Skip to content
 

edi

Results 1 - 25 of 4186Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: Oracle     Published Date: Nov 08, 2017
All’inizio, probabilmente avrai scelto di adottare l’infrastruttura cloud con una certa prudenza, limitandoti a un approvvigionamento rapido o alla riduzione dei costi operativi o delle macchine. Ma come resistere ai vantaggi di questo nuovo modo di fruire della tecnologia? Il cloud continua a evolvere e a conquistare credibilità in tutti i settori. Oggi, ci aspettiamo che ogni sistema aziendale possa beneficiare dei vantaggi del cloud.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. Explanation of the Oracle IaaS solutions and cases studies.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Google     Published Date: Jan 08, 2018
What happens when teams switch to Google Docs from Microsoft Word Online? They can share documents in nearly half the time, see real-time edits 96% faster and cut down on errors by 88%. Get more findings and how-tos in this detailed report by Principled Technologies, which compares the performance of collaboration and productivity tools included in G Suite and Microsoft Office 365. Download the report now.
Tags : 
productivity tools, collaboration tools, business software
    
Google
Published By: HP Inc.     Published Date: Dec 06, 2017
3D printing taking steps to make impact in the marketplace. McKinsey & Company predicted the impact of 3D printing and direct product manufacturing could hit $500 billion annually 2025. But first, as John Hauer writes, the infrastructure for 3D printing – such as software, color capabilities, and affordable printing materials – needs to keep advancing.
Tags : 
printing, industry, manufacturing, marketplace, color capabilities, software
    
HP Inc.
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Workday     Published Date: Jun 05, 2017
Today’s banks, credit unions, asset management firms, lending companies, and other financial services businesses operate in a highly competitive and regulated environment. Servicing clients, introducing new products and channels, and opening new markets as well as having insight into your loans, investments, and deposits is critical to your bottom line. At the same time, employing the right people is what drives your future. Workday provides financial management, human capital management, and planning/ budgeting in a single cloud-based system to support your needs.
Tags : 
    
Workday
Published By: Workday     Published Date: Nov 28, 2017
In this episode of “In Good Company,” Meredith Coughlin, assistant dean of enterprise systems at Indian River State College, and Sean Hanna, analyst of student systems at the University of Rochester, discuss the current challenges higher education institutions face as the traditional path to degree completion has evolved. What measures can schools take today to help students of all backgrounds achieve academic success and prepare for productive careers, and what role can technology play? Watch to find out.
Tags : 
    
Workday
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
The adoption of mobile in the enterprise space is accelerating. Users of mobile devices choose what applications they want to use, but it is up to the enterprise to predict the data that they will be accessing. With that change, comes a new spectrum of risk that CISOs must consider.
Tags : 
mobile security, mobile devices, device security, enterprise mobile security, enterprise mobile management
    
Lookout
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report
    
Fiserv
Published By: Sprinklr     Published Date: Nov 22, 2016
Customer service today is broken, and the data shows it. Tried-and-true customer service models are losing your organization customers and prospects. So what is the solution? It’s called social customer service.
Tags : 
social customer service, social media customer service, social media, social, customer service, customer care, customer reviews
    
Sprinklr
Published By: Sprinklr     Published Date: Jan 05, 2018
During a data breach, social media can be a friend or your worst foe. Here’s how to develop a crisis management plan that utilizes social media.
Tags : 
data breach, social media, hacked, hack, data, breach, sprinklr, crisis management
    
Sprinklr
Published By: Sprinklr     Published Date: Jan 05, 2018
Social Advertising Techniques for Advanced Marketers is a whitepaper that explores advanced social advertising strategies, & social media marketing tactics.
Tags : 
social advertising, social advertising techniques, social, advertising, marketing, advertising strategies, social media, tactics
    
Sprinklr
Published By: Sprinklr     Published Date: Jan 05, 2018
Social media management software allows brands to embrace digital transformation efficiently. Find out how in this guide.
Tags : 
social media management software, social media management, digital transformation
    
Sprinklr
Published By: Sprinklr     Published Date: Jan 05, 2018
Microsoft General Manager and CMO Grad Conn shares his thoughts on how brands must provide an experience that customers actually enjoy, as opposed to just hoping they elicit a certain response.
Tags : 
marketing, content marketing, user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy
    
Sprinklr
Published By: IBM     Published Date: Nov 14, 2017
Data is the hottest topic in business today. In discussions that range from understanding performance to predicting future outcomes, data is at the core. However, data has a bad reputation. Because businesses have been collecting data for decades, the amount that we must analyze can seem insurmountable. Simply saying “data” is enough to conjure images of someone poring over a thick stack of spreadsheets, manually going through row after row to identify performance, trends and figure out what to do with them. This intimidating view is all too common.
Tags : 
data, ibm, data insight, data analytics
    
IBM
Published By: Datastax     Published Date: Jan 17, 2018
In today’s fast-paced business climate, companies are seeing dramatic shifts in their market. Customer expectations are changing faster than ever due to digital disruption in areas like commerce, banking, transportation, healthcare, utilities, and media consumption. Technology is being used to disrupt traditionally “safe” industry norms. Data is being generated at levels never seen before, but companies are having a tough time understanding how to find the gold within the gravel.
Tags : 
    
Datastax
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
Consider the volume of business content that your organization generates or receives every day: applications, forms, reports, office documents, audio, video, and even social media about your company. If it is poorly managed, not digitized, or disconnected from critical business processes, it creates chaos. This chaos impacts your ability to deliver exceptional customer service; it slows down important processes, increases security risk, and negatively impacts revenue. Conversely, controlling content chaos can significantly improve your analytics strategy by gaining insight and business value from dark or unstructured data sources. In this eBook, learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it as you grow.
Tags : 
business content, volume, cloud-based, enterprise content management, ecm
    
Group M_IBM Q1'18
Published By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
    
OracleSMB
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.