source

Results 1 - 25 of 3745Sort Results By: Published Date | Title | Company Name
Published By: QlikTech UK     Published Date: Nov 24, 2015
Organizations are, or will soon be, producing petabytes – thousands of terabytes or millions of gigabytes – of valuable data. But the ability to transform these massive data sets into actionable insights requires business intelligence (BI) and analytics tools that can uncover the hidden relationships among varied sources of information, provide rich visualizations of trends and don’t require end-users to be trained data scientists.
Tags : 
healthcare
    
QlikTech UK
Published By: IBM     Published Date: Apr 06, 2014
The world’s water system is vulnerable. Essential for health, food, energy, manufacturing and transportation, the global water system is suffering from stress, deteriorating quality, aging and insufficient infrastructure. Managing this critical resource requires a smarter approach to deliver improved outcomes across the water management lifecycle. Using information and analytics, governments, cities, utilities and businesses must take immediate action to deploy a smarter approach to water management to solve the world’s water crisis.
Tags : 
    
IBM
Published By: Hitachi EMEA     Published Date: Feb 19, 2020
Cisco und Hitachi haben beträchtliche Zeit und Ressourcen investiert, um Kunden und Partnern eine Vielzahl an Bereitstellungsoptionen anbieten zu können. In diesem E-Book finden Sie Empfehlungen für eine optimale Bereitstellung unserer adaptiven Lösungen für konvergente Infrastrukturen. Vorteile der adaptiven Lösungen von Cisco und Hitachi für konvergente Infrastrukturen:
Tags : 
    
Hitachi EMEA
Published By: Hewlett Packard Enterprise     Published Date: Jan 30, 2020
Ensuring the network performs at its best can be a challenge especially for midsize businesses with limited staff and budget. To stay competitive, you need a simple, smart, and secure network that enhances productivity and drives business growth. Find out how a cloud-managed network is the secret to success. See in the eBook how a cloud-managed network can help you: • Do more and spend less • Save time with easy management • Identify source of network bottlenecks
Tags : 
    
Hewlett Packard Enterprise
Published By: HP Inc. APAC     Published Date: Feb 13, 2020
Research shows that a printer is 68% more likely to be the source of an external breach now than it was in 2016. Yet only 30% of IT professionals recognise that printers pose a security risk. Even among IT professionals who recognise the risk, securing the glut of end-user devices often takes top priority, leaving printers wide open and networks vulnerable. In this survey commissioned by HP, you will learn about the following: • Why printer security might be the biggest risk in your company. • Why IT managers continue to be complacent on the state of endpoint security in their networks. • Why it’s time to take printer security seriously.
Tags : 
    
HP Inc. APAC
Published By: Schneider Electric     Published Date: Feb 13, 2020
It is fair to say that Edge computing is becoming a new norm alongside the traditional centralized data center. “Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers.” Gartner - The Edge Completes the Cloud: A Gartner Trend Insight Report, 14 September 2018. As the Edge moves from a buzzword to a tangible computing ecosystem that needs resources, tools, and love, more and more questions around monitoring and management of distributed IT equipment arise. While familiar with critical facility management, many of the IT, facilities and data center managers with whom we speak are still figuring out how they will manage remote, increasingly critical, edge computing environments. • “Do we need a new tool to manage our edge infrastructure, or can we make do with what we already have?” • “If we do need a tool, which one?” • “And how to choose the right one?”
Tags : 
    
Schneider Electric
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: LeadSpace     Published Date: Feb 03, 2020
THE B2B MARKETER’S GUIDE TO AI | 1 INTRODUCTION Artificial Intelligence (AI) is the New Buzzword for B2B Marketing… And as with every new marketing buzzword, behind the hype there are many real, exciting opportunities for marketers. The question is: how can B2B marketers see through the hype to understand the true applications and benefits of AI? How can marketers soberly evaluate the potential ROI of any given AI platform in this emerging industry? And on the flip side, how can marketing organizations avoid falling for false promises and illusory or misleading offers of “AI” which ultimately don’t deliver — with all the frustration and wasted resources that entails? In this ebook we’ll be answering these questions and more, by demystifying AI and its real-world applications to B2B marketing.
Tags : 
    
LeadSpace
Published By: Plotly     Published Date: Jan 30, 2020
Energy consumption data is a wealth of information that can be utilized to plan for sustainable development. In the last twenty years, South Africa’s energy consumption has transformed dramatically, with electrified households growing from thirty to eighty-five percent. Weibke Toussaint, a researcher and data scientist from the University of Cape Town, wanted to create a user-friendly way to understand this complex energy consumption data. She used Dash, a Python and R framework for data analytics, to quickly and efficiently build visually beautiful, user-friendly, and interactive apps. By using Dash, Toussaint was able to better understand the South African energy consumption data and communicate her findings with the South African National Energy Development Institute, the state-owned utility provider, and the Energy Resource Center. Together, they combined their insight with the power of Dash to uncover opportunity in energy. Get the whitepaper to learn how you can uncover hidden
Tags : 
    
Plotly
Published By: Crank Software     Published Date: Jan 22, 2020
No longer are rich animated user interfaces, voice control, and machine learning something that can only be done by an Application level processor (MPU). Today’s new class of MCUs have more processing power, graphics acceleration, and onboard resources to enable device manufacturers to deliver the next generation of products all while getting to market faster and with a lower BOM cost. In this webinar, you'll hear about the changes that are happening with the introduction of the new class of supercharged MCUs and the new user experience they're able to provide. Hear directly from expert panelists at NXP and Crank Software about how manufacturers can leverage this opportunity to support mass production of their products and turn them into ROI superstars. Get a sneak peek into the upcoming release of Storyboard Lite, the latest version of the popular embedded GUI design and development software purposely built to help embedded teams build optimized GUIs for this new class of MCU.
Tags : 
    
Crank Software
Published By: AppZen     Published Date: Feb 14, 2020
T&E expenses are notoriously difficult to regulate. It’s not uncommon for employees to accidentally submit duplicate or out-of-policy expenses, which are easily overlooked in the expense report shuffle. Download our "Six ways to reduce errors, waste and fraud with AI" whitepaper to learn how to: - Enforce compliance - Root out fraud and other risk factors - Prevent significant spend leakage without needing additional resources
Tags : 
    
AppZen
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: Epson     Published Date: Feb 14, 2020
W hat does an inspired, truly interactive classroom look like in 2018? The truth is, there is no single answer. Your learning spaces have to meet the needs of your students, teachers, and community. The good news is there are many forward-thinking solutions that can help you create adaptive spaces for the students you have today, and tomorrow. In the following pages, you’ll find some helpful resources to help you identify what’s most important to you in classroom setup, technology, and design. You’ll also read about one amazing school that has truly transformed their learning spaces.
Tags : 
    
Epson
Published By: Simba by Magnitude     Published Date: Jan 28, 2020
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: Simba by Magnitude     Published Date: Feb 04, 2020
When it comes to developing applications capable of connecting to the data sources customers demand, software providers face the following top of mind challenges: • Connecting applications to data sources, h • Having adequate resources to do so, • Applying an effective maintenance strategy and • Addressing scalability. This eBook from the connectivity experts with 100s of person-years of data adapter experience is your how-to guide on the journey toward addressing these challenges to accelerate adoption of your application.
Tags : 
    
Simba by Magnitude
Published By: iCorps     Published Date: Jun 11, 2009
Finding the right IT service provider is not as simple as it may seem. Choosing a service provider based exclusively on low price may be good for your bottom line, but may fall short on delivering the right level of IT expertise and resource scalability for long-term advantage.
Tags : 
icorps, it service provider, it outsourcing, competitive advantage, roi, oursourcing, advantage
    
iCorps
Published By: HotSchedules     Published Date: Feb 14, 2020
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just a source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. We’re going to outline tangible paths to scheduling and labor management salvation. You’ll discover proactive ways to: Engage and empower employees Schedule faster Optimize your labor costs [GET THE GUIDE] / [LEARN MORE]
Tags : 
    
HotSchedules
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.