ad tech

Results 26 - 50 of 3303Sort Results By: Published Date | Title | Company Name

The CIO’s Handbook to IT Cost Optimization

Published By: Apptio     Published Date: Oct 10, 2019
"Optimization. Rationalization. Cost-Recovery. All buzzwords for a simple concept: how do technology leaders ensure that every dollar spent is directed towards business value? In this eBook, we walk you through the four ways to optimize your IT costs and offer up prescriptive questions to make your analysis crisp and your conclusions actionable. Learn more about these four ways to optimize technology costs, including: - Scrutinize to close financial loopholes - Economize to eliminate waste - Rationalize to avoid duplication - Commercialize to curb demand"
Tags : 
    
Apptio

Why Outstanding Omni-Channel Service is the Key to Success and how to get it

Published By: Citibank     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
    
Citibank

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Webinar: Sanctions compliance after Brexit – be prepared

Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG

Apptio TBM Unified Model (ATUM): The standard cost model for IT

Published By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
    
Apptio

The CIO's guide to IT cost optimization

Published By: Apptio     Published Date: Oct 09, 2019
"Optimization. Rationalization. Cost-Recovery. All buzzwords for a simple concept: how do technology leaders ensure that every dollar spent is directed towards business value? In this eBook, we walk you through the four ways to optimize your IT costs and offer up prescriptive questions to make your analysis crisp and your conclusions actionable. Learn more about these four ways to optimize technology costs, including: - Scrutinize to close financial loopholes - Economize to eliminate waste - Rationalize to avoid duplication - Commercialize to curb demand"
Tags : 
    
Apptio

Experience of work in Australia and New Zealand: technology’s role in productivity and engagement

Published By: Citrix     Published Date: Oct 09, 2019
An alarming 2019 study suggested that workplaces in the region have exhausted staff morale with negative impacts on productivity. In this report, top technology leaders in Australia address some of the "employee experience" challenges they the face and how they aim to tailor systems around ways of working to drive better engagement and productivity. The EIU's own survey results show that while leadership and management still set the tone for workers in the region, they value flexible-working policies and technology available to employees more than global peers.
Tags : 
    
Citrix

Hybrid CMS: The best of both worlds.

Published By: Adobe     Published Date: Oct 08, 2019
With customers spending almost one-third of their days engaging with digital content and frequently engaging on multiple channels, developers need a better and faster way to create digitally engaging experiences across multiple channels. Yet despite the appeal of headless for developers, a headless-only CMS may not be the best approach. A better strategy for embracing new technology is taking a hybrid approach. 
Tags : 
    
Adobe

AI-powered personalization— above expectation, beyond imagination

Published By: Adobe     Published Date: Oct 08, 2019
You cannot accurately predict what your customer will want next. Artificial intelligence can. WHY SHOULD THE TARGET AUDIENCE CARE? By 2020, businesses that use AI and related technologies like machine learning and deep learning to uncover new insights will take $1.2 trillion each year from competitors that don't. (Source: Forrester.) SUPPORTING CONCEPTS: At any moment, anywhere in the world, on any kind of device, a prospect or customer is raising her hand and saying, "I'm your best opportunity. Don't ignore me." She's telling you that by every action she's taken and every interaction you've had up to that point. You can consider each bit of data you've collected across her journey a meaningful expression of intent. And with that, you will know how to give her an experience that's above her expectations and beyond her imagination. You need many different technologies in your marketing stack to manage personalization, but AI makes them all work together seamlessly. You can: –
Tags : 
    
Adobe

The Cost of OT Cyber Security Incidents and How to Reduce Risk

Published By: Nozomi     Published Date: Oct 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi

Can Business Growth Be Driven By IT?

Published By: Oracle EMEA     Published Date: Oct 08, 2019
Business growth, innovation and IT departments and inextricably linked. Our new report explores insights from those who are leading the way by prioritising and completing automation innovations. While 67% of businesses are being held back by confidence in their own data. So what actions and attitudes separate those leading and those following in the data revolution? And what difference can self-driving technology make to innovation, strategy and wider business success?
Tags : 
    
Oracle EMEA

Making AI Routine, Repeatable and Reliable

Published By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom

DigiCert Automates Protection of their AWS Environment with Imperva

Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Imperva’s WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Imperva’s sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web server’s IP
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Report: Automating financial reporting and technical accounting – are you ready?

