rim

Results 1 - 25 of 1470Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Nov 14, 2019
Infrastructure considerations for IT leaders By 2020, deep learning will have reached a fundamentally different stage of maturity. Deployment and adoption will no longer be confined to experimentation, becoming a core part of day-to-day business operations across most fields of research and industries. Why? Because advancements in the speed and accuracy of the hardware and software that underpin deep learning workloads have made it both viable and cost-effective. Much of this added value will be generated by deep learning inference – that is, using a model to infer something about data it has never seen before. Models can be deployed in the cloud or data center, but more and more we will see them on end devices like cameras and phones. Intel predicts that there will be a shift in the ratio between cycles of inference and training from 1:1 in the early days of deep learning, to well over 5:1 by 2020¹. Intel calls this the shift to ‘inference at scale’ and, with inference also taking up
Tags : 
    
Intel
Published By: pepperjam     Published Date: Nov 08, 2019
Learn what sophisticated marketers have long known: Affiliate ranks #1 in customer acquisition and is a key revenue driver.
Tags : 
    
pepperjam
Published By: Oracle     Published Date: Sep 26, 2019
Marketing is not getting more difficult because of data— it’s actually getting easier. In the old days you needed to guess who your audience was and plan in advance what you wanted to say and wait far too long to see if it worked. Those days are long gone—now you can determine EXACTLY who your audience is, deliver a relevant, personalized message in a nanosecond, and find out almost immediately whether it worked! You no longer have to live by the spray-and-pray method— you can be tactical in your delivery. Marketing today is data-driven and uses a wealth of insights and connection points to engage with consumers one to one. Data about our customers and prospects gives us the ability to deliver the right message to the right audience at the right time. That’s audience targeting, and it’s far deeper than demo targeting, even though targeting by demo is a nice place to start. That said, the sheer volume of data and technology can be overwhelming. Cut through the noise and tackle the ba
Tags : 
    
Oracle
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more. "The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement exec
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 15, 2019
Le soluzioni enterprise di INFINIDAT® sono basate su un’architettura di storage unica e brevettata INFINIDAT – Un insieme completo di funzioni di software-de?ned storage (SDS) integrate con il migliore hardware commerciale presente sul mercato. Attraverso l’integrazione del software con una piattaforma hardware di riferimento ampiamente testata, INFINIDAT fornisce la prima vera soluzione SDS di classe enterprise.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
La trasformazione digitale è un acceleratore di business che, fra le altre cose, sta portando ad un aumento della domanda per ottenere prestazioni migliori e una maggiore capacità di archiviazione. Tale domanda fa sì che le aziende debbano riesaminare la loro strategia di storage, poiché l’aumento della capacità storage non coincide con i sempre minori budget a disposizione del settore IT. Per poter sostenere lo sviluppo della propria attività commerciale e rimanere competitivi all’interno di un mercato digitale globale, ai CIO viene chiesto sempre più spesso di “fare di più con meno risorse” e, al contempo, di migliorare prestazioni e disponibilità.
Tags : 
    
Infinidat EMEA
Published By: Alert Logic     Published Date: Oct 25, 2019
SMB Threatscape 2019 Cybercriminals are increasingly targeting small and mid-sized businesses with limited budgets and staff constraints. Get the nine key insights that can help keep you secure. Read the findings from our analysis of 1.3 petabytes of data, 8.2 million verified incidents, and over 10.2 trillion log messages across 4,000+ organizations.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: Oct 25, 2019
As the variety and sophistication of exploits continues to grow, even large, mature Fortune 100 security teams feel unprotected. How well are your security systems and tools doing blocking threats from the most sophisticated cybercriminals? Download this resource to learn about a threat management approach designed to address today’s evolving cybersecurity threats, expanding compliance risks, and all-too-common resource constraints.
Tags : 
    
Alert Logic
Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver
Published By: Viventium     Published Date: Nov 14, 2019
“A happy worker is a productive worker.” It’s a core belief that has driven Mrs. G’s Services for almost 20 years. A privately owned home health care agency, Mrs. G’s has about 450 workers and three offices that service the New York metropolitan area. Priding itself on employing passionate people and providing compassionate care, the organization’s primary mission is to provide comprehensive and quality service. Problem was, not all of the agency’s workers were happy. From caregivers to fulltime employees, people throughout Mrs. G’s were frustrated by the agency’s payroll solution. It wasn’t just that the payroll software was insufficient and sometimes downright ineffective. It wasn’t just that it persistently failed to meet the needs of agency management and the company’s caregivers. It was that a routine function — like payroll! — was violating the company’s core belief and making it more difficult for Mrs. G’s to achieve its mission.
Tags : 
    
Viventium
Published By: ALE USA, Inc     Published Date: Nov 01, 2019
Today, most students in primary and secondary schools have never experienced life without the internet or smartphones. This reality is reflected in the classroom where digital learning processes and experiences are enhancing traditional textbooks and upending conventional classroom teaching methods. Online lessons, testing and assessments are now part of most curricula. Laptops, tablets and smartphones have become primary instruction tools for students, who are downloading an increasing number of online apps to enhance their digital learning experience. Teachers and lecturers alike rely on robust, reliable Wi-Fi across their campus to access the full range of teaching tools available to them.
Tags : 
    
ALE USA, Inc
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Masergy     Published Date: Nov 04, 2019
Managed SD-WAN services have been around for years, but Ovum is now seeing solutions evolve and go beyond the early adopter phase. With the integration of new features and additional value-added services, enterprises today see simplified SD-WAN solutions. This white paper will share how these solutions have evolved and matured, explore the major benefits from the new SD-WAN solutions, and examine why enterprises should feel more confident about adopting SD-WAN now.
Tags : 
    
Masergy
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: Infosys     Published Date: Nov 04, 2019
Utilities are embracing new technologies to modernize their electric grid and cope with the changing load profiles created by distributed energy resources such as solar, electric vehicles and battery storage. The path forward for trailblazers is often the most challenging. In the spirit of the early pioneers, this paper attempts to share some of the lessons learned. In previous papers we discussed the case for grid modernization and grid modernization capabilities. In this paper we will discuss the top 10 lessons learned from pioneering grid modernization efforts in order to assist others on their journey. While such efforts span both grid operations and planning and engineering, this paper focuses primarily on planning and engineering.
Tags : 
    
Infosys
Published By: Menlo Security     Published Date: Nov 11, 2019
"Internet Isolation Provides 100% Protection from Web-based Attacks without Changing the Native User Experience. The breach of 1.5 million patient records—including patient data for the prime minister—at SingHealth, Singapore’s largest group of healthcare institutions, has been called the most serious breach of personal data in the nation’s history. The breach was of great concern and created a chill of fear in many public and private organizations throughout the region and the world. If Singapore, one of the world’s most connected countries, as well as one of the world’s most cybersecure, could have a breach of this magnitude perpetrated against a national institution, why couldn’t this happen to any organization, anywhere? In This White Paper We Will Discuss: - What is the network separation concept? - Who uses network separation? - What is Isolation and how it can separation networks?"
Tags : 
    
Menlo Security
Published By: MuleSoft     Published Date: Oct 22, 2019
As the primary drivers of digital transformation, Chief Information Officers (CIOs) must stay ahead of emerging technology and assess the value to their organizations. This report covers the top technology trends that will determine the business landscape in 2020. What you'll learn The 7 trends experts forecast for 2020 using data from over 850 global IT leaders, 9,000 consumers, and third-party findings. Case studies of each trend highlighting how CIOs of leading global companies are starting – or already driving – these trends. Recommendations to use these trends to fuel digital transformation in your organization.
Tags : 
    
MuleSoft
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, networking, it management, knowledge management, enterprise applications
    
Adlib Software
Published By: Marketo     Published Date: Sep 03, 2019
It’s critical for marketing teams to adopt experimentation to continually improve and help prove their impact to their organizations. Unfortunately, many teams do not know how to deploy scientific tests correctly in the marketing process. Most do not use an iterative design approach, while many others fail to create the right kind of environment to encourage curiosity and experimentation. What must marketers do to build a culture of innovation, and test their way to successful engagement marketing? Download Marketing Experiments in an Age of Accountability to learn about: Accountability and experimentation living in harmony The experimental marketing team Experimentation basics and how-to’s Real experiments and their results Where and how to use experiments
Tags : 
    
Marketo
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
123Together
Published By: VoIP Logic     Published Date: Sep 11, 2012
This white paper provides a primer on the considerations around designing and launching Enterprise VoIP Hosted PBX services.
Tags : 
    
VoIP Logic
Published By: Inside HPC Media LLC     Published Date: Nov 11, 2019
In a world characterized by ever-increasing generation and consumption of digital information, the ability to analyze data to find insights in real time has become a competitive advantage. An advanced network must address how best to transfer growing amounts of data quickly and efficiently, and how to perform analysis on that data on-the-fly. The Co-Design technology transition has revolutionized the industry, clearly illustrating that the traditional CPU-centric data center architecture, wherein as many functions as possible are onloaded onto the CPU, is outdated. The transition to the new data-centric architecture requires that today’s networks must be fast and they must be efficient, which means they must offload as many functions as possible from the CPU to other places in the network, enabling the CPU to focus on its primary role of handling the compute.
Tags : 
    
Inside HPC Media LLC
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.