approach

Results 1 - 25 of 2655Sort Results By: Published Date | Title | Company Name

Intelligent Automation Fuels the Path to Digital Transformation

Published By: VMware     Published Date: Sep 12, 2019
IT process automation can seem like a big step, but there are incremental ways to achieve improved efficiency that reduce risk and drive better business outcomes. The proper approach to automation can turbocharge your administrative teams, open new doors and provide the agility to respond to any business need. It’s the key to unlocking the power of cloud, and new service offerings make it more attractive to those looking to build the right IT business strategy for the future.
Tags : 
    
VMware

CIO Essential Guidance for Intrinsic Cybersecurity

Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware

KuppingerCole Report

Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust

The ATS Buyer's Guide

Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable

Keep Up With Data Center Modernization

Published By: Hitachi EMEA     Published Date: Sep 25, 2019
With the right approach, new and growing data sources can help you drive innovation, transform customer experience and create new revenue streams. But all that data can also slow you down.
Tags : 
    
Hitachi EMEA

VSI Report

Published By: HERE Technologies     Published Date: Oct 01, 2019
There are many challenging tasks when developing autonomous driving features to cope with the various changes to the environment. Often lane markings are faded or are covered with snow or dirt and can be difficult for a camera-based detection system. In this report, VSI addresses the application of HD map assets to improve the safety and performance of automated vehicle features within the context of lane keeping and trajectories. VSI has been examining applications of HD maps in our test vehicle. In a previous report, we discussed map-based Adaptive Cruise Control (ACC) using the advised speed attributes from HERE’s HD map data. In this report, we apply HERE’s HD map data to a lane keeping application and examine performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach.
Tags : 
    
HERE Technologies

Briefing: Industry 4.0 - Lessons for C-suite leaders

Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG

A Modern Approach to Branch Security

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA

Open Source as a Strategic Business Enabler Webinar With Black Duck Software, Highlighting SAP Case

Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, database development, middleware, software testing, web development, linux, windows
    
Black Duck Software

Seven Best Practices for Managing Software Intellectual Property in an Open Source World

Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property, business intelligence, business management, database development
    
Black Duck Software

Should You Build or Buy Your Billing System?

Published By: BillingPlatform     Published Date: Jul 30, 2019
Explore Every Option Before Choosing Your Monetization Strategy When it comes to replacing your billing system or choosing a new billing solution to support revenue management, one of the difficult questions you will face is whether to build a custom software set or purchase a solution from a vendor. There are a variety of factors to consider when making the build vs. buy decision. This whitepaper helps you determine the right path for your organization. Download the full whitepaper to discover a practical approach to weighing your options for billing solutions. The whitepaper covers the following topics: • Question to answer before implementing a billing system • Considerations for building a billing system • Costs of building your own system • Considerations for buying a billing system • Common billing system requirements to consider By reading our systematic exploration of billing options and considerations, you will find the approach that will lend the greatest success to y
Tags : 
    
BillingPlatform

6 Ways to Save with VMC on AWS

Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartner’s 2017 prediction that “through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches”. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS don’t experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
    
CloudHealth by VMware

Your free guide to collecting sales tax

Published By: PwC     Published Date: Aug 28, 2019
Companies typically begin with a basic approach to sales tax: figure out the requirements of the state in which they’re headquartered, register with that state, and start collecting sales tax from customers in that state. That approach may work for a while, but as your business expands into new states (whether you have a physical presence there or not), the risk of non-compliance with sales tax becomes significant. Smart finance leaders know they need to have a sales tax compliance strategy before they start getting notices from state tax authorities.
Tags : 
    
PwC

Agile Integration Architecture Technical Whitepaper

Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Agile Integration Methodology: Container-Based and Microservices-Aligned Lightweight Integration Runtimes - This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
    
Group M_IBM Q4'19

A More Sustainable Approach to Enterprise Data Storage: Reducing Power Consumption with InfiniBox®

Published By: Infinidat EMEA     Published Date: May 14, 2019
Data continues to grow at an astounding pace? As a result, data center space is becoming more scarce, as more arrays are acquired to store all of this data. Along with this data taking up space, it is also utilizing a great deal of power and cooling. In fact, the average data center in the U.S. uses approximately 34,000 kW of electricity each year, costing $180,000 in annual energy costs. As Infinidat set out to revolutionize the storage industry, one of our goals was to help consumers of storage build a more sustainable infrastructure that would be not only better for the environment, but also help them to save money as well. All of our patents come together to form InfiniBox, a storage solution that does just this.
Tags : 
    
