hr tech

Results 201 - 225 of 1079Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity, networking, knowledge management, enterprise applications
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql, cloud security solution, networking, security, knowledge management, enterprise applications
    
Akamai Technologies
Published By: VMware     Published Date: Jan 23, 2018
The digital workspace has arrived, and the most progressive organizations are taking action. To thrive in this digital environment, organizations need to embrace strategies that better prepare them for success in the growing digital economy. Understandably, this means working toward becoming highly mobile enterprises. Throughout this process, an organization’s technology partner choices can play a pivotal role in achieving business goals. As such, stability and scalability are taking center stage. This is why a forward-looking solution can empower an organization to move away from standalone enterprise mobility management (EMM) to the digital workspace. In this white paper, we’ll take a look at how the mobility ecosystem is evolving and how organizations can push the boundaries of enterprise mobility while making the most of their investments. For MobileIron customers making a migration decision, selecting a partner with solid leadership, stability, scalability, and steady growth wil
Tags : 
    
VMware
Published By: CA Technologies     Published Date: Nov 02, 2016
The Travis Perkins Group is a leading supplier of building materials to the UK’s building and construction industry. For more than 200 years, the company has grown to deliver more than 100,000 products through 2,000 branch and store locations nationwide. Changing market demands, shareholder expectations and competition demand that the company continually enhance its performance. Yet, changing more than 200 years of tradition can be complicated. Traditional planning practices had led the company down the road to a bureaucratic project management office (PMO), and with the introduction of agile and CA Technologies, the once controlling environment has shifted into a service-oriented centre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
In the past 20 years, Elekta has achieved measured growth through nearly a dozen acquisitions, pulling new radiotherapy, brachytherapy and magnetoencephalography technologies into the fold. To deliver the full benefit of these sophisticated devices to providers and patients, Elekta must tie them together into integrated solutions— an immense and complex undertaking that can be further complicated by regulatory compliance.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
    
CA Technologies
Published By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
microsoft, analytics, data, business impact
    
Microsoft
Published By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
    
Microsoft
Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
DevOps ist nicht mehr topaktuell. Auch Continuous Delivery oder sogar das „Shift-Left“-Paradigma ist nicht mehr als innovativ zu bezeichnen. Dieses White Paper zeigt auf, wie Sie DevOps-Tools und -Verfahren kundenorientiert einsetzen können, um einen geschäftlichen Nutzen zu erzielen. Dabei wird auf die aktuellen Herausforderungen für Unternehmen eingegangen, wenn sie versuchen, durch DevOps-Innovationen mehr als nur technische Vorteile zu realisieren. Zudem werden die Lücken aufgezeigt, die die Unternehmen in den Continuous Delivery-Ketten schließen müssen, um erfolgreich zu sein. Schließlich befasst sich dieses White Paper auch damit, wie die Themen Anwendereinbindung und Customer Experience in allen Phasen der Bereitstellungspipeline als wichtige Überlegung einbezogen werden.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
Value-based care is the predominant model for enabling the healthcare industry to control costs and deliver better information to consumers. The basic idea is that reimbursements are based on the quality of the outcome of a procedure, episode of care, use of a device or therapy. Under this model, life sciences companies are rewarded for improving health outcomes and/or reducing the costs to achieve those outcomes. It requires life sciences companies to rethink many of their processes, from R&D through the commercial phase. Navigating those momentous shifts requires that life sciences companies embrace a range of digital technologies which will enable a holistic approach to value-based care. This white paper will examine the drive for value-based care, its impact on life sciences companies and how technology platforms can address the challenges the industry is facing.
Tags : 
cognizant, life sciences, digital
    
Cognizant
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Intel     Published Date: Apr 11, 2019
To remain competitive, manufacturers must focus on achieving new growth while driving down costs. Key to achieving this is greater flexibility and a dramatic upturn in operational efficiency across the manufacturing process. One area ripe for improvement is intralogistics transportation. Many manufacturers still rely on autonomous guide vehicles (AGVs) to undertake repetitive transport tasks; but, rigid in nature, they do not support today’s demand-driven, dynamic manufacturing environments. Intelligent autonomous mobile robots (AMRs), like SEIT* from Milvus Robotics, offer a viable and cost-effective alternative. This solution brief describes how to solve business challenges through investment in innovative technologies.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay. Join guest speaker, Forrester Research VP and Principal Analyst, Boris Evelson and Oracle Analytics Senior Group Director, Jose Villacis as they discuss insights from an Oracle-commissioned study of North American enterprise analytics leaders.
Tags : 
    
Oracle Analytics
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay.
Tags : 
    
Oracle Analytics
Published By: CA Technologies     Published Date: Jun 09, 2015
Today’s organizations are challenged to be the first to market with ‘The Next Big Thing’. They must innovate with new and unique services to satisfy customer demands and differentiate themselves in the marketplace. Software drives that innovation and has turned every organization into a software organization. This Executive Brief describes how the efficient collaboration between the development and IT operations teams can bring high-quality applications to market as quickly as possible. The CA Application Delivery suite helps organizations achieve collaborative DevOps through innovative technology tools used to: •Accelerate application development by removing constraints with CA LISA® Service Virtualization. •Expedite release time with CA LISA® Release Automation. •Improve application testing and quality with CA LISA® Pathfinder
Tags : 
    
CA Technologies
Published By: Workday UK     Published Date: Jan 31, 2019
Read now to learn about three key steps drawn from the “2018 Deloitte Global Human Capital Trends” report that emerging organisations can take to attract and retain top talent, including: Redefining careers Creating more personalised performance enablement to boost employee engagement Using data-driven technology and analytics to enhance business value
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.