cti

Results 26 - 50 of 19998Sort Results By: Published Date | Title | Company Name

Automate Dev and SecOps Deployments with CI/CD Pipeline Integrations

Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
"The practices of continuous integration, continuous delivery, and continuous deployment offer the promise of safer, faster, and more efficient software development. Critical to realizing this promise is the integration of application delivery and security services into the development and deployment workflows. F5 offers the platform, the integration, and the training to insert industry-leading application protection and optimization services into workflows so that software can be built, tested, and deployed with the services it needs to be secure, fast, and available. Download the solution guide to get all the details. "
Tags : 
    
F5 Networks Singapore Pte Ltd

Innovación satelital: Conectar a Perú en la tierra y en el mar

Published By: SES     Published Date: Aug 01, 2019
Descubra cómo una empresa de comunicaciones está llevando conectividad a las zonas más remotas de Perú. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avión, Axesat está entregando soluciones por satélite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cómo, en asociación con SES Networks, la empresa puede aumentar el comercio y la conectividad en Perú.
Tags : 
    
SES

Reducir la brecha digital: Cómo entregará 5G extendido por satélite

Published By: SES     Published Date: Aug 01, 2019
La brecha digital está obstaculizando el uso del potencial de las regiones de pocos recursos en todo el mundo. Este artículo explora cómo una red 5G puede reducir drásticamente la brecha digital y mejorar las condiciones económicas en todo el mundo. Descubra cómo la tecnología satelital puede aumentar la conectividad en regiones de pocos recursos y tener un impacto positivo en la telemedicina, el empleo a distancia y las oportunidades de educación.
Tags : 
    
SES

Reduzindo a divisão digital: Como a tecnologia de satélite irá fornecer uma rede 5G disseminada

Published By: SES     Published Date: Aug 01, 2019
A divisão digital impede o aproveitamento de todo o potencial das regiões carentes do planeta. Neste artigo, o autor mostra como uma rede 5G pode reduzir drasticamente a divisão digital e melhorar as condições econômicas em todo o mundo. Veja como a tecnologia de satélite pode aumentar a conectividade em regiões carentes e beneficiar a telemedicina, o emprego remoto e as oportunidades em educação.
Tags : 
    
SES

Inovação de satélite: Conectando o Peru por terra e mar

Published By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicações está levando conectividade às áreas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessível apenas por avião, a Axesat está levando soluções de satélite e cobertura de rede 4G a áreas que eram impossíveis de alcançar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comércio e a conectividade no Peru
Tags : 
    
SES

White Paper: From the Data Center to the Cloud to the Intelligent Edge

Published By: Intel     Published Date: Nov 13, 2019
A modern network typically extends from the core data center out to the edge and across multiple public, private, and hybrid clouds. This reality is changing how networks are architected, deployed, and managed. Modern, future-ready networks must bring the scale, reliability, and efficiency associated with the cloud into the enterprise network. This can be done through server-based network virtualization and orchestrated virtual network functions (VNFs) that allow network infrastructures to deliver innovative services with efficiency and ease
Tags : 
    
Intel

eGuide: Exploring the path from AI theory to business value

Published By: Intel     Published Date: Nov 14, 2019
Infrastructure considerations for IT leaders By 2020, deep learning will have reached a fundamentally different stage of maturity. Deployment and adoption will no longer be confined to experimentation, becoming a core part of day-to-day business operations across most fields of research and industries. Why? Because advancements in the speed and accuracy of the hardware and software that underpin deep learning workloads have made it both viable and cost-effective. Much of this added value will be generated by deep learning inference – that is, using a model to infer something about data it has never seen before. Models can be deployed in the cloud or data center, but more and more we will see them on end devices like cameras and phones. Intel predicts that there will be a shift in the ratio between cycles of inference and training from 1:1 in the early days of deep learning, to well over 5:1 by 2020¹. Intel calls this the shift to ‘inference at scale’ and, with inference also taking up
Tags : 
    
Intel

Solution Brief: Optimizing HPC Infrastructure for AI Convergence

Published By: Intel     Published Date: Nov 14, 2019
Evaluating an existing HPC platform for efficient AI-driven workloads The growth of artificial intelligence (AI) capabilities, data volumes and computing power in recent years mean that AI is now a serious consideration for most organizations. When combined with high-performance computing (HPC) capabilities, its potential grows even stronger. However, converging the two approaches requires careful thought and planning. New AI initiatives must align with organizational strategy. Then AI workloads must integrate with your existing HPC infrastructure to achieve the best results in the most efficient and cost- effective way. This paper outlines the key considerations for organizations looking to bring AI into their HPC environment, and steps they can take to ensure the success of their first forays into HPC/AI convergence.
Tags : 
    
Intel

Protect Users Without Frustrating Them Using AI-driven Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec

