industry

Results 251 - 275 of 2449Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Dell EMC     Published Date: Nov 01, 2019
It seems every business sector—automotive, aerospace and defense, heavy industry, consumer goods, even agriculture—wants “smarter” products that will be part of the Internet of Things (IoT) and form the basis for connected factories of the future. For engineering departments large and small, that means today’s design engineering teams are being asked to create more complex product designs, simulate more advanced mechanical and electrical phenomena, and virtually assemble components as part of larger systems—all in less time. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: NetApp     Published Date: Dec 05, 2016
See how IT professionals in your industry are leveraging automation in the next generation data center. Download The Storage Automation Report to find out: - 300 IT professionals' drivers behind storage automation and the benefits they've realized - How the rise of the DevOps approach has fueled the need for automation at the storage layer - Preferences around storage management plug-ins and software development kits
Tags : 
    
NetApp
Published By: ClickSoftware     Published Date: Nov 17, 2014
From calculator watches to smart glasses, this paper will guide you through the evolution of wearable technology and its impact on the service industry. This whitepaper will help you to understand how your business can benefit by getting ahead of the trend through implementing wearable technology within your organisation.
Tags : 
shift scheduling, wearable technology, the evolution of wearable technology, byow, it management, business technology
    
ClickSoftware
Published By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : 
tco, idc, ibm, cloud, mobile, hardware
    
IBM APAC
Published By: Hitachi EMEA     Published Date: Dec 20, 2019
IDC analyst reviews the Hitachi Unified Compute Platform HC including emerging technologies NVMe and SCM, declares announcement important for enterprise customers and game changer for industry as a whole. Hitachi Unified Compute Platform HC V124N sets the industry standard by driving performance and operational efficiency for enterprise data centers, giving customers the ability to integrate extreme performance applications that require the lowest latencies. Hitachi UCP HC with VMware vSAN delivers enterprise-class data services to meet SLOs (service level objective) for mixed applications. "When integrated into enterprise-class storage systems, NVMe and SCM technologies will significantly improve all aspects of performance, including latency, throughput, bandwidth, and performance predictability under load," said Eric Burgener, research vice president, Infrastructure Systems, Platforms, and Technologies.
Tags : 
    
Hitachi EMEA
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: MicroStrategy     Published Date: Aug 12, 2012
MicroStrategy Mobile Apps are transforming the Retail Industry by providing unprecedented insights into store operations,inventory,and customer satisfaction.
Tags : 
microstrategy, mobile, apps, retail, business technology
    
MicroStrategy
Published By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : 
microstrategy, mobile, steve cornett, lowe's, roi, business technology
    
MicroStrategy
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, data center
    
Red Hat
Published By: Oracle     Published Date: Aug 09, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Oracle delivers the industry’s most complete, flexible, and global technology foundation to help companies simplify how they manage people. This Strategy Brief outlines Oracle’s HCM solutions.
Tags : 
oracle, strategy brief, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle, enterprise applications, human resource technology, business technology
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle delivers the industry’s most complete, flexible, and global technology foundation to help companies simplify how they manage people. This Strategy Brief outlines Oracle’s HCM solutions.
Tags : 
oracle hcm, enterprise applications, human resource technology, business technology
    
Oracle
Published By: Oracle     Published Date: Oct 29, 2015
Learn the 20 key commerce metrics that you should be tracking to measure and optimize your commerce results. For each metric, you will learn what it means, why you should be tracking it, industry benchmarks. Download the eBook now.
Tags : 
oracle, commerce metrics, measuring commerce results, ebook, networking, it management, data management
    
Oracle
Published By: Oracle     Published Date: May 03, 2018
Cloud services are poised to boost US GDP by $2 trillion over the next decade, according to new research commissioned by Oracle—but not every firm will benefit. In Intelligent Finance: How CFOs Can Lead the Coming Productivity Boom, Dr. Michael Mandel, senior fellow at the Mack Institute for Innovation Management at the Wharton School, shares how finance leaders across industries can help their organizations benefit from the coming wave of US productivity using cloud services—and the emerging technologies and global best practices they deliver.
Tags : 
finance, cfo, productivity, industry, oracle, delivery
    
Oracle
Published By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: FusionOps     Published Date: Jun 27, 2016
The term Industry 4.0 presupposes the passing of three major shifts in how businesses approached manufacturing throughout modern history, tracing its roots as far back as the 19th century: Industry 1.0: The Industrial Revolution redefines human limitations by harnessing the power of water and steam. Industry 2.0: Electricity pushes people and machines even further as manufacturing grows in scale and scope. Industry 3.0: The modern computer opens the door for automation
Tags : 
    
FusionOps
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: IBM APAC     Published Date: May 18, 2017
In the age of digital transformation and hybrid cloud, business expectations for seamless, personalized, always-on service run high. Technological advances such as cognitive capabilities and automation are blurring business distinctions and empowering competitors to emerge from any industry and geography. Staying ahead requires a willingness to change course and embrace constant reinvention.
Tags : 
saas, service, technology
    
IBM APAC
Published By: HP Inc.     Published Date: May 29, 2019
Drawing on industry research, we’ve put together this easy-to-read report on the top seven trends driving the printing industry.
Tags : 
    
HP Inc.
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.