hie

Results 1 - 25 of 2590Sort Results By: Published Date | Title | Company Name
Published By: TNT     Published Date: Oct 09, 2014
By going digital by default, the government could save between £1.7 and £1.8 billion each year. "We have been able to maintain the service we provide to customers while reducing our overall costs, and 40% of the cost has been converted to a transactional basis so we don’t incur cost if activity levels reduce." TIM LEAVER CHIEF PROCUREMENT OFFICER LAND REGISTRY
Tags : 
    
TNT
Published By: Veeam APAC     Published Date: Apr 26, 2020
"The key to accelerating your data protection in 2020 is to go beyond backup and recovery to achieve unparalleled data availability, visibility, automation and governance across your cloud, virtual and physical environments. As modern IT organizations look to innovate at a quicker pace, legacy backup and recovery infrastructures just can’t support these forward-looking initiatives. This report covers five principles to success to help drive real, impactful change inside your organizations in 2020."
Tags : 
    
Veeam APAC
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
How Will Composable Infrastructure Help Healthcare Organizations Achieve Quadruple Aim Objectives?
Tags : 
    
Hewlett Packard Enterprise
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
You have to think beyond devices and connections if you want real protection for your organization. See how Lenovo ThinkShield delivers competitive advantage by orchestrating the complete portfolio of security technologies and best practice, including third-party solutions, to provide agile, end-to-end protection. It’s a solution built for fast-moving businesses, enabling innovation and growth. Get the most comprehensive protection with a modern Windows 10 Pro device powered by the Intel®. Learn more>>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Apr 27, 2020
More than half of the businesses that have suffered a data breach say it was due to a known, unpatched vulnerability. But you don’t need to be playing patch catch-up when automation, customization and persistence technology can take away all kinds of time-consuming processes. Get the full story on the latest agile security solutions with Think devices, powered by Windows 10 Pro and Intel®, in this quick overview from Lenovo ThinkShield.
Tags : 
    
Lenovo - APAC
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
The rapidly increasing demand for processing data from business documents and emails is driving organizations to implement AI-driven, Intelligent Document Processing (IDP) solutions to deliver cost savings, increased workforce productivity and improved customer experiences. In Everest Group’s new global market report Intelligent Document Processing (IDP) -Technology Vendor Landscape with Products PEAK Matrix? Assessment 2020, you’ll find: • IDP competitive landscape and PEAK Matrix? Assessment • Why Automation Anywhere is the only vendor recognized as both IDP technology Leader and Star Performer • IDP technology trends and near-term predictions, and what they mean for enterprises Explore the IDP technology and vendor landscape and discover why Automation Anywhere achieved the highest overall customer satisfaction score in Everest Group’s 2020 PEAK Matrix? report for Intelligent Document Processing technology.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
ANZ’s Bengaluru hub was having to hire new staff for seasonal trends that included lengthy recruiting processes and senior management’s time and efforts. Once the surge in work was over, they had to scale back. ANZ then started thinking about ways to minimize these types of situations and quickly realized that RPA had to be part of the answer. Read this case study to see how ANZ managed to deploy hundreds of robots in the first six months of automation process and achieved 40% or above of substantial cost reduction in end-to-end delivery time for customers.
Tags : 
    
Automation Anywhere APAC
Published By: Tableau     Published Date: May 11, 2020
Seit ihrer Einführung vor mehr als zwei Jahrzehnten war das vorrangige Ziel der Business Intelligence die Erstellung einer einzigen zuverlässigen Datenquelle, auf deren Basis Unternehmen KPIs und Leistungskennzahlen mit statischen Berichten und Dashboards ermitteln können. Dieser Wunsch entstand als Reaktion auf den Wildwuchs von Spreadsheets und Berichtssilos der Unternehmen, die oft unterschiedliche und widersprüchliche Ergebnisse nach sich zogen. Mit diesem neuen Auftrag wurden spezielle BI-Teams – oft in den IT-Abteilungen – gebildet, die bei dieser Aufgabe nach dem Prinzip traditioneller IT-Projekte verfahren sind: Geschäftsanwender führen eine Anfrage bei der IT-Abteilung durch, diese stellt ein Ticket aus und kommt der Anfrage mit der„Wasserfallmethode“ nach.
Tags : 
    
Tableau
Published By: Oracle     Published Date: Apr 15, 2020
The finance world generates a wealth of data. That’s why more finance leaders are investing in using technology to improve insights, achieve their goals and drive business growth. To discover how well your financial department is currently managing its data and if it could be even better, just answer three simple questions. You will be given a score and told how your company’s data management ranks in the market. Additionally, you will receive an action plan, highlighting how you can improve performance in the future
Tags : 
    
