cti

Results 1 - 25 of 18620Sort Results By: Published Date | Title | Company Name
Published By: FICO     Published Date: Jul 30, 2012
Predictive analytics are a powerful tool for detecting insurance claims fraud with greater accuracy. We'll show you how to determine whether you're making the best possible use of predictive analytics in claims reviews to protect against fraud.
Tags : 
    
FICO
Published By: Rainbow International     Published Date: Oct 03, 2012
The Code of Values serves as a set of universal guidelines to which all employees adhere. This applies at the corporate office, every individual franchise location and on every job and customer interaction.
Tags : 
    
Rainbow International
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
Discover the transformational power of intelligent storage. A company’s competitive success depends greatly on how well it harnesses the value of its data. However, it can be challenging to keep pace with the increases in the scale of data being generated, as well as users’ demands for accessibility. Additionally, maximizing the value of digital information requires data to be leveraged at both the optimal time and the optimal place. With HPE’s intelligent storage portfolio, organizations can modernize their IT to better understand their customers, run more agile IT functions, and improve logistical operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
"Customers in the midst of digital transformation look first to the public cloud when seeking dramatic simplification, cost, utilization and flexibility advantages for their new application workloads. But using public cloud comes with its own challenges. It’s often not as easy as advertised. And it’s not always possible or practical for enterprises to retire their traditional, on-premises enterprise system still running the company’s most mission-critical workloads. Hybrid IT – a balanced combination of traditional infrastructure, private cloud and public cloud – is the answer. "
Tags : 
    
Hewlett Packard Enterprise
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
Le moulage à modèle perdu est une méthode de fabrication précise qui apporte de la valeur ajoutée dans tous les secteurs, des pièces mécaniques, automobiles et aérospatiales aux traitements dentaires, bijoux et sculptures complexes. Pendant des siècles, les pièces coulées lisses et précises ont été obtenues au prix de coûts élevés et de longs délais de modèles de moulage. À présent, l'évolution des pièces s'accélère de manière spectaculaire dans de nombreux secteurs, ce qui se traduit par des cycles de vie des produits plus courts et des volumes de pièces moulées plus faibles entre les cycles. L'attente de l'outillage pour les pièces obsolètes destinées aux avions vieillissants entraîne également des retards dans leur réparation, ce qui coûte du temps et de l'argent. La demande d'une production en fonderie plus rapide augmente dans tous les secteurs et les fonderies doivent être prêtes à réagir.
Tags : 
    
3D Systems
Published By: Global Payments     Published Date: May 02, 2019
Doing business across borders presents a whole host of unfamiliar challenges to today’s merchant. As technological advancement and increasing globalization unlock international markets, it’s tempting to imagine that a business model successful in one region can simply be transplanted into another. Not so. The logistics of domestic and international transactions have changed, and so too have customer expectations and preferences. Customer and merchants pain points have transformed and multiplied. In this report, we explore some of the core challenges businesses today face in their quest to succeed in global commerce. We offer an overview of how unified commerce can both resolve these issues and offer new advantages and standards of best practice, enabling your business to meet the demands of tomorrow’s customer, no matter their location, preferred payment method, and mode of contact.
Tags : 
unified commerce, global commerce, payment convenience, payment speed, global payments technology, retail, wechat pay, alipay, chinese wallets, mobile payments, international payment solutions, international payment systems, payments, online payments, omnichannel commerce
    
Global Payments
Published By: 3D Systems     Published Date: May 15, 2019
La technologie de Frittage sélectif par laser (SLS) est au cœur d'une tendance croissante à la fabrication personnalisée de masse et au prototypage fonctionnel. La disponibilité de technologies de fabrication additive, de matériaux et de finitions adaptés transforme la fabrication. La fabrication thermoplastique numérique directe à partir de données numériques offre une qualité exceptionnelle tout en ouvrant la porte à de nouveaux paramètres de conception que n'autorise pas le moulage par injection.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
Selective Laser Sintering (SLS) technology is at the heart of a growing trend in mass custom manufacturing as well as functional prototyping. The right additive technologies, materials and finishes are transforming manufacturing. Digital-direct thermoplastic manufacturing offers exceptional quality while opening the door to novel design parameters not possible with injection molding. Thermoplastic additive manufacturing also bypasses the long lead time and up-front investment in injection molding tooling. If you measure your finished parts on the three dimensions: quality, time to market, and cost per cubic inch, in many situations industrial SLS offers a better total value proposition.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
Published By: LogMeIn     Published Date: Apr 23, 2019
By leveraging the power of AI, companies gain the ability to consolidate and refine answers to questions in one central repository.
Tags : 
    
LogMeIn
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: Instructure     Published Date: May 17, 2019
At Bridge, we know that a big problem facing sales leaders is not being able to onboard or train reps quickly enough to reach targets. In fact, it takes 50% of new reps 6 to 10 months to contribute to quotas. This guide is for sales leaders looking to elevate their teams and realise faster, more effective onboarding from 'Day One'. It helps at every step in the onboarding process, from hiring to providing reps with continuous learning.
Tags : 
    
Instructure
Published By: ServiceNow     Published Date: May 14, 2019
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 14, 2019
Behind every successful CMDB deployment is a detailed configuration management plan for implementing, designing, and sustaining a configuration management capability. Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today.
Tags : 
    
ServiceNow
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.