Remote Access Authentication Using Behavioral Biometrics

Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec

Protecting High Net Worth Individuals Without Adding Friction

Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec

Protecting Financial Transactions for Users on the Go

Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec

An Overview of SD-WAN for Business

Published By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises’ increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
    
Juniper Networks

More than 80% of Organisations in Asia are not Protected Against Today's Threats

Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks

Robotics Process Automation and its growing acceptance in the Life Science Industry

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Nov 07, 2019
Automation in ERP, CMS and vendor management. Streamlined inventory and logistics management. Reduction in manual errors and an increase in quality and efficiency. All this and a lot more can happen to heal inefficiency and unproductivity at your Life Sciences enterprise. All it takes is a healthy dose of RPA. A must-read.
Tags : 
    
Larsen & Toubro Infotech(LTI)

Insight: Changing supplier relationships in a digital age

Published By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Here’s how to get started. Read this insight to discover: • key steps for building strong supplier relationships • potential risk areas that must be managed • why behaviour change is as important as processes and tools • why aligning your own organisation is essential.
Tags : 
    
KPMG

Briefing: Industry 4.0 - Lessons for C-suite leaders

Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG

Insight: Optimising the supply chain through digital transformation

Published By: KPMG     Published Date: Jun 10, 2019
Develop practical strategies for success and manage the risks associated with supply chain transformation. Read this insight to find out about: • the digital solutions companies are using to reshape their supply chains • the benefits they realise as a result • how to identify opportunities for optimisation in your own supply chain • which practical strategies to deploy for successful digital transformation.
Tags : 
    
KPMG

Guide: Designing and operating supply chains for a digital world

Published By: KPMG     Published Date: Jun 10, 2019
Whether you want to optimise existing processes or transform entire operations, find practical advice on building digital solutions into your supply chain. Read this guide to find out • why defining your performance ambition must be the first step • how to draw up a digital roadmap • how deploying digital solutions will impact your workforce • what partners you will need to realise your vision • practical examples from real companies.
Tags : 
    
KPMG

Insight: Customer Centricity and the COO

Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG

Report - Reshaping Finance: Building the service delivery model of the future

Published By: KPMG     Published Date: Jul 31, 2019
From intelligent automation to advanced analytics, disruptive technology will enable the finance function to provide all of its services more effectively and efficiently. Find out how technology will change the way finance delivers transactional services, expert services and business partnering, Read this report to discover: • how automation in finance can deliver expert services more reliably and with smaller workforces • how to design an agile workforce of humans and technologies • how the finance function will shift to be part of a cross-functional analytics model that provides key insights to the business
Tags : 
    
KPMG

Three Steps to Easier Patient Visits and Better Practice Outcomes

Published By: Nextgen     Published Date: Sep 25, 2019
Your practice can save time and money by delivering on patient expectations. You can better keep up with regulatory demands and reporting requirements—and avoid unsatisfied and unresponsive patients—when you employ best practices that address patient needs. In this eBook, you’ll learn strategies to avoid missed revenue and save staff effort by using smart efficiency improvements, such as checking insurance information up front. You’ll also learn how you can get back to caring for patients, not chasing payments—and the secret to achieving strong financial outcomes. Finally, you’ll discover how you can get paid quickly, easily, and fully—all while addressing your patient demands for an improved, more efficient experience.
Tags : 
    
Nextgen

4 Models to Enable a Frictionless Customer Experience with Integrated Point-of-Service Solutions

Published By: Oracle     Published Date: Sep 05, 2019
In this guidebook, learn how modern retailers are using integrated hardware and software POS solutions to expand the range of their customer interactions. One thing is certain, hardware and software must work together to readily accommodate new consumer demands.
Tags : 
    
Oracle

Gartner Magic Quadrant for Digital Commerce 2019

Published By: Oracle     Published Date: Sep 12, 2019
Digital commerce platform complexity continues to increase due to constant changes in product offerings and functionality, technology delivery, and pricing models. We evaluate the viability of 13 vendors to assist application leaders supporting digital commerce in making an objective evaluation.
Tags : 
    
Oracle

The modern CMO: Advancing marketing from reactive to predictive

Published By: Intapp     Published Date: Nov 01, 2019
Chief Marketing Officers who modernize business development strategies can accelerate revenue and market share growth with both new and existing clients. This requires unifying data across the entire client lifecycle, making that data transparent, and developing insights that drive better decision making across the board. How much of an impact can this modern approach make? According to a recent study conducted by ALM Legal Intelligence and Calibrate Legal, the investment pays off with Am Law 200 firms seeing an average return of $47 million on $1 million of marketing and business development spending. Download this point of view to learn what it takes to transform today’s law firm marketing from reactive to predictive. Topics include: Winning business with data-driven insights CMOs as change agents The data divide Smart collaboration in action: Key-client planning The pivot: From reactive to predictive
Tags : 
    
Intapp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.