romi

Results 51 - 75 of 781Sort Results By: Published Date | Title | Company Name

7 Ways APIs, Microservices, and DevOps Can Transform Your Business

Published By: MuleSoft     Published Date: Jul 13, 2018
"Organizations are increasingly looking for ways to better compete in the market by releasing products and/or services more quickly. This has left us with a variety of technology buzzwords, from APIs and microservices to DevOps, all promising great gain. It’s worth asking: which are worth the cost and time to implement? And what are the advantages of APIs, microservices, and DevOps? Read this e-book to learn about the advantages of APIs, microservices, and DevOps, all of which can help organizations increase their capacity for change. Topics covered include: -The API economy and how it is igniting a cultural shift in businesses -How APIs and microservices are not only becoming the norm in enterprises, but are also changing the role of IT -Why DevOps and APIs deliver greater advantages and business value together, than they deliver individually"
Tags : 
    
MuleSoft

A Commerce Team’s Guide to Accelerating Changes in the Age of Agility

Published By: Oracle     Published Date: Jun 01, 2016
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle

A Commerce Team’s Guide to Accelerating Changes in the Age of Agility

Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle Commerce Cloud

A Guide to DDoS Protection

Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc

A Guide to Relentless Automation

Published By: Ahead     Published Date: Jun 05, 2019
Digital transformation will fail without a commitment to automation - what AHEAD refers to as Relentless Automation. With the advent of public cloud and all of its promise, along with the ripple effect from the DevOps mantra of “automate everywhere”, technology teams must spin up new infrastructure, maintain configurations, and set up and tear down environments much faster than ever before. Of course, no one should automate for the sake of automating, or to simply be ahead of the curve. But while not every activity warrants automation - whether due to the complexity and nuance of the task, or its infrequent occurrence - Relentless Automation means identifying those tasks and processes where the benefits of automation outweigh both its upfront and recurring costs. Thankfully, the business benefits of standardizing and automating IT work are easy to spot: > Freeing up staff for higher value work > Reduction in errors and process variability > More auditability and accountability, helping
Tags : 
    
Ahead

A Look at Deception

Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec

A New Mandate for IAM with Multifactor Authentication

Published By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
    
OKTA

A Revolution In Customer-Centric Marketing

Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
In a world of perpetual innovations in technology, brands are continually stuck between slowing down and reinventing the wheel of martech which keeps them going, and staying put with delays in data activation. But they don’t have to settle for either of these approaches. Now is the time for enterprises to reclaim their brand’s independence in agility, innovation and customer obsession, removing all traces of vendor lock-in, slow-down or strategic compromise with a comprehensive, centralized approach to marketing technology which goes beyond DMP: Intelligent Orchestration.
Tags : 
data, brand, scaling, customer, marketing
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX

Aberdeen Group: Cross-Channel Campaign Management

Published By: Neolane, Inc.     Published Date: Jan 15, 2009
Today, many organizations struggle to optimize online and offline marketing campaigns across an ever growing number of new marketing channels. CMOs are increasingly accountable for demonstrating Return on Marketing Investments (ROMI) across channels and initiatives. Despite an abundance of campaign management technologies (enterprise marketing management, lead management, CRM, marketing automation, email marketing and a variety of point solutions) marketing departments still struggle with campaign performance, campaign workflow, and campaign management; particularly across multiple marketing channels.
Tags : 
neolane, aberdeen group, best-in-class, romi, multichannel marketing, cross-channel marketing, cost per lead, customer satisfaction
    
Neolane, Inc.

Abordar el dilema de la movilidad

Published By: Lenovo UK     Published Date: Nov 09, 2018
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK

Abordar el dilema de la movilidad

Published By: Lenovo UK     Published Date: May 15, 2019
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: Nov 09, 2018
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, workforce mobility
    
Lenovo UK

Aborder le dilemme de la mobilité

Published By: Lenovo UK     Published Date: May 15, 2019
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
    
Lenovo UK

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Accelerate growth with the ‘Cloud first Live Enterprise’

Published By: Infosys Limited     Published Date: Aug 02, 2019
The consumer packaged goods landscape is a sum of many complex and moving parts – a demanding and ever changing customer universe, with a subset of digital natives; a complex distribution system; and legacy IT systems from internal silos and mergers. In such a dynamic environment, we help our clients accelerate growth by transforming their organization to become a thriving Live Enterprise by augmenting their core digital capabilities. The cloud is an integral part of this digital transformation ushering CPG enterprises into a new era of hyper performance. Cloud promises to deliver several significant benefits including reduced costs, increased scalability, flexibility, and agility, leading to improved business performance and therefore growth. To better understand the specifics of cloud initiatives, we surveyed 167 senior executives from organizations in the CRL industry, with over USD 1 billion in revenues across the United States, Europe, Australia and New Zealand. Download thi
Tags : 
    