Oracle
Published By: Rackspace     Published Date: May 11, 2020
Most IT organisations have adopted a ‘Cloud First’ policy to exploit recent changes in the IT service sector and align more effectively with the needs of their business customers. However, the journey to Cloud is not simple. It requires a fundamental change in enterprise architecture, service contracts, internal processes and most of all culture and skills. Adopting an effective ‘Cloud First’ regime requires changes in governance that will help the IT organisation and its business partners to better achieve their mutual goals. These cover core elements such as cost and performance management; compliance and security; standards and frameworks; integration of applications and data; training and reskilling; and minimising business risk. This report sets out the range of exciting new goals that cloud enables – both within the IT organisation and those of its business partners, the principles of effective cloud governance, and the best ways to contract for cloud services.
Tags : 
    
Rackspace
Published By: Proofpoint     Published Date: May 05, 2020
INDEPENDENTLY CONDUCTED BY THE PONEMON INSTITUTE SPONSORED BY OBSERVEIT According to a new report from Ponemon Institute, sponsored by ObserveIT a Proofpoint company, insider threats of all types have risen 47% in just two years, and the average annual costs to $11.45 million, a 31% increase over the same time period. It’s now more important than ever that organisations look for a better way to protect their Intellectual Property and people: • Most often, negligent insiders are to blame. Employees or contractors who make simple mistakes account for 62% of all incidents. • Credential thieves cost most per incident. Cost-per-incident for impostors averaged $871,000, three times more than the average for negligent insiders. • Malicious insiders account for millions in losses. On average, these insider incidents lead to $4.08 million in losses per year • The longer an incident lingers, the costlier it gets. The average incident takes 77 days to contain. Incidents that took more than 90 d
Tags : 
    
Proofpoint
Published By: CloudPassage     Published Date: May 19, 2020
Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time. This webinar is for security engineers, DevOps engineers, cloud architects, and security executives. Your take-aways from this webinar will be the six “must-haves” for achieving real-world, practical cloud security. You will leave the webinar with a working understanding of: • How moving to the cloud changes development and security practices • How the concept of “practical cloud security” cuts through the noise and hype • What to expect an
Tags : 
    
CloudPassage
Published By: Bloomfire     Published Date: May 14, 2020
Innovation is a critical part of running a successful business. Today’s landscape is much too competitive for any organization to think they can achieve success by doing the same things they’ve always done.
Tags : 
    
Bloomfire
Published By: M-Files     Published Date: Apr 16, 2020
La gestion du personnel, la planification des successions, la réforme fiscale, la cybersécurité, la manie des fusions, la marchandisation des services de base, la demande d'un plus grand nombre d'experts-comptables et la recherche de la pertinence - tous ces éléments ont été cités comme des préoccupations essentielles des dirigeants de cabinets comptables. Mais quelles sont les préoccupations et les questions qui touchent ce secteur qui arrivent en tête ? Jetez un coup d'œil à cette infographie et voyez si vous pouvez comprendre ces deux défis clés du secteur, ainsi que quelques statistiques incroyables sur la manière dont les cabinets comptables sont affectés par les risques de sécurité, la concurrence féroce et les attentes changeantes des clients.
Tags : 
    
M-Files
Published By: Workday     Published Date: Jan 31, 2020
Today’s data is 3-D, continuous, flowing, ever-growing. You need a single system that handles all of it––now and into the future. With the future in mind, Workday helps your business move into the era of machine learning to achieve the highest level of operational efficiency. Learn more.
Tags : 
    
Workday
Published By: McAfee EMEA     Published Date: May 12, 2020
Security teams are under growing pressure to enable business goals. There is growing momentum among chief information security officers (CISOs) to reposition their teams' value propositions: away from being technical experts and toward a true business support function that aligns with business outcomes such as cost reduction, risk management, and digital trust.
Tags : 
    
McAfee EMEA
Published By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : 
acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer
    
Acxiom Corporation
Published By: TIBCO Software     Published Date: May 06, 2020
Delve into the FSI computing trends that will facilitate next-generation banking systems. From adaptive data science for real-time and predictive intelligence, to visual intelligence that helps humans effectively “query the future,” this report examines: How artificial intelligence is innovating the industry and how humans and machines can combine to achieve strategic enhancement How FSI leaders can make sense of millions of data points and turn them into meaningful insights, and how AI is making this easier than ever before How data analytics is transforming risk and fraud management Examples and poll results surrounding the good, the bad, and the ugly of AI
Tags : 
    
TIBCO Software
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa
    
NEC
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 09, 2009
Improved business productivity often requires more efficient IT and more efficient IT cannot be achieved without a better understanding of the way business services are run and delivered. Configuration Management Databases (CMDBs) have emerged as a central component for Information Technology Infrastructure Library (ITIL) and business service management (BSM).
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.