ios

Results 1 - 25 of 912Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: Infinidat EMEA     Published Date: Oct 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
A medida que los datos se convierten no solo en catalizadores del negocio sino también en la base de la ventaja competitiva de la empresa, la disponibilidad permanente (Always On) de los datos se ha convertido en un requisito empresarial fundamental para el departamento de TI. Ante múltiples puntos de fallo potenciales, los departamentos de TI se han esforzado durante años en diseñar una infraestructura de datos que cumpla con el requisito de actividad permanente a costa de altos precios y complejidades. Para que una solución cumpla el requisito de actividad permanente necesita tanto un objetivo de punto de recuperación de cero (RPO=0) como un objetivo de tiempo de recuperación igualmente de cero (RTO=0). Estos son requisitos necesarios de una solución de actividad permanente, pero de ninguna manera sufi ciente.
Tags : 
    
Infinidat EMEA
Published By: Apptio     Published Date: Oct 09, 2019
"CIOs are under constant pressure to deliver innovation and efficiency, and at a lower cost to boot. Fortunately, when it comes to enterprise IT spend, chances are the necessary resources to drive improvements are already there, hidden in budget padding. All you need are the right tools to identify and exploit them. Download this brief to: -Understand your budget-to-actual variances and what causes them -Learn how to course-correct towards freeing up fettered funds for growing your business"
Tags : 
    
Apptio
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: ASME     Published Date: Oct 03, 2019
When Verizon wanted to add new digital and internet-connected kiosks around New York City, they turned to Boyce Technologies and Boyce turned to 3D printing to save them time and money. Boyce Technologies is one of the leading manufacturers of security and communication equipment for the mass transit market in New York. Since incorporating large-format 3D printing, Boyce has seen firsthand how 3D printing helps compress the design, engineering, and production time so they can meet tighter deadlines and get to production faster. Boyce uses its BigRep large-format 3D printers across a variety of applications including prototyping, end-use parts, and vacuum forming molds. Download now to discover: Best practices for integrating 3D printing How a prototyping exercise turned into end use parts for Verizon kiosks around New York City Case studies for end use parts, molds, and prototypes Making the business case for investing in AM
Tags : 
    
ASME
Published By: Oracle     Published Date: Sep 30, 2019
Company reputations are at stake— unless they’re sure of their data security and practices in the face of multiplying data volumes. There is now a need to understand the responsibilities and the need for the entire company to commit to a digital trust framework. In this episode of the Tomorrow Talks series, IDC and Oracle discuss how data security and practices are no longer the remit of CIOs and CISOs alone. To find out more, watch this webinar today.
Tags : 
    
Oracle
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Sep 30, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: Workday     Published Date: Sep 30, 2019
Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday
Published By: PatSnap     Published Date: Sep 27, 2019
IP professionals require the utmost precision, flexibility, and speed in their workflows. However numerous challenges around disparate sources and tools can delay the IP process. This eBook lays out IP best practices online that will streamline various workflows to drive accurate and effective results, effortlessly. These are: 1. Performing more efficient patent searches 2. Unlocking value from patent portfolios 3. Structuring effective patent landscapes 4. Building more revealing reports 5. Mitigating bottlenecks via collaboration
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: Cisco     Published Date: Sep 27, 2019
The StackWise-480 architecture allows stacking of up to eight switches in a ring topology to achieve 480G of stack bandwidth. The latest Cisco Catalyst 9300 Series Switches support StackWise-480. This technology is flexible, modular, and evolutionary, and it delivers Cisco IOS XE feature capabilities with hardware acceleration to every port in the stack.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Sep 26, 2019
If people always knew what they wanted and asked for it, your job would be easy—and boring, which really isn’t your style. But people—and customers—are complicated, and that’s a good thing. It means that every quirk, habit, bias, behavior, curiosity, experience, and demographic detail is a chance to optimize and catapult your customer experience to new heights. But first, you have to go beyond all the details you know about your customers to discover what they mean for your business. These “customer insights” make all the difference. And this guide is a crash-course in how to catch them, decode them, and put them to work.
Tags : 
    
Oracle
Published By: AWS     Published Date: Sep 23, 2019
Las ciudades son cada vez más inteligentes y más rápidas. Sin embargo, los servicios de transporte no siempre evolucionan al mismo ritmo. Eso puede cambiar hoy mismo. Con Amazon Web Services (AWS) y nuestro ecosistema de partners, puede emprender un viaje hacia la innovación y la transformación de toda la ciudad. Desde la administración de las señales de tráfico hasta la vigilancia de las intersecciones, pasando por un uso inteligente de los aparcamientos y un sistema de transporte público mejorado, AWS está aquí para ayudarle a poner en marcha su proyecto, proporcionándole la escalabilidad y flexibilidad que necesita para hacer realidad sus aspiraciones y mejorar la vida de todos los ciudadanos. Participe en el futuro del transporte con AWS y únase a las ciudades más sensacionales del mundo
Tags : 
    
AWS
Published By: AWS     Published Date: Sep 23, 2019
Un cambio rápido está en marcha en el mundo del gobierno digital. Este cambio no solo está siendo impulsado por los avances de la tecnología, sino también por una comunidad unificada por nuevas formas de pensar, ideas audaces y soluciones costeables y escalables. En apoyo a esta nueva y brillante era de innovación, Amazon Web Services (AWS) está ayudando a dar vida a estas visiones. Desde proyectos que impulsan el turismo a través de datos, hasta asegurar que los pronósticos meteorológicos siempre sean accesibles; pasando por encontrar nuevos hogares para huérfanos refugiados, hasta asegurar que los resultados electorales no saturen sitios web, y mucho más. Al beneficiarnos de las regiones de AWS, estamos ayudando a muchos de los pensadores, creadores y constructores más ambiciosos del sector público a hacer realidad sus ideas. Para innovar. Para inspirar a otros. Y para seguir construyendo. Descubra hoy el futuro del gobierno digital en la nube.
Tags : 
    
AWS
Published By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
    
Intel
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.