apa

Results 1 - 25 of 3290Sort Results By: Published Date | Title | Company Name

Digital Subscriptions in 2013 : 3 Industry Shfits That Spell Certain Death for S Publishersome

Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass

La productivité au travail

Published By: Dell EMEA     Published Date: Sep 09, 2019
En matière de longévité, nul ne peut rivaliser avec Dell. Non seulement nos machines disposent de la capacité, de la facilité de gestion et des fonctions de sécurité qui ont gagné la confiance du secteur IT, mais elles sont en plus conçues pour de longs cycles de vie, ce qui réduit les coûts de gestion des déchets et de recyclage. Il n’est donc pas étonnant qu’elles soient sur le marché depuis si longtemps. Et nous ne nous arrêtons pas là. Notre gamme continue d’évoluer, avec de nouvelles fonctions futuristes. Le Dell Latitude 7400 2-en-1 propose la nouvelle fonctionnalité Dell ExpressSign-in pour détecter la présence des utilisateurs, démarrer le système en à peine une seconde et les connecter par reconnaissance faciale avec Windows Hello. Les utilisateurs n’ont qu’à s’asseoir devant leur machine pour se mettre au travail. Plus besoin de faire Ctrl+Alt+Suppr ni même d’appuyer sur le bouton d’alimentation. En fait, il s’agit du premier PC à utiliser un capteur de proximité, basé sur l
Tags : 
    
Dell EMEA

Enhancing ContentManagement with AI:Unlock Hidden Valuein Your Data

Published By: Box     Published Date: Nov 06, 2019
Unstructured business content contains critical information that can be tough to extract, manage, and analyze. Artificial intelligence capabilities can automate many manual processes and help unlock this valuable resource. To find out more download this whitepaper today.
Tags : 
    
Box

Are We Ready to Sustainably Monetize 5G?

Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Achieving long-term profitability for 5G will require a major shift in thinking for many operators. Given the investments and capacity upgrades involved, simply treating 5G as just “another G” is a doomed strategy. Instead, 5G must be seen as an opportunity to re-energize the Telco business model and to move away from traditional commoditized network offerings. Download the discussion paper to learn: Five key questions the Telco C-suite should be asking to drive sustained 5G profitability Why 5G will require a major change in business strategy and IT delivery models How 5G can re-energize the Telco business model
Tags : 
    
Matrixx Software - Kingpin

How AIOps Can Help IT be a Better Partner to the Business

Published By: ServiceNow     Published Date: Oct 23, 2019
AIOps can dramatically improve the IT organization’s ability to be an effective partner to the business. An IT operations platform with built?in AIOps capabilities like ServiceNow® can help IT operations proactively identify potential issues with the services and technology it delivers to the business and correct them before they become problems. Read this whitepaper to learn best practices for adopting AIOps.
Tags : 
servicenow, it operations, technology, aiops
    
ServiceNow

Solution Brief: Intel Select Solution for BigDL Apache Spark

Published By: Intel     Published Date: Nov 13, 2019
Intel® Select Solutions for BigDL on Apache Spark* accelerates and simplifies deep learning development and deployment on an optimized, verified infrastructure based on Apache Spark*. Intel® Select Solutions for BigDL on Apache Spark* combine Intel® Xeon® Gold processors, Intel® SSDs, and Intel® Ethernet Network Adapters to empower enterprises to quickly harness a reliable, comprehensive solution that delivers excellent total cost of ownership (TCO) and accelerated time to market.
Tags : 
    
Intel

eGuide: Build your in-memory analytics stack

Published By: Intel     Published Date: Nov 14, 2019
-memory databases have moved from being an expensive option for exceptional analytics workloads, to delivering on a far broader set of goals. Using real-world examples and scenarios, in this guide we look at the component parts of in-memory analytics, and consider how to ensure such capabilities can be deployed to maximize business value from both the technology and the insights generated.
Tags : 
    
Intel

Solution Brief: Optimizing HPC Infrastructure for AI Convergence

Published By: Intel     Published Date: Nov 14, 2019
Evaluating an existing HPC platform for efficient AI-driven workloads The growth of artificial intelligence (AI) capabilities, data volumes and computing power in recent years mean that AI is now a serious consideration for most organizations. When combined with high-performance computing (HPC) capabilities, its potential grows even stronger. However, converging the two approaches requires careful thought and planning. New AI initiatives must align with organizational strategy. Then AI workloads must integrate with your existing HPC infrastructure to achieve the best results in the most efficient and cost- effective way. This paper outlines the key considerations for organizations looking to bring AI into their HPC environment, and steps they can take to ensure the success of their first forays into HPC/AI convergence.
Tags : 
    
Intel

Verifying Digital Identities Beyond One Time Passwords

Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

Enterprise Cybersecurity Adoption Trends across Asia-Pacific

Published By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
    
Juniper Networks

Is your WAF keeping pace? (Japanese)

Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
    
F5 Networks Singapore Pte Ltd

Why advanced threats require an advanced WAF? (Japanese)

Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
    
F5 Networks Singapore Pte Ltd

IDC App Protect Analyst Report (Japanese)

Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
    
F5 Networks Singapore Pte Ltd

Insight: Automation in procurement: Your new workforce is here

Published By: KPMG     Published Date: Sep 05, 2019
Leveraging procurement bots is the next logical step as organisations look to benefit from advancements in digital capabilities. Like every transformative technology, the implementation of procurement bots, while exciting, is not without challenges. Read this report to discover: • the five steps procurement organisations can take to create a partnership between bots and employees • the key characteristics of organisations doing this successfully • a phased methodology to ensure stakeholder change.
Tags : 
    
KPMG

The 3 Recommendations for Cloud Security

Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware

The 3 Recommendations for Cloud Security

Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware

Workday and Puma: Have the right people and technology in place to support the growth

Published By: Workday APAC     Published Date: Oct 07, 2019
Puma works in a highly competitive environment where they need to innovate, evolve and bring products to market quickly. So they chose Workday as they wanted to streamline their processes and replace their legacy HRIS with an intuitive solution at a reduced running cost.
Tags : 
    
Workday APAC

Why a Better Retail Workforce Starts with Better Technology

Published By: Workday APAC     Published Date: Oct 07, 2019
Retailers worldwide are finding success in the cloud. Check out this blog to learn how smarter back-office technology can help you better attract, engage, and retain your workforce.
Tags : 
    
Workday APAC

What’s Life Like at Patagonia? Exec Reveals All.

Published By: Workday APAC     Published Date: Oct 07, 2019
"How does Patagonia create its enviable culture for 2,500 employees across the world, achieve a 4 percent corporate turnover, and manage to provide on-site childcare? We sat down with Dean Carter, Patagonia’s head of Shared Services for Finance, HR, and Legal, to find out what life is like at the “un-company” and learn Patagonia’s secret for HR success."
Tags : 
    
Workday APAC

The Top 5 Questions to Consider When Choosing a Background Screening Provider

Published By: Asurint     Published Date: Aug 05, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs. ©
Tags : 
    
Asurint

Storage Challenges in the Age of Petabyte-Scale

Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA

Managing Data Storage at Scale for Competitive Advantage

Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scale—solving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.