companies

Results 201 - 225 of 3291Sort Results By: Published Date | Title | Company Name
Published By: B Channels     Published Date: May 01, 2018
All technology companies are continuing their investment in IoT technologies: targeting technology verticals or market segments like Smart Homes or IIoT. They all need partners and alliances to expand in these verticalized markets. This post looks at who, where and the implications of IoT expansion.
Tags : 
    
B Channels
Published By: KPMG     Published Date: Nov 13, 2018
Our research has identified a group of digital organisation using technologies more effectively to achieve better, quicker and more certain returns. Read this report to discover: how board priorities for digital leaders are different to those in average companies the three characteristics that mark out stressful digital strategies in leading organisations why – and how – the CIO can become the agent for digital change
Tags : 
    
KPMG
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: SAP Ariba     Published Date: Oct 11, 2018
Today's supply chains typically include multiple partners, with services and sourcing managed across several organizations and across the world. Companies are increasing their use of third-party suppliers in the execution of key strategic imperatives. This leads to complexity in the supply chain and increased scale and intensity of operations, all of which contribute to global warming.
Tags : 
    
SAP Ariba
Published By: SAP Ariba     Published Date: Oct 11, 2018
For years, high-tech companies have relied on manual, linear, design-to-deliver processes when selecting, managing, and collaborating with suppliers of components and raw materials. But the digital marketplace has transformed the nature of how business gets done. Digital networks are disrupting business and changing the nature of direct spend management – and just in time to deliver new efficiencies and cost savings needed to compete in today’s complex marketplace.
Tags : 
    
SAP Ariba
Published By: SAP Ariba     Published Date: Oct 11, 2018
Over the next 10 years, companies will face more opportunity and disruption than ever before. Digital transformation is already helping companies redefine their business models, operating processes, and work – and this trend will accelerate as powerful technologies mature. Given that up to 65% of the value of a company’s products or services is derived from its suppliers1, procurement will play a leading role in enabling this transformation.
Tags : 
    
SAP Ariba
Published By: insightsoftware     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line.
Tags : 
    
insightsoftware
Published By: SmartLink Health     Published Date: Oct 25, 2018
Payer contracts, relationships, and a strong service portfolio give your lab a license to hunt and an opportunity to compete. But lack of EHR integration continues to be a barrier for independent labs and a differentiator for the largest lab companies. In this webinar, you’ll discover a new, affordable, and innovative lab-to-EHR integration approach that eliminates the need for HL-7 interfaces and can help you: • Reduce incomplete lab orders and associated labor costs • Improve customer satisfaction and “stickiness” in your accounts • Grow both new and existing customer revenue
Tags : 
    
SmartLink Health
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted. Download this whitepaper to learn more about how Flash Storage powered by Intel® Xeon® processor fuels IT transformations below
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC Storage
Published By: Dell DnCP     Published Date: Nov 20, 2018
As companies of all types and sizes struggle to survive and thrive in highly competitive markets, increasing employee productivity can provide a crucial edge. Even small gains, multiplied across all employees, can drive considerable growth. The less quantifiable benefits can be even greater, as happier, more productive employees are far more likely to deliver exceptional customer experiences — a key to success in the age of the customer. Find out how to achieve better employee and customer experiences.
Tags : 
    
Dell DnCP
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In today’s hypercompetitive environment, companies can’t afford to lag behind when it comes to the quality of their products. And management can’t lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers’ measurement and inspection arsenals. It’s an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your company’s measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems
Published By: IBM APAC     Published Date: Nov 22, 2017
Using IBM Watson’s cognitive capabilities, companies can quickly differentiate their customer service quality by being more pro active and responsive to customer needs. Simply put, chatbots and virtual agents are the future of customer interactions. Building apps from scratch that incorporate natural language processing, speech to text recognition, visual recognition, analytics, and artificial intelligence requires broad expertise in these disciplines, large staffs, and a huge financial commitment. Making use of IBM Watson cognitive services brings these capabilities in-house quickly and without the capital investment that would be needed to develop the technologies within an organization.
Tags : 
decision making, deeper data, insights, cognitive, analytics, ibm, watson, virtual agents
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in today’s marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. You’ll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"According to Forrester, the right engagement model can help companies achieve double-digit growth. Simply put, establishing trust through differentiated and secure digital experiences is key to competing in today’s marketplace. Achieve the necessary balance and your company wins. This handbook is designed to start you on the road to achieving this equilibrium by creating a virtuous circle of interaction with your customers. You’ll learn: - What defines world-class digital experiences - How to balance data, experience, and security - Real-world success stories and takeaways"
Tags : 
    
Akamai Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.