Infinidat EMEA

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA

How Petabyte-Scale Storage Enables Precision Medicine

Published By: Infinidat EMEA     Published Date: May 14, 2019
Data is the DNA of modern healthcare. As healthcare technology continues to evolve at a rapid pace, and patient data management and security evolve, emerging approaches for disease treatment and prevention—like precision medicine and healthcare content management—are becoming more necessary. Precision medicine is about moving from generic to more precise, population-focused diagnostics and treatment by factoring in data from patients’ genes, environment, lifestyle factors and family history, into clinical decision-making for earlier, more accurate diagnoses, and more effective treatment and prevention. Data is at the heart of enabling doctors and scientists to execute on this mission. Additionally, rapidly changing regulations throughout the world are affecting the management of all healthcare data. Infinidat removes data management barriers from this level of data interaction by removing isolated islands of storage and allowing much more data to reside on a single, high-performance, h
Tags : 
    
Infinidat EMEA

Trend Micro Managed XDR, A Managed Detection and Response (MDR) Service

Published By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive “hunting” for Indicators of Attack (IoA) and reactive “sweeping” for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
    
Trend Micro

Beyond EDR: Natively Correlating and Analyzing Telemetry from Endpoint, Network, Email, and Cloud

Published By: Trend Micro     Published Date: Sep 05, 2019
“EDR alone is simply not enough to empower security pros to detect, investigate, and respond to attacks at the pace they need to keep up with modern attackers. A broader detection and response approach is needed.” Register now and receive this exclusive white paper. Dave Gruber, ESG Senior Analyst takes a look at how you can increase the efficiency and effectiveness of detection and response through XDR, along with: • Strategic insight into the current state of threat detection and response, providing you with ESG’s comprehensive research and findings. • Current challenges affecting today’s organizations, including the time and resources required and numerous gaps that EDR exposes. • Valuable foresight into what’s next and how XDR—detection and response across email, endpoint, servers, cloud workloads, and network—can help solve these issues.
Tags : 
    
Trend Micro

The Impossible Puzzle of Cybersecurity (Infographic)

Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Organizations are struggling to stop cyberattacks. Time for a different approach? Check out this infographic, based on an independent survey of 3,100 IT managers in 12 countries, and learn more by vising our website at www.pinecc.com
Tags : 
    
Pine Cove Consulting

The Impossible Puzzle of Cybersecurity

Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Cybersecurity just isn't getting any easier. While protection technolgoies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. Rather than continuing further with the same approach to cybersecurity, it’s time to move to cybersecurity as a system. By enabling security products to share information and work together in real time you can stay ahead of the threats while also freeing up valuable IT resources.
Tags : 
    
Pine Cove Consulting

Getting Your Analytics Efforts Started Right

Published By: Intel     Published Date: Sep 20, 2019
More data means more opportunities to discover powerful, actionable insights around customers, internal processes, and the broad market. Unfortunately, legacy IT architectures and approaches can block progressive analytics efforts. That leaves a lot of room for improvement, and the learning and investment curve for starting in analytics can be steep. However, tending to three core steps will prove immensely helpful on this journey: • Establishing an organizational foundation • Mapping the data pipeline • Transitioning analytics proofs of concept into production
Tags : 
    
Intel

Data Modeling in Apache Cassandra™: Five Steps to an Awesome Data Model

Published By: Datastax     Published Date: Oct 11, 2019
The first and most important step to building a successful, scalable application is getting the data model right. In this white paper, you’ll get a detailed, straightforward, five-step approach to creating the right data model right out of the gate—from mapping workflows, to practicing query-first design thinking, to using Cassandra data types effectively.
Tags : 
    
Datastax

Enterprise Information Mobility - 5 things best in class organizations are doing

Published By: Ricoh     Published Date: Sep 17, 2019
Organizations that digitize their workflows increase their productivity by 40.9% - IDC Business moves fast. The ability for employees to work from anywhere is becoming a major factor in business. With a solid mobility strategy, businesses can enable revenue growth, produce operational savings and enhance productivity. Take a holistic approach to Enterprise Mobility to improve processes, implement the proper technology and provide secure access to information, without disruption to existing processes. GET THE GUIDE NOW
Tags : 
    
Ricoh

Definitive Guide to Next-generation Fraud Prevention

Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.