Published By: KPMG     Published Date: Oct 04, 2019
New technologies have the potential to transform the finance function. But are financial reporting teams ready to embrace them? We surveyed nearly 100 technical accounting and financial reporting professionals to find out. Read this report to learn: • How automation is being integrated into working processes – now and going forward • What the roadmap to automation looks like • Where your finance function should be heading • Which tools to use to help transform your financial reporting teams • What potential barriers lie ahead and how to overcome them.
Tags : 
    
KPMG

Webinar: How to manage cloud costs for maximum returns

Published By: KPMG     Published Date: Oct 04, 2019
For many enterprises, cloud migration is attractive for two key reasons: greater agility and lower cost. However, the jury is still out when it comes to the financial benefits. In this webinar, KPMG’s Adrian Bradley, Head of Technology Architecture, and Emma Bisset, Senior Manager, CIO Advisory at KPMG UK, explore the reasons why. Listen to this webinar now to find out: • What leading IT decision makers told KPMG about their experience of cloud costs • Why organisations are failing to realise economic value from their cloud investments • What key levers your organisation can use to extract significant cost savings from existing deployments.
Tags : 
    
KPMG

Marketing Trends Report

Published By: Look Listen     Published Date: Oct 04, 2019
Simply put: Marketing isn’t what it used to be. If you want to compete in this rapid digital world, you need to make your customers happy. Constantly. We’ll get you started with nine of the most exciting trends developing in the world of marketing in 2019. With this report, you’ll learn: How the new director of marketing data position and GDPR compliance can build customer trust. What it means for customer centricity now that MarTech and AdTech are finally coming together with AI and machine learning. How to adjust your business purpose to create customer loyalty as the attention economy shifts to the emotion economy.
Tags : 
    
Look Listen

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Boyce Technologies' Additive Solutions to Win Business

Published By: ASME     Published Date: Oct 03, 2019
When Verizon wanted to add new digital and internet-connected kiosks around New York City, they turned to Boyce Technologies and Boyce turned to 3D printing to save them time and money. Boyce Technologies is one of the leading manufacturers of security and communication equipment for the mass transit market in New York. Since incorporating large-format 3D printing, Boyce has seen firsthand how 3D printing helps compress the design, engineering, and production time so they can meet tighter deadlines and get to production faster. Boyce uses its BigRep large-format 3D printers across a variety of applications including prototyping, end-use parts, and vacuum forming molds. Download now to discover: Best practices for integrating 3D printing How a prototyping exercise turned into end use parts for Verizon kiosks around New York City Case studies for end use parts, molds, and prototypes Making the business case for investing in AM
Tags : 
    
ASME

Design Guide: Direct Metal Laser Sintering

Published By: ASME     Published Date: Oct 03, 2019
Considering metal 3D printing for your next project? Our comprehensive guide covers everything you need to know to build quality, production-grade parts, including how to select the right material, design for the technology, and enhance parts with post-processes like machining and heat treatment. Download your copy today!
Tags : 
    
ASME

Getting the most out of Kubernetes management across Amazon EKS and your on-premises environment

Published By: AWS     Published Date: Oct 01, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS

De essentie van draadloos voor kleine bedrijven

Published By: Cisco EMEA     Published Date: Oct 01, 2019
Inleidende woorden van Steven Heinsius: In dit e?book komen de basisbeginselen van wifi aan bod, en de veelvoorkomende fouten die worden gemaakt bij draadloze implementaties. Dit e?book gaat over het opzetten van ‘goede wifi,’ ook zonder de duurste apparatuur, en het behalen van de beste resultaten met wat u ter beschikking hebt. Het is tevens een tool waarmee u fouten in wifi kunt uitleggen aan mensen zonder kennis van draadloze technologie. Het is educatief en het is leuk. Samen kunnen we de wereld van wifi voor onze gebruikers iets beter maken.
Tags : 
    
Cisco EMEA

The Engineers’ Guide to Smart Sensors

Published By: Panasonic     Published Date: Oct 01, 2019
For manufacturers, the transition to Industry 4.0 has meant the accumulation of data, massive data. Indeed, the accumulation, distribution and evaluation of data are driving virtually every decision on the manufacturing plant floor and supply chains shaping those decisions. Given the striking fact that ninety percent of the data in the world has been created over the last two years, it isn’t surprising that more than 60 percent of large companies report having a Chief Data Officer. But what has opened the floodgates to this deluge of information in manufacturing? Ordinary sensors have been transformed into smart sensors with the advent of IoT technologies and are being deployed by manufacturers along every step of the supply chain. Sensors are now detecting everything from when a piece of equipment will need maintenance to controlling energy costs inside factories.
Tags : 
    
Panasonic

The Building Blocks of our Driverless Future

Published By: Panasonic     Published Date: Oct 01, 2019
The move to electric vehicles is helping to advance autonomous driving. Behind the scenes is a technology disruption involving everything from electronics and energy systems to batteries, electronic materials, device solutions and displays. Take a look at some of the tech that will power AVs and help them to navigate our roads.
Tags : 
    
Panasonic

Teaming up to tackle the self-driving challenge

Published By: Panasonic     Published Date: Oct 01, 2019
Global efforts at safety and the escalating adoption of electronics in powertrains is helping to advance autonomous driving -- and behind the scenes is a technology disruption involving everything from electronics and energy systems to batteries, electronic materials, device solutions and displays. In this white paper, we take a look at some of the cutting-edge electronic components fueling this technology disruption and moving us towards a driverless future.”
Tags : 
    
Panasonic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.