inform

Results 1 - 25 of 4115Sort Results By: Published Date | Title | Company Name

11 casos de uso de Analytics para aprovechar al máximo los datos de Smart Grid

Published By: TIBCO Software     Published Date: Sep 16, 2019
“¿Cómo utilizaremos todos los datos de la red inteligente?” Los productores, distribuidores y consumidores de electricidad de casi todos los países desarrollados se están haciendo esa pregunta. Los datos producidos por los medidores inteligentes, los dispositivos conectados, los generadores de energía, las presas hidroeléctricas, las granjas solares y los consumidores más sofisticados, tiene el potencial de mejorar considerablemente la confiabilidad de la generación, gestión, almacenamiento y distribución de electricidad. La analítica avanzada puede ayudar a alcanzar todo ese potencial. Pero, ¿cómo? Tiene un papel de gran relevancia en las empresas de servicios que buscan convertir los datos en dinero mediante el análisis de la información acumulada para mejorar la gestión en el lado de la demanda, la asignación de recursos y de personal, pronosticar la demanda y el mantenimiento preventivo. De hecho, la analítica está impulsando esta transformación de la industria.
Tags : 
    
TIBCO Software

4 Common Questions Asked of Our Security and Risk Consultants

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

How to put Watson to work for powerful information and insights

Published By: IBM     Published Date: Feb 26, 2016
Welcome to “How to put IBM Watson to work for powerful information access and insights,” where we’ll show you how Watson and its Watson Explorer application can get down to business and help your organization be more effective, more productive, and make better-informed decisions.
Tags : 
ibm, watson explorer, analytics, data, enterprise software, application integration, application performance management, business activity monitoring
    
IBM

How to Save Time, Money & Hassle with Online Food Ordering

Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless

How to Save Time, Money & Hassle with Online Food Ordering

Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless

Impulsando la transformación digital en el sector energético: TIBCO Connected Intelligence

Published By: TIBCO Software     Published Date: Sep 16, 2019
La manera en que ponemos en marcha nuestros vehículos, calentamos nuestros hogares e impulsamos nuestras industrias está cambiando de manera radical. Las tecnologías que se han implementado a gran escala pero que resultan ser ineficientes, como los automóviles que utilizan motores de combustión interna, están siendo reemplazadas con alternativas electrificadas y más efectivas. Y las energías renovables como la solar, la eólica y la térmica, entre otras, apoyadas por el almacenamiento en baterías de próxima generación, están atendiendo un porcentaje cada vez mayor de la demanda de energía. Este reporte aborda cómo el proveedor líder de infraestructura de tecnologías de la información, TIBCO, está impulsando la transformación digital al permitir tomar mejores decisiones y realizar acciones más veloces e inteligentes a través de TIBCO® Connected Intelligence Cloud. Los siguientes ejemplos muestran cómo la tecnología de TIBCO está ayudando a las empresas de la industria energética:
Tags : 
    
TIBCO Software

Les contrôleurs numériques optimisent, les transformateurs numériques innovent

Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
En décembre2017, Dell a demandé à ForresterConsulting de mener une étude pour déterminer comment les organisations d'entreprises sont structurées en termes de services informatiques. L'étude a exploré deux types de profils technologiques, les contrôleurs numériques et les transformateurs numériques, ainsi que les tendances et défis rencontrés dans l'approvisionnement en ordinateurs. Les contrôleurs numériques sont souvent associés à l'approche descendante, la structure linéaire, et mettent l'accent sur la sécurité et l'exactitude. En revanche, les transformateurs numériques mettent l'accent sur l'innovation, s'orientent vers l'employé et le client, et donnent la priorité à la rapidité et la souplesse. En comprenant les deux groupes, les entreprises peuvent surmonter les défis qui découlent de la gestion du cycle de vie des ordinateurs. En investissant dans les outils de gestion des ordinateurs existants et en s'associant avec une entreprise spécialisée dans le déploiement et la gestion
Tags : 
    
Dell EMC EMEA

Protecting Data in the Healthcare Industry

Published By: Mimecast     Published Date: Aug 22, 2017
Healthcare organizations are a favorite target for determined attackers. Any disruption to critical services provides a strong incentive to pay a ransom and patient medical data is highly lucrative for the information it contains. Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn: • Important cyber security risks • The impact of a data breach to your organization • Key regulations around the globe
Tags : 
healthcare, data protection, patient medical data
    
Mimecast

The Power of Partnership - Building a Better Student System

Published By: Workday     Published Date: Mar 02, 2018
Collaboration can sometimes result in conflagration, the ignition of opposing designs, or competing ideas shouted to closed minds. But a unique consortium of colleges and universities nationwide are working in diligent concert with Workday, a designer of cloud-based software, to develop the first student information system built entirely in the 21st century.
Tags : 
collaboration, cloud-based software, student information system
    
Workday

Veritas Netbackup 8.1.2. Top Reasons to Upgrade.

Published By: bChannels     Published Date: Dec 11, 2018
IT service continuity undoubtedly is at or near the very top of every IT organization’s list of strategic initiatives, considering the dramatic costs and implications of downtime. Download this informative whitepaper for some compelling reasons to upgrade.
Tags : 
    
bChannels

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

(ISC)2 Webinar: Why Should I Care About SSL/TLS?

Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon

10 B2B Marketing Trends to Watch in 2019

Published By: Uberflip     Published Date: Jan 03, 2019
No matter what industry you’re in or role you have, we all share a universal interest in trends. As marketers, we look to Google Trends to understand what keywords and search terms are most popular; we look for trending hashtags and conversations on social to inform the content we put out; and we put “Trends” sessions on our agendas at conferences because we know they’ll draw an audience. We’ve tapped into this almost universal desire to understand what the masses are doing.
Tags : 
    
Uberflip

10 Critical Sales Management Reports that Salesforce.com Can't Generate and 10 Reasons to Care

Published By: Birst     Published Date: Jul 16, 2013
Birst’s Salesforce Reporting and Analytics helps sales managers analyze all of the critical salesforce.com data to uncover insightful pipeline information. Combining sales data with marketing, financial and operational data to obtain a comprehensive view of the pipeline is where Birst excels.
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
    
Birst

10 File Transfer Challenges that impact Discovery and Adoption of New Best Practices

Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity
    
Ipswitch

10 Ideas for Using Webinars to Grow Your Business

Published By: Citrix     Published Date: Jun 03, 2015
Download this paper now to discover ten ways to grow your business with webinars.
Tags : 
weinars, use webinars to grow your business, how to grow your business, customer interaction, share information, communication, tips for using webinars, customer interaction service
    
Citrix

10 Mistakes to Avoid when Launching your DG Program

Published By: SAS     Published Date: Apr 25, 2017
Your company’s culture is indispensable in informing the right way to govern data, a point we hope to drive home in this white paper. When you review the mistakes that otherwise earnest companies have made in their quests to apply rigor to their data, you’ll see why our mantra is: There is no template for data governance. And hopefully, you’ll realize what you need to do now.
Tags : 
    
SAS

10 PUNKTE, auf die Sie bei Anbietern von Cloudsicherheitslösungen achten sollten

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies

10 Punkte, auf die Sie bei Anbietern von Cloudsicherheitslösungen achten sollten

Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies

10 Questions to Ask About Board Portals

Published By: Diligent Corporation     Published Date: Jun 29, 2015
This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.
Tags : 
board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
Diligent Corporation

10 Questions to Identify Compliance Risks When Sharing Information

Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance, access control, security management, security policies, vulnerability management
    
Brainloop

10 Reasons You Need Network and Application Visibility

Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
Riverbed

10 Stats That Will Redefine Your PR Strategy

Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite

10 Steps to Risk-Based Security Management

Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management, business technology, data center
    
Tripwire

10 Tips for Evaluating SharePoint 2013 Workflow Solutions

Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.