quest

Results 1526 - 1543 of 1543Sort Results By: Published Date | Title | Company Name

The Future of Software Testing: 12 Experts Share their Predictions

Published By: Tricentis     Published Date: Jan 08, 2018
More than just an evolution, the software testing field is in the midst of a period of extreme change. What exactly does this change entail? How can software testers prepare for this change? And, perhaps most importantly, what change has yet to come? To answer these questions and more, we turned to 12 well-respected, highly seasoned software testing leaders.
Tags : 
    
Tricentis

IDC Analyst Connection: Creating a Secure Development Environment

Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable

7 Questions SRM Leaders Aren't Asking OT Security Providers During Technology Selection

Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable

Cinq questions à Paul Hamerman sur la planification opérationnelle et financière

Published By: Workday France     Published Date: Mar 08, 2018
Vice Président et analyste principal chez Forrester, Paul Hamerman s'intéresse tout particulièrement aux applications de gestion des ressources humaines et financières, ainsi qu'aux tendances et orientations de l'ensemble du marché des applications d'entreprise. Paul répond à 5 questions clés que doivent nécessairement se poser les entreprises au moment de rechercher des solutions de planification RH et financière adaptées au monde économique moderne.
Tags : 
    
Workday France

Reinvent your technology strategy for a changing world

Published By: KPMG     Published Date: Sep 13, 2018
Create a transformation vision and an integrated technology roadmap to get started towards your goals. As digital complexity increases, you’ve probably spent a lot of time making sure your customer-facing strategies and technologies are ready to meet the next challenge. And rightly so. But what about your internal functions? Are your ERP, finance, HR, procurement and supply chain strategies ready? You may be asking some hard questions: • How do I manage a large-scale transformation of my back office underpinned with the right technologies? • Is my technology strategy truly aligned to meet my business goals? • What are other organizations doing to make the transition? KPMG Technology Strategy and Selection gives you the tools to frame such decisions by working with you to develop a transformation strategy that’s based on your organization’s overarching business needs. One that will diminish some of the noise of disruption by helping you see what’s coming--while focusing on an integr
Tags : 
kpmg, business transformation
    
KPMG

Turbonomic White Paper: The Path to Hybrid Cloud

Published By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
    
Turbonomic

How To Tell Your CISO: An Investment Case For Complete Website Security

Published By: DigiCert     Published Date: Jun 19, 2018
Are you spending too much time managing SSL/TLS certificates? Can you scan and report on your entire certificate estate? Have you seen a service go offline because of an expired certificate? Do you have to update certificates manually? If the answer to any of these questions is ‘yes’ then it’s time to invest in an automated certificate management tool. Download this whitepaper to find out more.
Tags : 
    
DigiCert

La présentation compte: 3 éléments qui peuvent entraver la productivité d’une entreprise

Published By: PGi     Published Date: Jan 24, 2019
Pensez à la dernière fois où vous vous êtes connecté à votre e-mail, vous avez visité un réseau social ou avez téléchargé une nouvelle appli mobile. Avez-vous été en mesure de trouver toutes les informations que vous recherchiez? Avez-vous pu accéder à toutes les fonctionnalités que vous vouliez? Pouvez-vous même dire qu’il a été agréable? 2 Lorsque vous répondez à ces questions, vous définissez votre expérience avec un produit, une plate-forme et une marque. Et la manière dont vous répondez à ces questions réaffirme combien il est très important qu’une interface utilisateur (UI) et une expérience utilisateur (UX) soient instinctives.
Tags : 
    
PGi

Defining the True Benefits of Software-as-a-Service

Published By: Workday Italy     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Italy

Defining the True Benefits of Software-as-a-Service

Published By: Workday Spain     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Spain

Approfondimenti dai dirigenti Workday: due lezioni di leadership

Published By: Workday Spain     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
    
Workday Spain

4 Questions You Should Ask

Published By: SAP     Published Date: Aug 13, 2018
In-Memory or In-Legacy?
Tags : 
    
SAP

The Top 5 Questions to Consider When Choosing a Background Screening Provider

Published By: Asurint     Published Date: Aug 02, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs.
Tags : 
    
Asurint

Revolutionizing the Professional Services relationship with Time

Published By: Intapp     Published Date: May 10, 2019
How many hours did your professionals spend on this client, on that project, on those tasks? Those are the cornerstone metrics of Old Time. They answered the question, “how much should we bill?” This is still a valuable query, but in this new world in which data is pored over and mined for every bit of its value, it is only one of many questions that firms must ask of its time data. Are our professionals working efficiently? Are we pricing future contracts competitively? Are our projects on budget? Did we miss billable hours? Are our professionals spending too many hours tracking their time? Intapp Time provides the superior business intelligence with which to answer these questions and change your firm’s fundamental relationship with Time.
Tags : 
    
Intapp

Synthetic Identities: Are you chasing invisible footprints?

Published By: FICO EMEA     Published Date: Aug 28, 2019
Synthetic Identity Fraud is growing in both scope and complexity. As your fraud protection efforts succeed in some areas of your business, fraudsters are devising new ways to penetrate your defenses. Do you understand the concepts of Bust Out Fraud, Data Furnishing, and Piggybacking? These are just some of the new techniques that fraudsters are using to exploit the holes in your fraud defenses. Download the eBook "Synthetic Identities: Are You Chasing Invisible Footprints?" This insightful eBook illustrates the aggressive techniques that fraudsters are using and answers questions such as: What are the six major factors driving the growth in Synthetic Identity Fraud? How are synthetic identities used? What are Bust Out Fraud, Data Furnishing, and Piggybacking, and how do they work? Perhaps more importantly, what are the state-of-the-art strategies used to fight these increasingly sophisticated fraud techniques?
Tags : 
synthetic identity fraud, manage fraud
    
FICO EMEA

Turn In-Transit Inventory into Working Capital

Published By: UPS Capital     Published Date: Feb 13, 2019
WD Music is a one-of-a-kind company, but their path to growth was blocked by a problem faced by thousands of small and mid-sized businesses: their precious capital was tied up in a long cash-conversion cycle. WD Music had to pay suppliers in-full for guitar parts, then wait weeks or months to recoup the cash from customer sales. This left them without the working capital to buy more inventory, fulfill more orders and create a healthier, more profitable business. One day, Larry Davis, Vice President of WD Music, was speaking with Greg Kleehammer, from UPS Capital®. Kleehammer asked a simple question: “What if you could take one of your company’s biggest assets — your in-transit inventory — and turn it into working capital?” That’s how WD Music discovered an alternative-financing solution that opened the door to more growth, more prosperity and a lot less stress.
Tags : 
    
UPS Capital

Its Time: The Hidden Value of Unstructured Data

Published By: Expert System     Published Date: Jul 26, 2019
As companies increasingly recognize the business implications and actionable benefits of AI, the question becomes: How will you use AI for your business? Thanks to the Cogito platform based on AI algorithms, organizations can effectively support and improve unstructured information management and text analytics in order to: Leverage all information, combining internal knowledge with other information sources to extract relevant data Provide effective and real-time insight on strategic initiatives, partners and any third parties Mitigate and even completely avoid risks for operations, reputation, etc. through information analysis and monitoring Know what competitors are doing and intercept market trends Implement automation for the broader, more complex set of processes that involve data Free up teams to focus on more creative or critical activities inside the organization See the entire business through a different perspective
Tags : 
    
Expert System

SiteIQ and the Art of Empowerment

Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.