was

Results 1 - 25 of 1516Sort Results By: Published Date | Title | Company Name

Modern Servers Drive Cost Parity with Public Cloud

Published By: Dell EMC     Published Date: May 08, 2019
ESG recently conducted a quantitative research study to assess companies’ IT Transformation maturity. ESG found that operating a modern server environment, defined as an environment in which operations tasks are more automated than manual, led to a perception of cost parity with the public cloud. Nearly half felt their cost of compute was highly competitive with CSPs and another 48% felt it was generally comparable. This compares favorably to the 19% and 47% respectively among organizations running a legacy server environment. Download this solution brief from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC

Cloud self-service platform enabled 25% cost saving for a BFS Major

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)

Empowering the water industry workforce for asset performance improvement

Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric

Digital Transformation in the Water Industry

Published By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : 
water, plant, pump
    
Schneider Electric

HFS Top 10 Cognitive Assistant Service Providers

Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
HfS published the Top 10 Cognitive Assistant Service Provider report that explores the emerging conversational service provider ecosystem across key areas including execution ability, innovation capability, and the voice of the customer. The conversational services called as Cognitive Assistants, go beyond the traditional chatbots and augment human-customer interaction across both front- and back-office business operations. IBM was recognized for its market leadership in Cognitive Assistant that harness the power of IBM Watson capabilities – including NLP, conversation and analytics. HfS also merits IBM for demonstrating the greatest volume and depth of cognitive assistant use cases across industry verticals and enterprise processes.
Tags : 
    
Group M_IBM Q3'19

A More Sustainable Approach to Enterprise Data Storage: Reducing Power Consumption with InfiniBox®

Published By: Infinidat EMEA     Published Date: May 14, 2019
Data continues to grow at an astounding pace? As a result, data center space is becoming more scarce, as more arrays are acquired to store all of this data. Along with this data taking up space, it is also utilizing a great deal of power and cooling. In fact, the average data center in the U.S. uses approximately 34,000 kW of electricity each year, costing $180,000 in annual energy costs. As Infinidat set out to revolutionize the storage industry, one of our goals was to help consumers of storage build a more sustainable infrastructure that would be not only better for the environment, but also help them to save money as well. All of our patents come together to form InfiniBox, a storage solution that does just this.
Tags : 
    
Infinidat EMEA

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA

Safety First: The Face of Cybersecurity in Today's Workplace

Published By: HP Inc.     Published Date: Jul 03, 2019
The digital revolution has altered every aspect of modern life, and the way people work is no exception. Today’s workplace would be unrecognizable to the average worker of the past. In fact, the modern work environment has transformed substantially in the last 10 years alone, and the revolution in the way people work means IT faces more complexity than ever before. Employees are no longer viewing the traditional 9 to 5 day as the norm, with almost two thirds of workers valuing work-life balance over salary.1 As the popularity of flexible working rises across different sectors,2 what was once confined to an office can now be completed from home, from off-site locations, on the go and even from the other side of the world.
Tags : 
    
HP Inc.

An IT Manager's Guide: Cryptojacking, The Threat To Business and How to Protect The Network

Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.

The Right Tool for the Right Job

Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner, policy based management, security management, vulnerability management
    
Ounce Labs, an IBM Company

Knowledge is Power

Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company

Black Diamond - Case Study

Published By: ExpertVoice     Published Date: Jun 14, 2019
Grab your harness as we take a deeper look into how Black Diamond partnered with ExpertVoice to assist with a product launch. When Black Diamond decided to manufacture their own climbing shoe, they knew how critical a successful launch would be to long- term success: the climbing shoe market is dominated by one manufacturer, and climbers are an extremely loyal group. Breaking into the market would be tough. Although ExpertVoice had a daunting task ahead of them, they knew honing in on Experts spreading wordof- mouth recommendations was key to a successful product launch.
Tags : 
    
ExpertVoice

Email in the Age of Social Media

Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
    
StrongMail

CMD transforms wasted time into billable hours with better file and font management

Published By: Extensis     Published Date: May 04, 2008
Integrated marketing communications agency, CMD, has an easy way of tracking the payoff from implementing Portfolio Server and Suitcase Server to manage their digital assets and fonts. It's called more billable hours.
Tags : 
cmd, extensis, font, website design, server, communications, digital asset management', configuration management
    
Extensis

Portfolio is the cure for OHSU Pathology Department's image management pains

Published By: Extensis     Published Date: May 04, 2008
With a library of thousands of on- and off-line slides growing by 1,200 new images monthly, chaos was spreading like a disease in The Pathology Department at Oregon Health & Science University. Until they found the perfect solution to help them organize, track and access their image library - Portfolio Server.
Tags : 
extensis, ohsu, library, dam, solutions, digital asset management', business intelligence
    
Extensis

Real Cost of Web site Tagging

Published By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : 
web analytics, tagging, real time attribution, web page acceleration, tagman
    
Tagman

Saint Joseph Abbey and Seminary College Puts Faith in Astaro

Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
    
Astaro

Steps to Strengthen Your Brand Licensing Portfolio

Published By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions

The Forrester Total Economic Impact Of SAP Business Objects Analytics

Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP

The Total Economic Impact Of SAP Business Objects Analytics Key Findings

Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP

Anticipating the Unknowns

Published By: Cisco EMEA     Published Date: Jun 19, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA

Realise your potential with Dell EMC solutions for Media & Entertainment

Published By: Dell EMC     Published Date: Aug 07, 2018
The media and entertainment industry was valued at $1.81 trillion in 2016, and is expected to reach $2.14 trillion by 2020. Activities within this industry have grown over the last couple of years, and now range from creating content for movies, TV and games, to delivering that content. This is increasingly performed via on-demand data networks rather than traditional over-the-air broadcasting, watched over high resolution displays that enhance the overall viewing experience of the user, and even the latter is being delivered from the same storage repositories. Media production is also now prevalent in areas not traditionally associated with this activity, such as training, museums, and education.
Tags : 
    
Dell EMC

How CIOs Can Empower the Digital Workplace

Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh

The Business Value of Red Hat Integration Products

Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat

Netzwerkoptimierung durch Virtualisierung: Wo, wann, was und wie?

Published By: Cisco     Published Date: Jan 04, 2016
Gleichzeitig wurden jedoch die Betriebskosten aufgrund komplexeren und arbeitsintensiveren Prozessen in die Höhe getrieben. Teilweise konnten diese Kosten durch vermehrte Integration der Server- und Netzwerkinfrastruktur und erweiterte Funktionalität der Software eingedämmt werden
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, enterprise applications
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.