Skip to content
 

technology

Results 6276 - 6300 of 6362Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: Ephesoft     Published Date: Jun 01, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
    
Ephesoft
Published By: MineralTree     Published Date: Jan 23, 2018
With automation technology, they are on track to save 60% of their finance department time to achieve their goal to focus on more critical areas of finance.
Tags : 
    
MineralTree
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. Intel Inside®. Intel islemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 08, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC can help you refresh your entire PC and technological ecosystem with latest hardware, software, peripherals and lifecycle services, including deployment, support and asset recovery. Our services and technology can reduce costs of PC lifecycle management by up to 25%. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Magento     Published Date: Feb 13, 2018
Omnichannel isn’t about making a quicker, cheaper sale with fewer human touchpoints: it’s about creating a system which lets you to nurture your customers at every step of their buyer’s journey. This white paper from Magento and Premier Technology Partner dotmailer describes how well connected ecommerce and marketing teams and systems are crucial for a true omnichannel approach. Download the paper to discover: Why automated marketing messages, sent in real time, are the most effective way to communicate throughout the purchase journey Web and email personalization tips for omnichannel merchants Why an email address is your unique identifier Three tried and tested marketing methods to drive customers to your site and stores Note that by downloading this paper, you consent to receive future emails from dotmailer. You may opt-out at any time.
Tags : 
    
Magento
Published By: Workday UK     Published Date: Jan 31, 2019
Featuring selections from our Day in the Life video series, this page focuses on how technology helps make these Workday HR leaders' day-to-day more productive. Hear how the cloud empowers them to tackle things such as workforce planning and mergers and acquisitions with ease.
Tags : 
    
Workday UK
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 17, 2018
For those struggling to convince their leadership to adopt software defined storage (SDS), this eBook from Dell EMC can help you make the case. We’ve gathered 5 ways server technology is advancing software-defined storage adoption, making it easier for businesses to implement SDS in the modern data center. The biggest misconception about SDS is that the underlying hardware is not important. It’s true, many of the features and performance enhancements are now provided by software.1 But, if you thought the hardware provider doesn’t matter when implementing an SDS solution, think again. We’ll show you why.
Tags : 
    
Dell Server
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: Cohesity     Published Date: Mar 19, 2019
As an enterprise admin for over 20 years now, I have seen many technology successes, challenges, and even failures throughout my career. For all enterprise admins, learning is a critical element of job success, but so is sharing what you have learned with others. Today I am embarking on a series of posts where I will be sharing many technology challenges that could have been avoided with a proper backup strategy. From there we will touch on how a modern backup solution can protect your organization from the preventable issues I’ll be writing about.
Tags : 
    
Cohesity
Published By: Intel Corp.     Published Date: May 11, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: TIBCO Software     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
    
TIBCO Software
Published By: KPMG     Published Date: Sep 13, 2018
Companies are facing more complex challenges than ever, requiring a variety of disciplines to come together to set a future vision and strategy. Historically, says Alec Binder, director, advisory at KPMG, these challenges have been treated as technology problems that can be solved simply by buying a better platform or solution. However, as explained in Part 1 of this series on KPMG’s Technology Strategy and Selection (TSS) framework, that outlook often does not drive the outcomes or the value that companies are expecting. For large transformations, a business-driven, technology-support effort is becoming an imperative, not a nice-to-have. The modular approach of the TSS framework allows for the right services and business ideas to be brought in seamlessly and holistically — toward setting a future vision and choosing technology that truly drives change.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 13, 2018
Create a transformation vision and an integrated technology roadmap to get started towards your goals. As digital complexity increases, you’ve probably spent a lot of time making sure your customer-facing strategies and technologies are ready to meet the next challenge. And rightly so. But what about your internal functions? Are your ERP, finance, HR, procurement and supply chain strategies ready? You may be asking some hard questions: • How do I manage a large-scale transformation of my back office underpinned with the right technologies? • Is my technology strategy truly aligned to meet my business goals? • What are other organizations doing to make the transition? KPMG Technology Strategy and Selection gives you the tools to frame such decisions by working with you to develop a transformation strategy that’s based on your organization’s overarching business needs. One that will diminish some of the noise of disruption by helping you see what’s coming--while focusing on an integr
Tags : 
kpmg, business transformation
    
KPMG
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Start   Previous    241 242 243 244 245 246 247 248 249 250 251 252 253 254 255    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.