it evolution

Results 326 - 350 of 489Sort Results By: Published Date | Title | Company Name

Digital Transformation with the Node.js DevOps Stack

Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source, web applications, web development, java
    
NodeSource

The Crossover Effect: Positioning Consumer Products Companies on the Growth Path

Published By: Google - SAP     Published Date: Jun 20, 2019
Maximize go-to-market initiatives with SAP To succeed in today’s hypercompetitive environment, consumer products companies need greater speed and agility. See how SAP C/4HANA solutions can help you synchronize activities across your modern trade and direct-to-consumer efforts – and ultimately bring you closer to your consumers. Grow your brand and your market share with an intelligent strategy. The Crossover Effect: Positioning Consumer Products Companies for Growth Learn how SAP empowers consumer products companies to improve customer experience and leverage new types of data, digital capabilities, and success measures to drive growth. ? Join the Direct-to-Consumer Revolution Learn about how SAP Customer Experience solutions enable consumer products companies to get closer to the consumer than ever before. ? Henkel Drives Sales Innovation with SAP Trade Management Martin Reinicke of Henkel Beauty Care shares how the SAP Trade Management solution helps the company adapt to rapid m
Tags : 
    
Google - SAP

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
Qualys

The Recruiting Funnel, Deconstructed

Published By: Jobvite     Published Date: Aug 25, 2016
This explosion in the amount of information is similar to the boom the marketing world saw in the early 2000’s with the introduction of customer data. Now that recruiters finally have access to the same types of information as marketers, it’s becoming more clear that recruiting is marketing. Whereas the marketing world immediately saw the value in this data and latched onto technologies that could leverage the information, the recruiting world is just catching up. The proliferation of CRMs has revolutionized marketing and business development. Creating and maintaining relationships has always been part of a sound business strategy, but that nebulous process has now been operationalized through software like Salesforce. There is a reason the CRM software market has boomed to over $20 billion...it works. Personalizing the process to maintain constant contact and build relationships has been shown to be extremely effective in converting leads to sales.
Tags : 
    
Jobvite

Data Center Networking Trends 2017

Published By: Cumulus Networks     Published Date: Dec 30, 2016
As one of the fastest moving industries in terms of innovation and change, Information Technology is rife with predictions for what will be "the next big thing". Networking is undergoing a shift with the adoption of web-scale and open networking approaches. Fill out the form to the right to view our webinar and hear experts from Cumulus Networks, IPspace, and Facebook discuss their predictions for what will be the biggest changes and evolutions in data centers this year.
Tags : 
    
Cumulus Networks

AI Powered Threat Prevention: A Cybersecurity Revolution

Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
The application of AI within the cybersecurity market is transforming the industry. AI based threat prevention delivers previously unheard of operational efficiency, ROI, and efficacy.
Tags : 
    
BlackBerry Cylance

Best Practices for the New Way to Recruit

Published By: iCims     Published Date: Dec 01, 2015
Learn How Successful Recruiters Prepare for the Revolution in Talent Acquisition. View eBook Today!
Tags : 
recruiting, human resources, social recruiting, social media recruiting, social recruiting software
    
iCims

Going Global Without Going Broke: An Evolutionary Approach to a Global Web Presence

Published By: White Horse     Published Date: Sep 27, 2010
Identify the global website strategy that makes the most sense for your brand based on a few simple criteria. Clearly articulate what your company's global presence actually is. Understand your company's global organizational structure. How are your web budgets allocated? Once you have this criteria you can begin to determine your evolutionary stage and what the next steps are in creating your global web presence.
Tags : 
website strategy, global website, interactive marketing, digital marketing
    
White Horse

Define, Hire, And Develop Your Next-Generation Project Managers

Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : 
citrix gotomeeting, project management, collaboration, software delivery, remote access, remote network management, content delivery
    
GoToMeeting

Evolving Datacenter Architectures: Cloud-ready IT

Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Tags : 
datacenter, data center, architecture, virtualization, network, infrastructure, network architecture, network performance
    
HP and Intel® Xeon® processors

Whitepaper: Reinventing Antivirus: Cloud architecture and behavior recognition are changing the game

Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development
    
Webroot

Making the Transition from Project Management to Project Leadership

Published By: AtTask     Published Date: Jul 17, 2014
When it comes to project management, we tend to talk about the tactical—the assignments, the tasks, the approvals, and so on. But business is evolving, and many project teams are now being asked to lead change, instead of just timelines and milestones. This evolution is accelerating and is driven by fresh thinking and business necessity supported by advanced technologies that are highly accessible to a much broader range of contributors. Effectively managing work is no longer just the role of a few specialists. In this Whitepaper you will learn lessons from 40 PPM experts on making the transition from project management to project leadership.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
AtTask

DevOps/Continuous Delivery Tooling: Launchpad for the Digital Enterprise An EMA Report

Published By: Riverbed     Published Date: Jul 10, 2017
The digital economy is characterized by a rapidly changing and fast-moving business climate. This “need for speed” has revolutionized application and software delivery, where DevOps and Continuous Delivery have become core competencies
Tags : 
    
