• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

big

Results 1 - 25 of 2149Sort Results By: Published Date | Title | Company Name
By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
By: Lenovo UK     Published Date: May 13, 2019
It’s time to think bigger than incremental processing power and storage capacity upgrades. In 2019 IT modernisation offers much more, providing opportunities to closely align infrastructure with your most ambitious goals and build a future-facing foundation for success. Whatever your goals, this playbook gives you six versatile strategies that can help you plan a successful IT modernisation project, supported by examples from our industry-leading data centre portfolio.
Tags : 
    
Lenovo UK
By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
By: Dell EMC     Published Date: May 09, 2019
In nearly all midmarket businesses, staff costs are the single biggest expense – meaning that productivity gains have a substantial and lasting impact on the bottom line. This Proaction Series report, commissioned by Dell, discusses technologies that deliver the fastest, clearest productivity benefits to midmarket businesses and will address: - What midmarket firms are looking to accomplish - Why they would invest in IT solutions to achieve success in this area - Required IT solutions to support process evolution Download this report for more information.
Tags : 
    
Dell EMC
By: Instructure     Published Date: Jun 14, 2019
At Bridge, we know that a big problem facing sales leaders is not being able to onboard or train reps quickly enough to reach targets. In fact, it takes 50% of new reps 6 to 10 months to contribute to quotas. This guide is for sales leaders looking to elevate their teams and realise faster, more effective onboarding from 'Day One'. It helps at every step in the onboarding process, from hiring to providing reps with continuous learning.
Tags : 
    
Instructure
By: Schneider Electric     Published Date: Jun 03, 2019
Today’s plants are faced with managing two major challenges: the increasing speed of business and integrating emerging technologies. Leveraging IIoT as a basis for plant modernization could result in big payoffs: download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, operational profitability
    
Schneider Electric
By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
By: Workday APAC     Published Date: May 08, 2019
" How do some of the world’s biggest organizations transform their global HR operations? The five companies profiled in this eBook made their HR transformation journeys in very different ways, but they all arrived at the same destination—a single system that streamlines processes and boosts engagement across the entire organization. Read now to get their stories."
Tags : 
    
Workday APAC
By: Here Technologies     Published Date: Mar 29, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2018.
Tags : 
here technologies, transport and logistics
    
Here Technologies
By: Here Technologies     Published Date: Mar 29, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : 
here technologies, transport and logistics
    
Here Technologies
By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC
By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
    
CheckMarx
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
One of the biggest changes faces organizations making purchasing and deployment decisions about analytic databases -- including relational data warehouses -- is whether to opt for a cloud solution.
Tags : 
    
Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 28, 2019
However, big data and analytics solutions can have shortcomings. Proprietary and best-of-breed approaches can require valuable time and resources to build, integrate and maintain — while outsourcing data analytics can constrain reporting frequency and timeliness. In a world where operational efficiency and fast, reliable information is paramount, these limitations can put payers at a competitive disadvantage.
Tags : 
    
Group M_IBM Q2'19
By: Infosys     Published Date: Jun 14, 2019
Introduction Cloud along with other technologies such as Big Data, Internet of Things, Artificial Intelligence and Blockchain have made it possible for enterprises to have bolder visions for the future. The new technologies motivate them to accelerate tier digital transformation journey and deliver more rewarding experiences to clients.
Tags : 
    
Infosys
By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
Nuance Communications
By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter