challenge

Results 201 - 225 of 3901Sort Results By: Published Date | Title | Company Name

A CIO's Guide - 5 Steps to Business Agility

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The pace of change is accelerating. Customer expectations, competitive shifts and regulatory changes are disrupting global markets—and the way you do business. In this fast-paced application economy, software is at the heart of every business, driving every industry. Gone are the days when you could build an application or product and then go years without changing much. To survive the disruptive outside forces lurking around practically every corner, you have to stay on top of your game and a step ahead of competitors. Your peers at other companies are likely facing challenges similar to yours, yet you see them leading the industry by consistently sensing market opportunities and delivering innovative new products. How do they do it? Find out by downloading this whitepaper.
Tags : 
    
CA Technologies EMEA

A CIO's Guide: Building Business Trust with Application Performance Monitoring

Published By: Quest Software     Published Date: Jan 04, 2013
Download this whitepaper to access a constant dialogue with CIOs and other high-level business executives about their top challenges and concerns.
Tags : 
cio, business executives, technologies, complexities, business relevance, modern applications, business technology
    
Quest Software

A CIO's Perspective on GDPR Readiness

Published By: Forcepoint     Published Date: May 14, 2019
The CISO, Head of Human Resources, CIO, and Chief Legal Council are not the cast of characters you would expect to see solve a data protection challenge. Yet, the GDPR’s far-reaching impact has forced teams who typically don’t work together to collaborate to solve a nuanced problem they never thought they would have. Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
    
Forcepoint

A CIO’s guide to building a bank that thrives on change

Published By: IBM     Published Date: Aug 26, 2019
To meet challenges & opportunities in today's digitally-connected world, you need a modern IT infrastructure that gives you the flexibility to respond to opportunities quickly, work across ecosystems and scale safely as you grow. In this book, learn how LinuxONE can help your business design disruptive IT services. Download Now.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM

A Ciso Guide to Multi-cloud Security

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA

A CISO's Guide to Securing Open Source Software

Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

A Comprehensive Guide: Apple Device Security for Beginners

Published By: Jamf     Published Date: Aug 06, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf

A Comprehensive Guide: Apple Device Security for Beginners

Published By: Jamf     Published Date: Aug 12, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf

A Comprehensive Quantitative Assessment of the IBM Cognos Analytics Value Proposition (TVO Paper)

Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM

A Data Protection Strategy for Small and Midsize Companies

Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication
    
HP and Intel® Xeon® processors

A Day in the Life of Data

Published By: HP     Published Date: Aug 21, 2014
This video (3:58 min) shows the typical journey that your data might take from its creation to its retirement. HP Experts discuss how various storage solutions are used to best handle, protect and retain that data regardless of how and where it is being used.
Tags : 
data, storage solutions, storeonce, deduplication, storage, it benefits, backup systems, challenges
    
HP

A Day in the Life: Finance Practitioners

Published By: Workday     Published Date: Aug 14, 2019
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday

A Day in the Life: Finance Practitioners

Published By: Workday     Published Date: Mar 20, 2019
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday

A Day in the Life: Finance Practitioners

Published By: Workday APAC     Published Date: Dec 18, 2018
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
    
Workday APAC

A Finance Director’s Guide to International Expansion for High-Growth Companies

Published By: Oracle     Published Date: May 20, 2019
International expansion comes with some very specific challenges, not least cultural differences, language barriers and competition from home-grown players in a new region. This can be particularly challenging for high-growth organisations that often find themselves expanding rapidly without established structures and processes, lack of experienced staff, stretched resources and a strategy that is also evolving as they grow. There’s no two ways about it: going global can be a risky business, even if the potential rewards are high. Download this whitepaper for useful tips on International Growth
Tags : 
    
Oracle

A Finance Director’s Guide to International Expansion for High-Growth Companies.

Published By: Oracle     Published Date: Nov 07, 2018
Going global: Overcoming new challenges in new territories. Once a business has experienced success at home and begun to build a loyal customer base there, international expansion is often seen as the logical next step.
Tags : 
    
Oracle

A Five Phase Approach to Email Marketing

Published By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : 
email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing
    
AcquireWeb

A full-service Swedish bank optimizes risk management capabilities - IBM resiliency consulting solut

Published By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : 
ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization
    
IBM

A Glance at the Current BDR Landscape: Will You Be Prepared When Disaster Strikes?

Published By: Kaseya     Published Date: Mar 12, 2015
TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.
Tags : 
backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
Kaseya

A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP

Published By: RingCentral     Published Date: Nov 10, 2015
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ringcentral, network, cloud, voip, wireless, security, business technology, data center
    
RingCentral

A Guide to Assessing the Network Benefits and Requirements of Cloud VoIP

Published By: Ring Central     Published Date: Mar 21, 2016
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ring central, cloud phone service, communications, network, cloud, wireless, enterprise applications, business technology
    
Ring Central

A Guide to Disaster Recovery in the Cloud

Published By: VMware, Inc     Published Date: Oct 28, 2014
For organizations with disaster recovery services in place, the challenge often lies in supporting the ongoing maintenance and re-evaluating the initial investment versus newer offerings as their environment continues to expand, or leases expire. Fortunately, the landscape of disaster recovery solutions is shifting to accommodate changing IT needs. VMware vCloud® Air™ Disaster Recovery provides simple, affordable, automated processes for replicating and recovering critical applications and data — at a fraction of the cost of duplicating infrastructure or maintaining additional data centers. Organizations can afford to scale their efforts as needed, with flexible terms and resource options.
Tags : 
cloud, disaster recovery, infrastructure, automated processes, replication, networking, data center
    
VMware, Inc

A guide to optimizing digital marketing performance through better data.

Published By: Claravine     Published Date: Jan 03, 2019
Marketers have long struggled with the simple task of knowing which marketing spend is truly effective, and how to optimize that spend. At the heart of the issue lies the challenge of ensuring the data quality and consistency exists to make decisions based on real intelligence. Why is this a problem? First, effective tracking is reliant on the consistent, complete application of campaign tracking codes and associated metadata, which has traditionally been a manual, ungoverned process. Adding to this complexity has been the dramatic expansion of digital marketing point solutions, and the disparate teams expected to execute across each of these channels and geographies. The result is what you would expect—highly inaccurate, incomplete, and inconsistent data that must be manually cleaned before reporting is possible. Fortunately a solution exists. Progressive marketing leaders are implementing Digital Experience Data Management (DXDM), ensuring the rich, consistent insights critical to ma
Tags : 
    
Claravine

A Guide to Pairing Apache Kafka with a Real-Time Database

Published By: MemSQL     Published Date: Nov 15, 2017
Pairing Apache Kafka with a Real-Time Database Learn how to: ? Scope data pipelines all the way from ingest to applications and analytics ? Build data pipelines using a new SQL command: CREATE PIPELINE ? Achieve exactly-once semantics with native pipelines ? Overcome top challenges of real-time data management
Tags : 
digital transformation, applications, data, pipelines, management
    
MemSQL

A Guide to Private Cloud Security

Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.