plus! Get a free printable incident workflow template that you can use with your team
Tags : 
    
Resolver
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. Youll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: IBM APAC     Published Date: Sep 30, 2019
Companies that are undergoing a technology-enabled business strategy such as digital transformation urgently need modern infrastructure solutions. The solutions should be capable of supporting extreme performance and scalability, uncompromised data-serving capabilities and pervasive security and encryption. According to IDC, IBMs LinuxONE combines the advantages of both commercial (IBM Z) and opensource (Linux)systems with security capabilities unmatched by any other offering and scalability for systems-of-record workloads. The report also adds LinuxONE will be a good fit for enterprises as well as managed and cloud service provider firms. Read more about the benefits of LinuxONE in this IDC Whitepaper.
Tags : 
    
IBM APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.