Riverbed

The Case for Third Party Archiving in Microsoft Exchange Environments

Published By: Actiance, Inc.     Published Date: Nov 04, 2014
The native archiving capabilities in Microsoft Exchange 2013 are useful and represent a reasonable evolution of the archiving features and functions that were initially offered in Exchange 2010. However, for many regulated companies or those subject to a lot of litigation, the native archiving capabilities of Microsoft Exchange are not enough. They need to be supplemented with third-party archiving tools. Download now and learn more!
Tags : 
actiance, third party archiving, microsoft exchange environments, litigation, microsoft exchange 2013, it management, knowledge management
    
Actiance, Inc.

How to Build a Rich Talent Pool

Published By: Jobvite     Published Date: Mar 31, 2015
The recruiting industry is not what it used to be. Jobs, technology, candidates, and strategies have all changed immensely over the past few years, as STEM positions proliferate, social media explodes, and a new generation of workers—complete with new habits, wants, and needs—has emerged. You've probably felt the impact of this evolution firsthand, and you've realized that it doesn't matter how many people are actually out there looking for jobs (or not looking for them, as the case might be). If you’re having trouble finding the right candidates for the right positions at the right times, you’re dealing with a talent shortage. In this eBook, we outline four critical ways you can ensure the development of a rich talent pool.
Tags : 
talent pool, recruiting, technology, strategy, hiring, jobseekers, social media, employment
    
Jobvite

The Business Information Revolution: Best-Run Businesses Innovate Better with SAP

Published By: SAP     Published Date: Apr 14, 2011
The recent wave of new business analytics tools, solutions, and capabilities marks a true revolution in BI. In this SAPinsider Special Report on Business Intelligence, SAP Executive Vice President Sanjay Poonen lends his insights on the market drivers for this BI revolution, and explains what it all means for SAP customers. The article also features SAP ecosystem partners highlighting how SAP customers can unleash the power of information to truly innovate their business.
Tags : 
business intelligence, business analytic tools, sanjay poonen, information management, enterprise performance management, governance, manufacturing intelligence, sap
    
SAP

Next Generation Privileged Identity Management: Are You Ready?

Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation

Predictive Analytics and Artificial Intelligence Technology: A Sirius Perspective

Published By: Mintigo     Published Date: Sep 05, 2018
One of the most common use cases for AI in B2B is to make predictions about which accounts are most likely to buy and which leads are most likely to convert. However, use cases for AI are being extended beyond predictive account and lead scoring to include decision-making and process automation as well. Download this SiriusDecisions technology perspective on Predictive Analytics and Artificial Intelligence Technology to learn more. This paper will cover: • The benefits, evolution and capabilities of AI technology solutions for B2B organizations • The core and extended capability groups of AI • The business priorities supported by AI Fill out the form to get your free copy!
Tags : 
    
Mintigo

Why Cylance Beats the Competition When It Comes to Endpoint Protection

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance

LNS Research: Quality 4.0 Impact and Strategy Handbook

Published By: SAS     Published Date: Mar 06, 2018
The most recent decade has seen rapid advances in connectivity, mobility, analytics, scalability, and data, spawning what has been called the fourth industrial revolution, or Industry 4.0. This fourth industrial revolution has digitalized operations and resulted in transformations in manufacturing efficiency, supply chain performance, product innovation, and in some cases enabled entirely new business models. This transformation should be top of mind for quality leaders, as quality improvement and monitoring are among the top use cases for Industry 4.0. Quality 4.0 is closely aligning quality management with Industry 4.0 to enable enterprise efficiencies, performance, innovation and business models. However, much of the market isn’t focusing on Quality 4.0, since many quality teams are still trying to solve yesterday’s problems: inefficiency caused by fragmented systems, manual metrics calculations, quality teams independently performing quality work with minimal cross-functional own
Tags : 
    
SAS

Social Intelligence: Next-generation Social Media Monitoring

Published By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster

IPAM Intelligence: All Roads Lead to Proteus

Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Published By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
    
Qualys

The Evolution of Payables: How AP Invoice Automation Is Changing the Game

Published By: Esker     Published Date: Jun 29, 2015
Download the IFO’s new white paper, The Evolution of Payables, for an in-depth examination of the latest AP trends, and their impact on your financial operations.
Tags : 
automation, cloud computing, mobile, analytics, visibility
    
Esker

7 Reasons To Consider Responsive Design For Your Companys Next Generation Website

Published By: Bridgeline Digital     Published Date: Apr 08, 2013
In this white paper, learn the 7 reasons to consider responsive design for your company's next generation website. With the mobile revolution already present, it is important to know the reasons why you must reconsider the design of your website. Branding, accessibility and cost are big reasons to consider responsive design for your companies website.
Tags : 
company, next generation website, accesibility, branding, cost, bridgeline
    
Bridgeline Digital
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.