ad tech

Results 3476 - 3500 of 3592Sort Results By: Published Date | Title | Company Name
Published By: UBM Technology     Published Date: Sep 05, 2017
IT leaders need a full stack of skills to survive and thrive in today's technologically driven world, and striking a balance between cost control and innovation is crucial.
Tags : 
    
UBM Technology
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
Modern Marketers know their customers expect experiences that will blow their minds. Customers are tech savvy, on the move, and want to interact with your brand on their terms. This means wherever, whenever, and however they want. It’s the job of today’s marketers to deliver cross-channel experiences that are personalized, relevant, and timely. When you engage your customers on their terms you create the long-lasting relationships that your business and brand need to drive loyalty and advocacy. Here’s the good news. It’s now possible thanks to the boom of marketing technology solutions. In the last five years the amount of marketing technology options has skyrocketed from just 150 solutions to more than 4,000. This can only mean one thing: marketing technology is here, rapidly being adopted, and proving its value every day.
Tags : 
    
Oracle Marketing Cloud
Published By: Gigamon     Published Date: Oct 19, 2017
Read Gartner’s research note, Top 10 Strategic Technology Trends for 2017: Adaptive Security Architecture, to improve visibility and control over your organization’s exposure to risk with a continuous, contextual and coordinated approach to security. Comprehensive protection now requires an adaptive process to predict, prevent, detect and respond to security breaches that includes DevSecOps, IoT Security, and Intelligent Security. This note walks you through key planning assumptions, analysis, best practices and specific recommendations.
Tags : 
    
Gigamon
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Sage     Published Date: Oct 17, 2019
Imagine a factory which connects information and interconnectivity—a model of quiet efficiency. Where intelligent machines collaborate with each other, run by a team of analytical, well-trained workers. A center of innovation—the hub of a supply chain that combines customers, suppliers, distributors, and partners with advanced analytical systems. Now imagine the future—the Smart Factory, where there’s minimal downtime, neglect, waste, and inefficiency. Where factory managers, financial experts and boardroom executives use cutting-edge technology to understand data and production—reaching the pinnacle of technology and manufacturing development. The Smart Factory dream is closer than you think.
Tags : 
    
Sage
Published By: Oracle OMC     Published Date: Nov 30, 2017
The face of retail – both online and instore – is rapidly evolving. In addition to margin pressures, resource constraints, and competitive challenges retailers face on an ongoing basis, many are struggling to keep up with the evolving demands of vocal consumers. As new channels and buying habits emerge and evolve, many retail marketers have struggled to keep up. Although many have adopted new technologies to address new channels and challenges, the rapid pace of technological change has created new challenges including: Data silos E-mail marketing overload Channel coordination and conflict These challenges, coupled with the rising cost of acquiring and managing customer data, are compounded by increasing scrutiny on marketing budgets and an expectation of being able to prove the value of every campaign in terms of increased revenues.
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
It’s the job of today’s marketers to deliver cross-channel experiences that are personalized, relevant, and timely. When you engage your customers on their terms you create the long-lasting relationships that your business and brand need to drive loyalty and advocacy. Here’s the good news. It’s now possible thanks to the boom of marketing technology solutions. In the last five years the amount of marketing technology options has skyrocketed from just 150 solutions to more than 4,000. This can only mean one thing: marketing technology is here, rapidly being adopted, and proving its value every day. The question is: How can you use technology to deliver the best of your brand for your customers? It all starts with customer experience.
Tags : 
    
Oracle OMC
Published By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: OracleSMB     Published Date: Jan 04, 2018
Leaders of the Inc. 5000—some of the fastest growing private companies in America—are overwhelmingly optimistic about 2017, and they are investing accordingly. This was just one of the key findings of the recent Oracle/Inc. study, "The Talent and Tech Driving America’s Fastest-Growing Companies." So just how optimistic are they? Very optimistic. Almost nine out of 10 respondents (89 percent) described themselves as either “extremely” or “very” confident about their prospects for success in 2017. Buoyed by this enthusiasm, the majority are growing virtually all aspects of their businesses. They are: adding employees moving into new markets offering new products expanding globally
Tags : 
    
OracleSMB
Published By: Ephesoft     Published Date: Jun 01, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
    
Ephesoft
Published By: Domino     Published Date: Apr 06, 2018
Domino provides a broad portfolio of innovative industrial coding and marking solutions developed in collaboration with customers in food and beverage, life sciences, manufacturing and other industries. Beyond delivering the latest printing technologies and Industry 4.0 connectivity, Domino brings four decades of knowledge and expertise to help companies maximize productivity and OEE with agility to meet the changing needs of today’s fast-paced world. Domino is more than a mark. Domino printing technologies include thermal transfer overprinting, thermal ink jet, continuous ink jet, print-and-apply labeling, large character inkjet and laser.
Tags : 
domino, food, beverage, manufacturing, customers
    
Domino
Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. Intel Inside®. Intel islemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 08, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC can help you refresh your entire PC and technological ecosystem with latest hardware, software, peripherals and lifecycle services, including deployment, support and asset recovery. Our services and technology can reduce costs of PC lifecycle management by up to 25%. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Das Royal Victoria Regional Health Centre (RVH), ein Krankenhaus etwa 100 km nördlich von Toronto in zentraler Lage von Ontario in Kanada, bietet eine schnelle Gesundheitsversorgung für mehr als 450.000 Bewohner in einem großen Gebiet. Das RVH-Team besteht aus mehr als 380 Ärzten, 2.500 Mitarbeitern und 850 ehrenamtlichen Helfern und bietet ein außergewöhnliches Gesundheitsangebot und spezielle Dienstleistungen. Dazu zählen Krebsbehandlung, Behandlung von Schlaganfällen, Orthopädie, Intensivmedizin, psychiatrische Versorgung und interventionelle Radiologie. Neben der Akutversorgungseinrichtung in Barrie mit 319 Betten stellt das RVH auch die MEDITECH EHR-Plattform (Electronic Health Records) für mehrere andere Krankenhäuser in Midland, Orangeville und Collingwood bereit.
Tags : 
    
Dell PC Lifecycle
Published By: Workday France     Published Date: Mar 08, 2018
Une nouvelle réalité économique: La fonction ressources humaines connaît actuellement une mutation profonde et nécessaire. La mondialisation, l'instabilité économique, l'évolution des technologies et la concurrence pour le recrutement des talents constituent de nouveaux challenges pour les dirigeants et les directions des ressources humaines (DRH). A l'évidence, les anciennes pratiques ne sont plus adaptées à cette nouvelle économie mondialisée. Les RH doivent se réinventer. C'est une occasion unique pour les DRH de ré-imaginer le rôle de la fonction RH et de créer une valeur ajoutée durable pour leurs entreprises, leurs collaborateurs et leurs communautés. Dans un contexte économique tourmenté, l'adoption des technologies Cloud, notamment les applications SaaS (Software as a Service), est une tendance de fond. Cette démarche permet de réduire les coûts, d'accélérer la mutation des entreprises et de créer plus de valeur.
Tags : 
    
Workday France
Published By: Dell Bedrock     Published Date: Aug 17, 2018
For those struggling to convince their leadership to adopt software defined storage (SDS), this eBook from Dell EMC can help you make the case. We’ve gathered 5 ways server technology is advancing software-defined storage adoption, making it easier for businesses to implement SDS in the modern data center. The biggest misconception about SDS is that the underlying hardware is not important. It’s true, many of the features and performance enhancements are now provided by software.1 But, if you thought the hardware provider doesn’t matter when implementing an SDS solution, think again. We’ll show you why.
Tags : 
    
Dell Bedrock
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Start   Previous    130 131 132 133 134 135 136 137 138 139 140 141 142 143 144    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.