Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

sso

Results 1 - 25 of 1633Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
    
SAP
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 17, 2018
Your mobile workforce needs devices that are both versatile and allow for higher productivity. Increasingly, that’s 2-in-1 devices, such as convertible notebooks or detachable tablets. IDC research shows that using Dell 2-in-1 devices, powered by Intel® processors, made people more productive while being less physically demanding and requiring less effort. Download the executive summary for highlights of the IDC study and to find out why people prefer using 2-in-1 devices over traditional laptops. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Il est tout aussi facile d'être submergé par l'omniprésent Big Data qu'il l'est pour les organisations d'être découragées par les défis qu'elles rencontrent lorsqu'elles implémentent une initiative en matière de Big Data. Les préoccupations liées aux ensembles de compétences associées au Big Data (et à leur absence), à la sécurité, à l'imprévisibilité des données, aux coûts non viables et à la nécessité d'effectuer une analyse de rentabilité peuvent mettre brutalement fin à une initiative en matière de Big Data.
Tags : 
    
Amazon Web Services
Published By: Dell Server     Published Date: Aug 07, 2018
Drive a competitive advantage. Deploy and analyse more high-value data workloads faster with a 41% increase in transactions per second and a 50% reduction in average query response time with the Dell EMC PowerEdge portfolio, powered by Intel® Xeon® Platinum processors.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® Platinum processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
Transform your IT with the clear winner in server innovation Greater performance, agility and security are the new imperatives of the modern data center. Dell EMC PowerEdge servers — with Intel® Xeon® Scalable processors — are ready to meet those demands, today and tomorrow.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
    
Dell Server
Published By: Google     Published Date: Aug 23, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response showed that 74% of respondents have become more confident in cloud security. Read this report and learn more about the measures organizations are taking to manage security across cloud platforms."
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Dans l’économie des applications, les sociétés sont poussées à déployer les applications plus rapidement, ce qui les amène à considérer les tests autrement. Alors qu’elles y voyaient autrefois des obstacles à la rapidité de DevOps, les entreprises prennent aujourd’hui le rythme grâce à l’émergence d’outils et de méthodes de test novateurs. Dans cet eBook, nous analysons quelques obstacles sur la route des tests en continu, mais aussi de nouvelles approches qui favorisent l’adoption de pratiques de test nouvelle génération permettant de tester plus tôt, plus souvent et de façon automatisée.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Qualsiasi elemento che entra in contatto con l'applicazione migliora o peggiora le performance. Stabilire se ciò sia attribuibile all'infrastruttura, a una variazione del codice, a un'API, alla rete, all'architettura applicativa o a un servizio connesso è estremamente complesso.In questo eBook, descriveremo i nuovi ambienti estremamente articolati e complessi necessari per supportare un business digitale moderno e analizzeremo come un modello inedito di APM (Application Performance Management) possa fornire informazioni fruibili fondamentali per massimizzare le prestazioni.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Un numero sempre crescente di aziende ricorre alla containerizzazione delle applicazioni per aumentare l'efficienza e la velocità dello sviluppo. Grazie ai container, gli sviluppatori possono inserire in un pacchetto, inviare ed eseguire qualunque applicazione sotto forma di container leggero e autosufficiente, eseguibile praticamente ovunque, per garantire la portabilità istantanea dell'applicazione. Per comprendere più chiaramente lo stato del monitoraggio dei container, abbiamo intervistato 100 executive e identificato i principali trend per i container. In questo eBook viene esaminato ogni singolo trend, quindi vengono forniti indicazioni concrete e passi successivi da compiere per garantire il controllo completo del monitoraggio dell'ambiente container.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Moderne Lösungen wie CA PPM bieten kontinuierlich Verbesserungen gegenüber IT-Anforderungsmanagementtools der vorigen Generation. Sie bieten immer wieder neue Funktionalitäten, um die Belastung des PMO, des Finanzmanagers, des Ressourcenmanagers und des Produktmanagers zu verringern. In den letzten Jahren haben neue Anbieter, die am großen und zunehmend einflussreichen Markt für das Projekt- und Portfoliomanagement (PPM) Fuß fassen möchten, Module entwickelt und in ihre SaaS-Plattformen integriert. Diese Anbieter behaupten, dass ihre Tools leicht zu installieren und leicht zu verwalten sind und ihren Kunden Geld sparen. Das klingt zu gut, um wahr zu sein. Und für die meisten Unternehmen ist es das auch.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione La forza lavoro di oggi è abituata a utilizzare tecnologie personali che semplificano le comunicazioni e la vita quotidiana. Molti strumenti aziendali, tuttavia, non sono riusciti a rimanere al passo. La maggior parte delle attuali soluzioni di project and portfolio management non è in grado di fornire modi semplici per svolgere le attività quotidiane. Non facilitano le comunicazioni contestuali che agevolerebbero la risoluzione dei problemi e non dispongono di funzionalità chiave: capacità di restringere il focus ai dati pertinenti, di eseguire il drill-down per accedere a ulteriori informazioni e di prevedere in modo efficiente le necessità finanziarie e modellare i risultati.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Più di 400.000 lavoratori di circa 400 società, tra cui Polycom, Qantas e Toyota, usano già CA Project & Portfolio Management SaaS (CA PPM SaaS) per ridurre i costi, promuovere l'adozione e applicare processi decisionali più intelligenti. Con l'aiuto di CA Services, le aziende possono distribuire e configurare facilmente CA PPM SaaS, semplificando il processo di acquisto, utilizzo e gestione della soluzione.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
En résumé La version 15.3 de CA Project & Portfolio Management (CA PPM) vous permet de personnaliser les projets pour chaque business unit par de simples opérations de glisser-déposer. Qu’il s’agisse de workflows complexes pour les ressources humaines ou de simples tâches de gestion des ventes, les projets peuvent désormais être lancés en quelques minutes, au lieu de plusieurs jours. Ajoutez à cela des possibilités de collaboration au départ de l’application proprement dite pour éliminer les réunions superflues, un format de tableau familier de type Microsoft Excel® pour gérer les budgets, de nouvelles connexions à des outils d’aide à la décision tiers pour trouver des réponses, et vous obtenez l’application de gestion de portefeuilles de projets la plus moderne du marché.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Les solutions modernes telles que CA PPM continuent d’élever la barre en matière d’outils dernière génération de gestion de la demande IT en proposant en permanence de nouvelles fonctionnalités permettant d’alléger la charge des bureaux de gestion de projets (Project Management Office, PMO), des directeurs financiers, des gestionnaires des ressources et des chefs de produit. Ces dernières années, de nouveaux fournisseurs cherchant à tirer parti du vaste marché toujours plus influent de la gestion de portefeuilles de projets (Project and Portfolio Management, PPM) ont développé des modules qui « s’intègrent » à leurs plates-formes SaaS. Ils se targuent du fait que leurs outils sont faciles à installer et à gérer et promettent des économies à leurs clients. Cela semble trop beau pour être vrai. Et pour la plupart des organisations, c’est malheureusement le cas.
Tags : 
    
