ods

Results 126 - 150 of 604Sort Results By: Published Date | Title | Company Name
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Equinix EMEA     Published Date: Mar 21, 2019
Globally, payments are going digital—whether they are cash moving to cards, QR codes at point of sale (POS), purchases moving from physical to online stores with electronic forms of payment, or payments becoming seamless with in-app experiences. This phenomenon is not new, but does appear to be accelerating. This increased speed of adoption is driven by multiple factors, including an abundance of new electronic payment methods—many of which are layered on top of existing payment methods— focused on convenience, speed and the overall consumer experience. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: HP     Published Date: Jul 15, 2014
Two giant ‘startups’ carry on the Kraft legacy as they rapidly launch themselves—and new, tasty product offerings.
Tags : 
hp case study, virtualization, cloud, private cloud, hp cloud
    
HP
Published By: HP     Published Date: Jul 30, 2014
Two giant ‘startups’ carry on the Kraft legacy as they rapidly launch themselves—and new, tasty product offerings.
Tags : 
hp case study, virtualization, cloud, private cloud, hp cloud
    
HP
Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack
    
McAfee
Published By: HERE Technologies     Published Date: Feb 26, 2019
The market for connected and embedded car navigation needs a kick-start. Lengthy design cycles and a fragmented supply chain have contributed to a sector that lags far behind consumer expectation and now sees Apple and Google as direct competitors for the in-vehicle experience space. OEMs need partners who can help them radically overhaul their navigation services, feature development, deployment, and monetization programs. This whitepaper outlines how HERE Technologies has created a new solution to kick-start the connected navigation market. This whitepaper will help you understand how the HERE Navigation on Demand service: Delivers a new development approach and architecture to OEMs Enables OEMs to offer consumers new and compelling services Helps OEMs avoid costly developments and protracted roll-out periods
Tags : 
location data, auto, mapping
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 28, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: IBM     Published Date: Jul 26, 2017
Just a few years ago, many organizations turned to private cloud environments to help increase flexibility and control costs—largely because of the immaturity and lack of control within the public cloud environments then available. Today, however, the decision to “go cloud” is less of a binary, and more of a spectrum of choices, spanning different deployment models (public, private and hybrid) and service types, including IaaS, PaaS and SaaS.
Tags : 
cloud, data protection, security, deployment methods, service types
    
IBM
Published By: Schneider Electric     Published Date: Apr 20, 2018
In this paper we describe effective data center pod frame containment systems and demonstrate how they can reduce time to deploy by 21% and reduce capital costs by 15% compared to traditional methods and containment systems.
Tags : 
data center, it racks, pod frame, air containment, it deployment
    
Schneider Electric
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat Optimized Video Delivery utilizes a combination of stream-splitting and caching technologies to prevent "video floods" that are caused when Internet video saturates a company's WAN or Internet gateway and keeps other applications from performing properly.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Esker     Published Date: Dec 19, 2016
Electronic Data Interchange, commonly referred to as EDI, is a process that allows data to be exchanged between businesses in a standard electronic format. Sales order processing is an area of business where EDI is used extensively. However, up to one-third of EDI orders can contain exceptions — this is where problems surface. Traditional handling methods cause a host of challenges for customer service professionals and the business as a whole. This eBook aims to expose these issues, while showing how order processing automation can work with existing EDI environments to streamline exception handling and fix any potential problems before they mess up your ERP system and bottom line. Learn more about EDI Exceptions, download now!
Tags : 
    
Esker
Published By: Workday     Published Date: Mar 01, 2018
Explore the strategies companies are pursuing to manage change in this Workday-sponsored Harvard Business Review Analytic Services report. See how organizations use a single cloud-based system for finance and HR to create data-led decision-making, support C-suite collaboration, and develop planning methods with better insight, accuracy, and speed.
Tags : 
cloud-based system, finance, data, decision making
    
Workday
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Brainshark     Published Date: Aug 02, 2017
As buyers have become increasingly more savvy and better-educated, B2B sales organizations have changed their strategies. But that can’t happen in a vacuum – sales training must change as well. This brief provides specific ways to improve both the training content delivered to sales reps and the all-important methods for delivering that content. With this actionable information, managers and trainers can begin enacting real change that gets reps more conversation-ready than ever before. Get your copy of this latest brief today. And ready your sales force for better opportunities and more wins.
Tags : 
sales mastery, b2b, b2b sales, salespeople, better selling, sales training
    
Brainshark
Published By: Brainshark     Published Date: Aug 02, 2017
Whether your sales reps are 25 or 65, sales enablement leaders all have the same goal: to ensure that reps are prepared to have impactful conversations with each and every buyer. However, the preferred methods of sales coaching change from generation to generation. Thankfully, sales coaching technology helps sales enablement leaders bridge that gap. This exclusive eBook provides details on how to use technology to alter your coaching strategy to appeal to next-gen sales reps, including: • Mobile and video-based coaching • Options for both formal and informal learning • Coaching for both individual and organizational mastery
Tags : 
next-gen sales force, sales enablement, coaching, salesforce
    
Brainshark
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Software delivery processes and systems, and the people involved with them, are under increasing pressure. Sometimes it’s digital transformation, other times it’s simply the challenge of keeping up with the demands created by ever more dynamic markets and an escalating pace of change. None of this is news, but is does provide an important backdrop to the discussion of how software delivery needs to evolve, especially given that traditional methods and approaches were never designed to deal with the fastmoving and unpredictable environment you are probably working in today.
Tags : 
delivery, testing, software development, integration, business solutions, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Groove     Published Date: May 16, 2018
From equipping them with accurate data to efficiency-driving tools to impactful training, you want to find the best systems to help your reps soar. As the market floods with technology (and a lot of lofty claims), it may be tough to know what you actually need and where to start your research process to help — not hinder — your team. You’ve probably heard a lot of buzz about sales engagement platforms, and there are quite a few to choose from. But what is it? What does it do? In sales, time is money. If you find that your team’s time is tied up in manual or administrative tasks, consider looking into a sales engagement platform. The right sales engagement platform will power outreach quality and quantity, ultimately helping your team crush their goals and boost the bottom line. In this guide, we’ll help you think through what features you should look for and what questions to ask as you begin to compare your options.
Tags : 
    
Groove
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Factory production lines know the right jig or fixture speeds production, which increases productivity. But that’s just the beginning. Well-designed tools are more ergonomic, offering both increased worker safety and productivity, as well as cost savings. Traditional machining produces heavy, costly, multi-piece tools that become an even greater liability as repetitive motion injuries erode line productivity with worker disability. Redesign means even more protracted timelines for machined parts. While essential to efficiency, accuracy and safety, jigs and fixtures are often considered a necessary evil in the overall production process. Costly, protracted timelines for machined jigs and fixtures are the culprit here, especially for the often complex designs necessary to meet unique part needs. This, along with certain complex designs that simply cannot be manufactured using traditional methods are a reality on the production floor. But there is a better way. 3D printed jigs and fixture
Tags : 
    
Stratasys EMEA
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.