Infosys Limited

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Jan 16, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on these expectations grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: How agencies have increased IT agility with reusable microservices Why government IT teams must move beyond point-to-point integration How microservices enable secure data sharing within and across agencies How API-led connectivity supports microservices adoption in government
Tags : 
    
MuleSoft

Accelerating Government IT Innovation

Published By: MuleSoft     Published Date: Nov 27, 2018
Evolving citizen and constituent expectations have created the imperative for government to digitally transform. Delivering on digital transformation grows more challenging by the year, as the proliferation of modern technologies (e.g. SaaS, mobile, IoT) forces IT teams to rethink how to best deliver projects to their constituents and deliver on their mission. Microservices have emerged as a means through which government IT teams can increase project delivery speed without compromising on security. This whitepaper discusses the role microservices can play in government, and how API-led connectivity helps agencies to more effectively and securely implement a microservices architecture. Readers will learn: Why government IT teams must move beyond point-to-point integration How API-led connectivity supports microservices adoption in government How government can use MuleSoft’s FedRAMP In Process integration platform to rapidly develop APIs and microservices
Tags : 
    
MuleSoft

Accelerating UK government IT innovation

Published By: MuleSoft     Published Date: Apr 15, 2019
United Kingdom (U.K.) citizens expect fast, connected, and seamless experiences. Government bodies face a growing delta between citizen’s expectations of experience and the reality of how quickly they can deliver now that sophisticated private sector customer experiences are the new standard. Legacy IT stacks, budgetary constraints, and inflexible core systems are only a few of the hurdles government face to overcome the digital transformation imperative. By moving beyond point-to-point integration and embracing reusable microservices, government can increase the speed of delivery without compromising security. Read this whitepaper to learn: Why U.K. government must move beyond point-to-point integration. How API-led connectivity support microservices adoption in government. How government IT teams can use MuleSoft’s Anypoint Platform to better execute against their digital transformation agenda.
Tags : 
    
MuleSoft

Accelrys Biological Registration: Mastering Biological R&D at Its Roots

Published By: Accelrys     Published Date: Feb 08, 2012
This Perspective highlights Accelrys' Biological Registration, a new product solution with the ability to more effectively register, track, and manage promising biologics, resulting in more efficient biological product development. Find out more!
Tags : 
accelrys, idc, biological, registration, research, r&d, tracking, biologics, product development, protect discoveries, drugs to market, drugs
    
Accelrys

Access all your cloud-based apps with just one password.

Published By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption, soo, login, identity management, identity and access management, access, access management
    
IronStratus

Account-Based Marketing: The Next Generation of B2B Marketing Automation

Published By: Oracle OMC     Published Date: Nov 30, 2017
Your marketing budget and sales staff provide a finite set of parameters around how your business creates revenue. You need a way to get the most out of them while delivering on the brand promise and experience your customers expect. Enter Account-Based Marketing (ABM), the truest way to align your sales organization and marketing operations to drive holistic account interactions that yield higher returns. It’s the next generation of B2B marketing automation. According to Demandbase, “ABM is the process of identifying the companies most likely to buy, and then marketing to them. B2B companies understandably want to focus their marketing dollars on accounts with the highest potential to deliver sustainable revenue.”
Tags : 
    
Oracle OMC

Acelerar la transformación digital en la industria de los productos de consumo

Published By: SAP SME     Published Date: Apr 10, 2018
La industria de los productos de consumo está experimentando una gran transformación. Los consumidores demandan experiencias que ofrezcan confianza, alegía y protección – aunque son menos tangibles– estos son los impulsores que definirán el exito. Es por eso que las compañías de productos de consumo necesitan reimaginar todo, desde el compromiso del consumidor y las operaciones hasta la innovación de los productos. Las tecnologías emergentes como el Internet de las Cosas, Machine Learning e Inteligencia Artificial, pueden ayudar a guiar el rumbo de este cambio e impulsar el éxito del mismo.
Tags : 
    
SAP SME

Achieve Customer Centricity in a Hyper-Connected World (IIA)

Published By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
    
SAS

Achieving End to End UC Visibility

Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.