change

Results 1 - 25 of 2947Sort Results By: Published Date | Title | Company Name
Published By: Highground Trading     Published Date: Jul 17, 2014
With nearly 3 billion contracts worth approximately $1 quadrillion in notional value traded in 2012, CME Group is the world’s leading and most diverse derivatives exchange. Building on the heritage of CME, CBOT and NYMEX, CME Group serves the risk management needs of customers around the globe. As an international marketplace, CME Group brings buyers and sellers together – whether trading on the CME Globex electronic trading platform or on trading floors in Chicago and New York, or clearing OTC transactions through CME ClearPort.
Tags : 
    
Highground Trading
Published By: Highground Trading     Published Date: Jul 17, 2014
With nearly 3 billion contracts worth approximately $1 quadrillion in notional value traded in 2012, CME Group is the world’s leading and most diverse derivatives exchange. Building on the heritage of CME, CBOT and NYMEX, CME Group serves the risk management needs of customers around the globe. As an international marketplace, CME Group brings buyers and sellers together – whether trading on the CME Globex electronic trading platform or on trading floors in Chicago and New York, or clearing OTC transactions through CME ClearPort.
Tags : 
    
Highground Trading
Published By: Lenovo UK     Published Date: Oct 01, 2019
Businesses are using hyperconverged infrastructure (HCI) to untangle today’s big IT challenges. HCI can help you accelerate workloads, meet growing storage needs, gain the commercial benefits of hybrid cloud and more – all with easy-to-manage building blocks.
Tags : 
    
Lenovo UK
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Achieving long-term profitability for 5G will require a major shift in thinking for many operators. Given the investments and capacity upgrades involved, simply treating 5G as just “another G” is a doomed strategy. Instead, 5G must be seen as an opportunity to re-energize the Telco business model and to move away from traditional commoditized network offerings. Download the discussion paper to learn: Five key questions the Telco C-suite should be asking to drive sustained 5G profitability Why 5G will require a major change in business strategy and IT delivery models How 5G can re-energize the Telco business model
Tags : 
    
Matrixx Software - Kingpin
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. You’ll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Here’s how to get started. Read this insight to discover: • key steps for building strong supplier relationships • potential risk areas that must be managed • why behaviour change is as important as processes and tools • why aligning your own organisation is essential.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 31, 2019
From intelligent automation to advanced analytics, disruptive technology will enable the finance function to provide all of its services more effectively and efficiently. Find out how technology will change the way finance delivers transactional services, expert services and business partnering, Read this report to discover: • how automation in finance can deliver expert services more reliably and with smaller workforces • how to design an agile workforce of humans and technologies • how the finance function will shift to be part of a cross-functional analytics model that provides key insights to the business
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 05, 2019
Leveraging procurement bots is the next logical step as organisations look to benefit from advancements in digital capabilities. Like every transformative technology, the implementation of procurement bots, while exciting, is not without challenges. Read this report to discover: • the five steps procurement organisations can take to create a partnership between bots and employees • the key characteristics of organisations doing this successfully • a phased methodology to ensure stakeholder change.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 05, 2019
If procurement organisations are to sustain their value to the enterprise, they must pivot to new operating models that embed customer-centricity in their technology, process and people. Read this report to discover: • the four convergence trends driving change and opportunity for procurement organisations • the nine differentiators for customer-centric procurement leaders • how and why you should be leveraging CX procurement technology."
Tags : 
    
KPMG
Published By: Oracle     Published Date: Sep 12, 2019
Digital commerce platform complexity continues to increase due to constant changes in product offerings and functionality, technology delivery, and pricing models. We evaluate the viability of 13 vendors to assist application leaders supporting digital commerce in making an objective evaluation.
Tags : 
    
Oracle
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: BillingPlatform     Published Date: Jul 30, 2019
Discover How Cloud-based Billing Delivers Transformation Enterprise leaders and companies of all sizes are leveraging digital transformation through disruptive technologies like the Internet of Things, AI, business intelligence and big data. This eBook demonstrates 5 strategies for leading the charge for change within your business. Discover how to quickly leverage digital transformation in your technology stack and monetize it quickly with cloud-based billing. Download this eBook to explore how the right solution can help you: • Launch product innovations quickly • Monetize IoT and increase revenue • Automate billing to improve customer retention • Leverage the cloud to reduce costs Adapting today can mean the difference between success and obsolescence. With the right billing solution your business can thrive in these challenging times. Discover how today!
Tags : 
    
BillingPlatform
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014… • The seminal DevOps book—Gene Kim’s The Phoenix Project—was one year old • Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 • "Continuous Testing” just started appearing in industry publications and conferences2 • Many of today’s popular test frameworks were brand new—or not yet released • The term “microservices” was just entering our lexicon • QC/UFT and ALM were still sold by HP (not even HPE yet) • Only 30% of enterprise software testing was performed fully “in house”3 • There was no GDPR restricting the use of production data for software testing • Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadn’t even been announced Times have changed—a lot. If the way that you’re testing hasn’t already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
    
Tricentis
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.