use

Results 1 - 25 of 9875Sort Results By: Published Date | Title | Company Name
Published By: QlikTech UK     Published Date: Nov 24, 2015
Organizations are, or will soon be, producing petabytes – thousands of terabytes or millions of gigabytes – of valuable data. But the ability to transform these massive data sets into actionable insights requires business intelligence (BI) and analytics tools that can uncover the hidden relationships among varied sources of information, provide rich visualizations of trends and don’t require end-users to be trained data scientists.
Tags : 
healthcare
    
QlikTech UK
Published By: Xerox     Published Date: Jun 11, 2015
Top 5 areas to consider when assessing and choosing a new Multifunction Device (MFD) in the Public Sector Inside you’ll find a few points to consider, including… 1. Clearly define your requirements 2. Total cost of ownership 3. Added value features and functionality 4. Ease of use 5. Device service & support Download the whitepaper to find out more.
Tags : 
    
Xerox
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: SADA     Published Date: Oct 25, 2019
To compete in a digital economy, today’s leaders must give their teams the right skills and tools to succeed. Made for a mobile, global workforce, G Suite unlocks teams’ full potential for innovation by opening up new ways of collaborating so that people can achieve more together. When teams use G Suite, they can react at a moment’s notice, generate breakthrough ideas, and maintain a shared purpose. Read this whitepaper to find out more.
Tags : 
    
SADA
Published By: SADA     Published Date: Oct 25, 2019
Millennials will soon be the largest demographic in the workforce, and they want to use cloud-based tools that promote work/life balance (and integration) and collaboration. G Suite fosters the group culture and flexible working environment these younger workers crave.
Tags : 
    
SADA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Schneider Electric     Published Date: Oct 29, 2019
Colocation-Anbieter setzen sich mit Marktkräften auseinander, die sowohl große Chancen als auch bedeutende Herausforderungen darstellen – teilweise aus derselben Entwicklung. Die Anbieter müssen sich mit ständig wechselnden Käufergruppen auseinandersetzen, wobei CFOs und COOs eine zunehmend wichtige Rolle bei der Entscheidungsfindung spielen. Sie müssen auf neue Trends wie das Internet der Dinge und Cloud Computing eingehen, die sich sowohl positiv als auch negativ auf ihr Geschäft auswirken können. Laden Sie dies herunter Ein Peer-to-Peer-Roundtable-Bericht, gesponsert von Schneider Electric um mehr zu lernen.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Do you have a plan for turning 5G excitement into revenue? Will your 4G pricing strategies still work, or will the market switch to speed tiers, hyper-segmented offers and other new monetization techniques. Download our latest eBook to learn about: The most promising Consumer, Enterprise and IoT use cases The Customer Proposition for each use case How Service Providers can turn new opportunity into revenue
Tags : 
    
Matrixx Software - Kingpin
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
As 5G is becoming a commercial reality in multiple lead markets, the question of how it should be positioned, packaged and priced will be critical in building competitive 5G propositions. Download the Strategy Analytics report to discover the results from end-user study groups and operator interviews, undertaken to answer a fundamental question: Are Telcos getting 5G right? Learn: How to build a 5G proposition to drive uptake, demand and profitability What consumers want from 5G services Where the opportunities and challenges are for operators, including content, unlimited data, enterprise offerings, network slicing, digital engagement, IoT etc.
Tags : 
    
Matrixx Software - Kingpin
Published By: SAP EMEA Global     Published Date: Sep 13, 2019
Managing employee experiences is not about pinpointing a single event or moment. People leaders need the ability to collect feedback at every moment that matters and take action to close experience gaps. With Employee Experience Management solutions from SAP, you can use a wide range of employee listening mechanisms across a variety of engagement channels to create a “digital open door.”
Tags : 
    
SAP EMEA Global
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: SheerID     Published Date: Oct 18, 2019
Standing out in a competitive market is no easy feat. How do you make a splash? It goes beyond innovative technology or relatable brand identity. You need a customer acquisition strategy that will connect your company with the ideal audience. Creating a personalized offer for specific consumer tribes—such as the military, students, or teachers—is a great start. But a manual verification process is frustrating for buyers and time-consuming for support teams. Learn how Purple used gated, personalized offers backed by instant verification, which led to: ? A 6x conversion rate ? Saving their support team 49 hours per month of phone calls ? 25:1 ROAS (Return on Ad Spend)
Tags : 
    
SheerID
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG
Published By: Nextgen     Published Date: Sep 25, 2019
It's a big undertaking to switch EHR vendors. That's why it's important to choose a vendor who can not only meet all your needs now, but who will be a partner alongside you as those needs evolve. Whether looking to buy your first EHR, seeking to replace your existing EHR, or consolidating EHRs to a single, integrated solution, this guide will help you in the process. Use these steps to find the best EHR for your billing, reporting, and patient care needs.
Tags : 
    
Nextgen
Published By: Oracle     Published Date: Sep 05, 2019
London-based international toy retailer Hamleys transitioned their stores to Oracle Retail Xstore Point-of-Service (POS) to empower their business users. In this guidebook, learn how the project team drove an accelerated program to go live at more than 15 stores, within eight months.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 05, 2019
Global fashion powerhouse Perry Ellis International upgraded from a six-year-old CRM system. In this guidebook, follow their journey to gaining a comprehensive view of consumer shopping behavior in an accelerated seven-week, implementation-to-launch period.
Tags : 
    
Oracle
Published By: Jeppesen     Published Date: Oct 01, 2019
"Empower your employees to streamline the process, decrease the risk and improve the cost of flight. Get this infographic to learn how different types of airline personnel use Jeppesen Aviator to boost the efficiency of flight operations."
Tags : 
    
Jeppesen
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.