CA Technologies EMEA
Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: Forcepoint     Published Date: Aug 31, 2018
Die Vernetzung und der Schutz von Unternehmen im Zuge einer immer weitergehenden dezentralen Streuung der Mitarbeiter, die Zugriff auf Ressourcen innerhalb und außerhalb des Unternehmensnetzwerks benötigten, führt zu einer neuen Schwerpunktsetzung auf betriebliche Effizienz und wirksamen Schutz. Während die fundamentalen Anliegen der Vertraulichkeit, Integrität und Verfügbarkeit von Daten unverändert bestehen bleiben, steigen die Kosten und potentiellen Schäden für Unternehmen immer weiter an, was die Rolle der Führungsebene und der Sicherheitsfachleute komplexer macht als je zuvor. Eine vor Kurzem von IDC durchgeführte Befragung von CISOs hat ergeben, dass die folgenden fünf Szenarien am meisten Besorgnis erregen: • Preisgabe vertraulicher Informationen auf der Titelseite bedeutender Veröffentlichungen (WSJ etc.) • Abfluss von 50 % der HR-Mitarbeiterdaten • IT-Systeme als Angriffsvektor gegen Partner • Gezielte Angriffe • Abfluss von 10 % der personen- und gesundheitsbezogenen Mitarbe
Tags : 
    
Forcepoint
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: SAS     Published Date: May 24, 2018
For 20 years running, SAS has landed a coveted spot on Fortune’s 100 Best Companies to Work For list. Our HR department plays a critical role in keeping current employees engaged and productive as well as anticipating and preparing for future workforce needs. How? One reason is our use of data and analytics to drive HR decision making. It would be easy to assume other companies see the value of analytics; however, a Deloitte survey found 75 percent of HR leaders rate analytics as a priority, yet only 8 percent say their HR organization has a strong analytics capability. I had the pleasure of meeting David Harcourt, Associate Manager of Employee Insights at Yum! Brands when he spoke at the Analytics Experience 2016 conference in Las Vegas. His session, “HR Analytics from Scratch: 8 Lessons Learned in the First Year,” provided valuable insight into what it takes to build HR analytic competency from scratch. His mission is to share with others what he wishes he’d known when he started bui
Tags : 
    
SAS
Published By: DocuSign UK     Published Date: Aug 08, 2018
Download this eBook to learn how eSignature technology and the processes associated with it not only optimise workflows but also can help make company activities more secure and compliant.
Tags : 
    
DocuSign UK
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search