auto

Results 476 - 500 of 3248Sort Results By: Published Date | Title | Company Name

How automotive OEMs can use over-the-air (OTA) technology to reduce costs and increase revenue

Published By: HERE Technologies     Published Date: Dec 04, 2018
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
    
HERE Technologies

How Yelp connects people with great local business securely

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA

Ebook: 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them

Published By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk

The Business Value of Dell EMC Flash Storage (Infographic)

Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage

Endpoint Detection and Response: Automatic Protection Against Advanced Threats

Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike

Flash Storage Fuels IT Transformation

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted. Download this whitepaper to learn more about how Flash Storage powered by Intel® Xeon® processor fuels IT transformations below
Tags : 
    
Dell EMC Storage

Enabling IT Transformation with Modern Data Protection Strategies

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC Storage

The Business Value of Dell EMC Flash Storage

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage

Automating business processes using APIs

Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft

How Cambridge University Press Automates SAP Workloads on AWS

Published By: AWS     Published Date: Nov 26, 2018
How Cambridge University Press Automates SAP Workloads on AWS Abstract: In this webinar, Lemongrass will demonstrate the business opportunities presented by automating SAP workloads on AWS. They will also show you how they helped Cambridge University Press achieve the first stage of automation and the benefits that it’s delivering for them.
Tags : 
cambridge, university, press, automation, sap, workloads
    
AWS

2018 Security Implications of Digital Transformation Report

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA

Why Your Traditional Endpoint Security May be Putting you at Risk

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA

The Need for an Integrated Security Strategy

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA

Four Ways to Improve Endpoint Security: Moving Beyond Traditional Approaches

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA

How to Sell Marketing Automation to Executives

Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
Modern Marketing is Powered by Marketing Automation Join thousands of marketing professionals who have already secured executive buy-in and are benefiting from the power of marketing automation. This guide offers a look into the mind of an exec: what keeps them up at night, how do they view the marketing department, and how can marketing automation address their concerns. Use this guide to get a better understanding of what is Revenue Performance Management and the Two questions keeping your CEO awake at night. Also included are conversation starters you can have with your CEO and separate ones for CFOs and CIOs.
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017

Practical guide: How to enhance your BPO contract to accelerate automation

Published By: KPMG     Published Date: Nov 21, 2018
Many BPO providers have already invested heavily in robotic process automation (RPA), providing an opportunity to renegotiate your BPO contract to reflect the cost savings they are making as a result. But there’s more. Contract renegotiation also creates an opportunity to leverage providers’ investment to accelerate automation in your own business. Read this to discover: • the benefits of automating business processes and the impressive level of cost savings this can deliver • the impact of automation on the BPO market and the implications this has for BPO contracts • a five-step processing for assessing and renegotiating your outsourcing contract • three options for starting your automation journey.
Tags : 
    
KPMG

Practical guide: How to enhance your BPO contract to accelerate automation

Published By: KPMG     Published Date: Nov 21, 2018
Many BPO providers have already invested heavily in robotic process automation (RPA), providing an opportunity to renegotiate your BPO contract to reflect the cost savings they are making as a result. But there’s more. Contract renegotiation also creates an opportunity to leverage providers’ investment to accelerate automation in your own business. Read this to discover: • the benefits of automating business processes and the impressive level of cost savings this can deliver • the impact of automation on the BPO market and the implications this has for BPO contracts • a five-step processing for assessing and renegotiating your outsourcing contract • three options for starting your automation journey.
Tags : 
    
KPMG

Security at the Speed of DevOps

Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA

Cognitive Service Management: Embrace the Future of Service Management

Published By: BMC     Published Date: Nov 19, 2018
Learn how BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities
Tags : 
bmc, cognitive service management, service management, itsm, automation, digital transformation, network performance, business process automation
    
BMC

How to Enhance Your Data and Analytics Process

Published By: AWS     Published Date: Nov 15, 2018
It isn’t always easy to keep pace with today’s high volume of data, especially when it’s coming at you from a diverse number of sources. Tracking these analytics can place a strain on IT, who must provide the requested information to C-suite and analysts. Unless this process can happen quickly, the insights grow stale. Download your complimentary ebook now to see how Matillion ETL for Amazon Redshift makes it easy for technical and business users alike to participate and own the entire data and analysis process. With Matillion ETL for Amazon Redshift, everyone from CTOs to marketing analysts can generate valuable business intelligence by automating data and analytics orchestrations.
Tags : 
    
AWS

Improve Your Social Customer Experience

Published By: Spredfast     Published Date: Nov 15, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media
    
Spredfast

Can Chatbots Provide a Great Customer Experience?

Published By: Spredfast     Published Date: Nov 15, 2018
How Top Brands Automate Social Service Practices Today’s conversational commerce requires brands to provide immediate answers to their customers’ questions. Chatbots and artificial intelligence are fast becoming critical tools for customer service, bringing speed and scale that ensures a superior experience. But what are the best practices that marketers need to know to tackle the challenges of customer service automation? ?Learn from experts from General Motors, Booking.com and Spredfast about how to bring automation into your CX workflows and bolster your social service strategies. You’ll find out: How to think about automation for your business? How chatbots enhance your agent workflows?? ??How Booking.com and GM are using AI to drive inspiration and customer? service efficiencies??
Tags : 
    
Spredfast

Six Guiding Principles for Effective Data Lake Pipelines

Published By: Attunity     Published Date: Nov 15, 2018
IT departments today face serious data integration hurdles when adopting and managing a Hadoop-based data lake. Many lack the ETL and Hadoop coding skills required to replicate data across these large environments. In this whitepaper, learn how you can provide automated Data Lake pipelines that accelerate and streamline your data lake ingestion efforts, enabling IT to deliver more data, ready for agile analytics, to the business.
Tags : 
    
Attunity

Move your assets from tape to cloud and unleash their profit potential

Published By: Wasabi     Published Date: Nov 13, 2018
It is critical for media and entertainment companies that they get the most out of the content they’ve invested in. But for many monetization of their assets is being inhibited by slow and expensive tape-based archival solutions (LTO) as well as first generation cloud storage like Amazon. Wasabi Hot Cloud Storage, in partnership with Marquis Medway, is bringing media and entertainment companies a transformative new solution. Wasabi’s next generation cloud storage brings companies the speed they need to leverage their content, but costs far less than the traditional cloud storage options. Plus unlike Amazon and others, Wasabi does not charge you to retrieve your content—potentially a huge savings depending on how much you access it. To help you quickly and efficiently get assets from tape to cloud Wasabi has combined with Marquis Medway’s advanced workflow automation platform. To learn more about how this integrated solution can help you rapidly transition away from resource draining LT
Tags : 
    
Wasabi

VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.