• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

high tech

Results 176 - 200 of 537Sort Results By: Published Date | Title | Company Name
By: Dassault Systèmes     Published Date: Jun 19, 2018
This spotlight report examines: • How Manufacturing Operations Management (MOM) or Manufacturing Execution Systems (MES) are key enablers of data management and Digital Transformation. Companies can combine many other opportunities with manufacturing operations in a digital journey. • Product lifecycle management (PLM) as a high-value discipline to pair with MOM in discrete manufacturing, and the value of digital continuity across engineering, manufacturing operations, and supply chain. • A robust integration of MOM and PLM technologies and the advent of the Digital Twin (a virtual copy of the product and how it's made) to demonstrate maturity in Smart Manufacturing and the ability to make smart products in smart factories. The IIoT has opened up a world of opportunity for manufacturers. Take advantage of it.
Tags : 
    
Dassault Systèmes
By: Sage People     Published Date: Jul 05, 2018
As a business executive your time is incredibly valuable, right? And if you aren’t maximally time efficient or productive then you – and your business – will soon fall behind. It’s a fact of life in today’s highly-competitive digital marketplace. But how do you stem the flow of lost time? And how are other leaders making the most of this scarce resource so they can be as efficient, productive and valuable as possible? This report was produced specifically for the UK and Ireland (UK/I) region and is based on data gathered from real-world business leaders explaining how they perform tasks on a daily basis. In the report, we look at how business managers can step up from operational tasks and focus on work that will propel their business forward. We will: • Touch on the priorities of what could be termed ‘accelerated business leaders’: those decision makers leading their industries forward in a way that harnesses emerging technologies and agile new ways of working. • Examine the key facto
Tags : 
    
Sage People
By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
By: Oracle     Published Date: Jul 31, 2017
"The significance of technology in higher education has changed dramatically over the past decade. The rise of mobile, social and analytic technologies is forcing institutions to rethink their business models from the ground up. Institutions at all ends of the spectrum clearly need to embrace fundamental changes in their most basic business processes and platforms. A critical factor in the planning for those changes includes finding the right partner to assist with a major platform shift to the cloud."
Tags : 
    
Oracle
By: Oracle     Published Date: Jan 15, 2014
Oracle is Reducing the Risk of Uncertainty in Higher Education
Tags : 
oracle, higher education, technology in education, future-proofed solutions, it management
    
Oracle
By: Smarsh     Published Date: Dec 07, 2016
For companies in highly regulated or litigious industries, it’s now more important than ever to understand how compliance and legal departments can work together to share information, reduce inefficiencies, overcome challenges, and align technologies.
Tags : 
    
Smarsh
By: Salesforce.com     Published Date: Jul 02, 2014
With today's financial advisors and wealth managers facing such tough competition, the ability to thrive comes through maximizing efficiency and finding innovative ways to maintain and grow business. This white paper highlights how technology is a great partner for meeting this need: • Create more relevant interactions with customers by tracking your business in the cloud • Connect to your customer information from any mobile device • Increase sales to your customers with a deeper understanding of their needs Download this white paper to learn more!
Tags : 
salesforce.com, customer tracking, business in the cloud, financial advisors, wealth managers, mobile devices, enterprise applications
    
Salesforce.com
By: MarkLogic     Published Date: Nov 08, 2016
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. Download now to learn more.
Tags : 
    
MarkLogic
By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
mcafee, intel, security, data, cloud
    
Intel Security
By: DrFirst     Published Date: Mar 13, 2015
Long-term care facilities are highly regulated institutions that are often reluctant to implement new health technology. Cedar Creek Nursing Center chose Akario Backline® secure chat to help improve care transition processes by minimizing phone calls and faxes.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario
    
DrFirst
By: AWS     Published Date: Nov 07, 2018
Enterprises seeking the security and performance capabilities of establishing their own private network are often turned away by the high cost and technical expertise required. AT&T NetBond® for Cloud helps establish private, dynamic connectivity from on-premises data centers to Amazon Web Services (AWS) in as little as 2-3 days. Aira, a customer focused on augmented reality, has leveraged the global connectivity capabilities of AT&T NetBond® to connect low vision or blind smart glasses users with a network of agents to guide the visually impaired through everyday tasks such as interpreting prescriptions. Download this case study with AT&T, Aira, and AWS to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands
Tags : 
    
AWS
By: Sprinklr     Published Date: Feb 28, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
research reports, analyst reports, marketing technology, forrester wave, forrester wave reports, report, marketing trends. trends, marketing
    
Sprinklr
By: IBM     Published Date: Sep 11, 2017
Business Process Management For Dummies, 4th IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits, from higher customer satisfaction to greater agility in adapting to changing market conditions. You also learn about the latest advances in BPM, including the application of cognitive technologies.
Tags : 
bpm, ibm, customer satisfaction, cognitive technologies
    
IBM
By: IBM     Published Date: Oct 19, 2017
Business Process Management For Dummies, 4th IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits, from higher customer satisfaction to greater agility in adapting to changing market conditions. You also learn about the latest advances in BPM, including the application of cognitive technologies.
Tags : 
business process management, ibm, cognitive technology, bpm
    
IBM
By: HotSchedules     Published Date: Mar 11, 2019
The restaurant industry is buzzing about automation. With labor costs expected to double and consumer demand for a seamless checkout experience, many restaurants are looking at technologies that can automate tasks in the front-of-house. But there are back-of-house processes that have yet to be fully automated. While auto-counting your inventory may be a thing someday, it’s not here yet. So if you can’t automate the inventory management process, you can at least use tools that automate its more cumbersome aspects. Maximum labor output, higher levels of accuracy, and better accountability are possible with a system that automates certain tasks and enable manager productivity for on-the-job success. After reading this eBook, you’ll know: • The many inefficiencies generated by manual, spreadsheet-based counting methods. • The innovations being made to inventory management technology. • How modern, mobile inventory management tools will help your managers reduce costs and increase product
Tags : 
    
HotSchedules
By: Datastax     Published Date: Apr 04, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Datastax
By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Tags : 
    
Group M_IBM Q418
By: OracleSMB     Published Date: Jan 04, 2018
Growing companies need to hire and retain great employees. Survey after survey attributes keeping the right people in the right jobs with company longevity and profitability. However, with limited resources and low brand recognition, small and medium-sized businesses find it hard to compete. And they can’t afford hiring missteps or high levels of turnover. Therefore, you need act—now—to start adding value with every hire. Technology can help you recruit and retain the right way.
Tags : 
    
OracleSMB
By: Oracle     Published Date: Mar 18, 2019
Oracle's Digital Innovation Platform for Open Banking is a cloud-based, open API solution built on an enterprise-grade IaaS and PaaS platform. The solution offers high-value, predictable integrations, open-marketplaces with fintech and banking API services. (30 characters/spaces possible)
Tags : 
    
Oracle
By: Oracle     Published Date: Mar 18, 2019
This infographic highlights trends and technologies that will shape fi¬nancial services over the next ¬five years.
Tags : 
    
Oracle
By: First Advantage     Published Date: Apr 17, 2018
In the face of compressed margins, what avenues exist for multi-family providers to build revenue? The answer is found in taking full advantage of the benefits of lower vacancies and high demand by maximizing operational efficiency–and background screening can help! Below we outline best practices for three main routes to building stronger revenues. 1. Squeezing value out of lower vacancies 2. Taking technology to the next level 3. Maximizing revenue while protecting against risk
Tags : 
    
First Advantage
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter