• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

nec

Results 1 - 25 of 2688Sort Results By: Published Date | Title | Company Name
By: Red Hat     Published Date: Aug 22, 2018
Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic.
Tags : 
    
Red Hat
By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
cybercrime, security, malware
    
Akamai Technologies
By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 10, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Qualsiasi elemento che entra in contatto con l'applicazione migliora o peggiora le performance. Stabilire se ciò sia attribuibile all'infrastruttura, a una variazione del codice, a un'API, alla rete, all'architettura applicativa o a un servizio connesso è estremamente complesso.In questo eBook, descriveremo i nuovi ambienti estremamente articolati e complessi necessari per supportare un business digitale moderno e analizzeremo come un modello inedito di APM (Application Performance Management) possa fornire informazioni fruibili fondamentali per massimizzare le prestazioni.
Tags : 
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Casi todo lo que toca una aplicación acaba por mejorar o degradar su rendimiento. El reto es determinar si es atribuible a la infraestructura, un cambio en el código, una API, la red, la arquitectura de la aplicación o un servicio conectado. En este libro electrónico, tratamos los nuevos entornos altamente complejos y caóticos necesarios para dar soporte a un negocio digital moderno y cómo un nuevo modelo de gestión del rendimiento de las aplicaciones (APM) puede proporcionar los conocimientos prácticos necesarios para maximizar el rendimiento.
Tags : 
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione La forza lavoro di oggi è abituata a utilizzare tecnologie personali che semplificano le comunicazioni e la vita quotidiana. Molti strumenti aziendali, tuttavia, non sono riusciti a rimanere al passo. La maggior parte delle attuali soluzioni di project and portfolio management non è in grado di fornire modi semplici per svolgere le attività quotidiane. Non facilitano le comunicazioni contestuali che agevolerebbero la risoluzione dei problemi e non dispongono di funzionalità chiave: capacità di restringere il focus ai dati pertinenti, di eseguire il drill-down per accedere a ulteriori informazioni e di prevedere in modo efficiente le necessità finanziarie e modellare i risultati.
Tags : 
    
CA Technologies EMEA
By: TIBCO Software APAC     Published Date: Aug 13, 2018
Are you considering data virtualization for your organization today? In this paper you will learn 10 core truths about data virtualization and gain essential knowledge for overcoming analytic data bottlenecks and driving better outcomes.
Tags : 
    
TIBCO Software APAC
By: TIBCO Software APAC     Published Date: Aug 14, 2018
According to Forrester Research, "Enterprise data virtualization has become critical to every organization in overcoming growing data challenges," with faster access to connected data, self-service, and agility among the many benefits seen. In this report, Forrester analyzes past research and Forrester Wave reports, user need assessments, and vendor and expert interviews to evaluate the offerings of top vendors in enterprise data virtualization. In compiling the vendor rankings, the report reviews the current offering, strategy, and market presence for the 13 most significant vendors. They discuss where TIBCO ranks in the evaluation and positions TIBCO Data Virtualization as a leader in enterprise data virtualization Read The Forrester Wave™: Enterprise Data Virtualization, Q4 2017 report to learn more.
Tags : 
    
TIBCO Software APAC
By: TIBCO Software APAC     Published Date: Aug 15, 2018
World leader in design and manufacture of innovative sensing solutions that enhance safety, security, and energy efficiency. For this manufacturers of high-tech imaging systems, monitoring accuracy and product quality are critical. Any quality problem could mean a part fails sooner than expected, or triggers a false alarm at a customer site that causes unnecessary panic. By setting up automated manufacturing analytic workflows with the TIBCO StatisticaTM platform, the company can complete complicated processes in just a few minutes and improve product quality by decreasing the variability of everything they produce.
Tags : 
    
TIBCO Software APAC
By: TIBCO Software APAC     Published Date: Aug 15, 2018
TIBCO Spotfire® Data Science is an enterprise big data analytics platform that can help your organization become a digital leader. The collaborative user-interface allows data scientists, data engineers, and business users to work together on data science projects. These cross-functional teams can build machine learning workflows in an intuitive web interface with a minimum of code, while still leveraging the power of big data platforms. Spotfire Data Science provides a complete array of tools (from visual workflows to Python notebooks) for the data scientist to work with data of any magnitude, and it connects natively to most sources of data, including Apache™ Hadoop®, Spark®, Hive®, and relational databases. While providing security and governance, the advanced analytic platform allows the analytics team to share and deploy predictive analytics and machine learning insights with the rest of the organization, white providing security and governance, driving action for the business.
Tags : 
    
TIBCO Software APAC
By: CyberSource     Published Date: Aug 31, 2018
Gain a bird's-eye view of how online fraud affects the airline industry Fraud continues to be a major source of revenue loss for the global airline industry. With airlines pushing for more direct bookings and the accelerating use of mobile as a booking platform, incidence of fraud is rising, albeit only slightly. Despite these factors, many airlines are not devoting the necessary resources and tracking the required metrics to measure and control fraud. CyberSource partnered with Phocuswright to benchmark global metrics and trends in fraud management and protection among airlines. The study also explores airline awareness of various fraud-related issues and examines their approaches to and implementation of fraud management tools and services. To learn more, download the study today
Tags : 
    
CyberSource
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
By: Cohesity     Published Date: Aug 21, 2018
Today's backup and recovery is complex. 68% of organizations find their IT environments more complex than they were 2 years ago! Infrastructure silos are driving unnecessary data copies which can be difficult to manage and inefficient. Organizations need a modern solution that can simplify their backup and recovery global. Download this white-paper to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
By: Spredfast     Published Date: Aug 27, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
By: Forcepoint     Published Date: Aug 30, 2018
xxx
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Aug 31, 2018
Eine Firma ist nur so handlungsfähig wie ihr Netzwerk. Änderungen an der Netzwerkarchitektur sind daher riskant. Verbesserungen an der Sicherheit eines IT-Netzwerkes bedeuten oft schlechtere Netzwerk-Performance und umgekehrt. Vor allem, wenn Netzwerke nicht konsistent sind und dadurch der Verwaltungsaufwand sehr hoch ist, sollte man über eine Neuplanung nachdenken. „Modernizing the Distributed Enterprise Network“ untersucht wie die Forcepoint NGFW neue Standards setzt und somit die Digitale Transformation in Unternehmen voranbringt. Enterprise-grade SD-WAN connectivity. Implementieren und Verwalten von Unternehmensnetzwerken mit mehr als 1000 Standorten zentral von einer Konsole. Höchste Sicherheit ohne Einbußen bei der Performance und Zuverlässigkeit. Einfachste Implementierung und Verwaltung mit zentralem Management im Unternehmen. Zukunftssicher, agil und flexibel. Passt sich unterschiedlichen Anforderungen und Situationen an. Lesen Sie „Modernizing the Distributed Enterpri
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Sep 04, 2018
Connecting and protecting organizations as their people disperse to more locations and need access to resources inside and outside the enterprise are driving a renewed focus on operational efficiency and security efficacy. While the fundamental concerns of confidentiality, integrity, and accessibility are unchanged, the cost and potential losses to organizations continue to increase, making the role of C-level infrastructure and security executives more complex than ever before. A recent IDC survey of CISOs ranked the following as the top 5 scenarios keeping them up at night: • Breach disclosure on the front page of WSJ and so forth • Leak of 50% of employee HR records • IT systems to be a source of major attack against partner • Target-style breach • Leak of 10% of PHI/PII customer records
Tags : 
    
Forcepoint
By: Dassault Systèmes     Published Date: Jun 19, 2018
The concept of a virtual, digital equivalent to a physical product or the Digital Twin was introduced in 2003 at a University of Michigan Executive Course on Product Lifecycle Management (PLM) taught by Dr. Michael Grieves. In light of these advances, it is timely to explore how the Digital Twin can move from an interesting and potentially useful concept that aids in understanding the relationship between a physical product and its underlying information to a critical component of an enterprise-wide closed-loop product lifecycle. Understand how focusing on the connection between physical product and virtual product will improve productivity, uniformity of production, and ensure the highest quality products.
Tags : 
    
Dassault Systèmes
By: IBM     Published Date: Apr 25, 2018
Hear from industry leaders on how to maximize omni-channel fulfillment, eliminating unnecessary costs and optimizing sourcing decisions.
Tags : 
omni-channel, order management, sourcing, fufillment
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter