Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

infor

Results 1 - 25 of 4140Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: OutSystems     Published Date: May 30, 2019
In its fifth year, the goal of the OutSystems State of Application Development Report is to provide a comprehensive analysis of the challenges, priorities, and innovations faced by IT teams around the globe in this age of digital transformation. This analysis is based on the responses to a survey conducted in March 2018. More than 3,500 IT professionals from over 116 countries took part. Respondents worked in all kinds of industry, and in this concise summary of the report, we focus on specific findings related to the manufacturing sector. The need for digital transformation dominates business strategy today, and there are two obvious consequences for IT. Firstly, the demand for application development (app dev) is at an all-time high. Secondly, speed and agility are more important than ever before. This backdrop informed the themes we wanted to explore in this year’s survey, which set out to answer five critical questions: How are the app dev priorities of organizations adjusting
Tags : 
    
OutSystems
Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Published By: Nuance EMEA     Published Date: Jun 05, 2019
Neue Marktteilnehmer verschieben die Art und Weise, wie die Branche handelt, neue Geschäftsmodelle verändern die Kundenerwartungen und der demografische Wandel zwingt die Teilnehmer, sich diesen Gegebenheiten anzupassen. Das kommende Jahrzehnt wird geprägt sein von künstlicher Intelligenz sowie digitaler Innovation und es wird darauf ankommen, dem exponentiellen Zuwachs der zur Verfügung stehenden Informationen intelligente Werkzeuge und Prozesse für eine sinnvolle Nutzung dieser. Ressourcen an die Seite zu stellen. Nur so wird es gelingen, gesetzliche Bestimmungen einzuhalten und einen Mehrwert für die Kunden zu schaffen. Um mehr zu erfahren, laden Sie dieses eBook herunter!
Tags : 
    
Nuance EMEA
Published By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
    
SambaSaftey
Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Workday APAC     Published Date: May 08, 2019
Whether informing talent strategy or building more effective teams, data-driven insights about your workforce can set you up for success. This eBook from Human Capital Institute explores how people analytics can empower your entire organization. Read now.
Tags : 
    
Workday APAC
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
However, big data and analytics solutions can have shortcomings. Proprietary and best-of-breed approaches can require valuable time and resources to build, integrate and maintain — while outsourcing data analytics can constrain reporting frequency and timeliness. In a world where operational efficiency and fast, reliable information is paramount, these limitations can put payers at a competitive disadvantage.
Tags : 
    
Group M_IBM Q2'19
Published By: Oracle     Published Date: Jun 04, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 04, 2019
Finance leaders believe data management is a burden on businesses. Yet less than half of organisations have a data management strategy in place. But data management strategies positively impact security across all lines of business. Poor data management practices inevitably lead to poor outcomes, with bad decisions based on bad data. Data must also be protected, with weak practices leading to cyber breaches. And the reputational damage to an organisation’s brand cannot be underestimated. However, when managed well, data offers a competitive advantage. In the past, data was typically informed historical reporting, with internal needs and compliance taking priority. There is a new data paradigm. Data is the new currency in the digital age.
Tags : 
    
Oracle
Published By: Motorola Solutions     Published Date: Jun 05, 2019
THE TIME IS NOW TO CREATE AN ENGAGING SHOPPING EXPERIENCE FOR EVERY CUSTOMER. In the world of retail, the customer is always right. That’s why retailers today must ensure their staff is well-informed, well-coordinated, armed and ready with the right information to satisfy customers in stores. Whether it’s a customer’s question about a product or a request for a different size, shoppers expect retail associates to be empowered with accurate answers and attentive service. Above all, stores need to rely on strong communication technologies so retailers can deliver a seamless experience for shoppers and keep them coming back. When retailers create an engaging experience, customer interactions turn into transactions and occasional buyers turn into loyal brand advocates. Motorola Solutions Two-Way Business Radios are helping retailers across the nation enhance customer and employee interactions, efficiency and safety both in stores and warehouses – but which business radio model is right for
Tags : 
    
Motorola Solutions
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, infrastructure, load balancing, servers, storage virtualization, green computing
    
Coyote Point Systems
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search