scenario

Results 1 - 25 of 261Sort Results By: Published Date | Title | Company Name
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: IBM APAC     Published Date: Sep 30, 2019
Digital technology is changing the financial services industry rapidly with automated process, AI insights, customized experiences, new operating models and next generation applications. In such a scenario how should banks innovate and stay ahead of the game? This e-book will provide you the best strategies and recommendations for modernizing your IT infrastructure and operations. You’ll learn how to lead disruption and manage rapid change for your bank, its operations and its customers. Here are the five key takeaways: • Personalize customer experiences by maximizing your data • Borrow strategies from open banking and new business models • Step up your security game • Drive innovation from the inside out • Design an agile infrastructure to support participation in new digital marketplaces Find out more in the e-book.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Oct 11, 2019
Several countries in the Asian region are experiencing strong growth in their economies, but a large part of the population of many of these countries remains unbanked. In such a scenario, Techcombank, a bank in Vietnam, knew it had to deliver a differentiated banking experience for its prospective customers. The bank had to transform its IT infrastructure and it zeroed in on IBM LinuxONE because of its ability to handle very large and variable workloads, combined with strong security and cost-efficiency. As a result, it was able to handle 4X the transactions during peak season effortlessly along with 44% lower total cost of ownership while also winning new customers. Find out more.
Tags : 
    
IBM APAC
Published By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"Principled Technologies executed four typical deployment and management scenarios using both HPE Synergy and Cisco UCS. They found that HPE Synergy saved 71.5 minutes and 86 steps, and used four fewer tools compared to Cisco UCS. In a hypothetical 200-node datacenter, that’s a total of 9 work weeks, or just over 2 months’ time savings on routine tasks."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Data is one of the most valuable assets in your enterprise. Ensuring that your data is protected, should the worst possible scenario occur, is vital. However, no single data protection tool can offer complete peace of mind. Use the right tools for each job but manage them from one place. Read this white paper to see how Hitachi Vantara takes a unified approach to modern data protection and simplifies data protection.
Tags : 
    
Hitachi Vantara
Published By: SAP     Published Date: Nov 18, 2015
This whitepaper will help you discover the business and technical scenarios that will form your digital value chain and propel your organisation forward.
Tags : 
digital, sap, sap s/4hana, digital economy, digital value, digital business, sap platform, real-time business, simplify, digital value chain, enterprise value, digital enterprise, application integration, best practices, business integration, business intelligence, virtualization, cloud computing, infrastructure
    
SAP
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Fitbit     Published Date: Jan 23, 2018
Don’t look work get in the way of being your healthiest and happiest self! There are loads of ways to stay active at work, no matter what the scenario. Desk jobs, lunch breaks, marathon business trips—we’ve got you covered. Read on to discover how to fit more exercise into your work day.
Tags : 
    
Fitbit
Published By: SAP     Published Date: Nov 16, 2017
View the Journey to the Cloud: SAP Strategy and Roadmap for Cloud and Hybrid Analytics Scenario webinar to find out leading innovations and future opportunities for your organisation.
Tags : 
    
SAP
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines current and future potential for IoT in the consumer industry. In addition, this white paper examines a set of IoT scenarios that are either available today or possible in the future.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing. (IDC defines IoT as a network of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity.) These scenarios more tightly integrate “things” with other information, processes, and even value chains. Further, we demonstrate how companies in these industries leverage technology to create business value today and disruptive opportunities tomorrow.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the IoT imperative for companies in the ENR industry. We highlight IoT scenarios now and in the future, that illustrate how the integration of “things” with data and processes can generate value for ENR companies.
Tags : 
    
SAP EMEA Global
Published By: Infosys     Published Date: May 30, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys
Published By: Dell EMC     Published Date: Nov 26, 2018
La tecnologia Dell EMC per la produzione digitale sfrutta le funzionalità combinate di workstation, HPC e storage per offrire prodotti migliori e processi di progettazione e produzione più efficienti, nonché per soddisfare le preferenze in rapida evoluzione dei clienti. La raccolta, il confronto e la sintesi di una quantità di dati sempre maggiore nell'intero ecosistema, dalla modellazione dei prodotti alle tendenze post-vendita, stanno facendo della produzione digitale una realtà potente e necessaria nello scenario della produzione. Scopri di più sulle soluzioni Dell in collaborazione con Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
La Digital Transformation è diventata l'imperativo del business dal momento che gran parte degli aspetti dell'impegno economico è ormai digitale. In tutto il mondo, le aziende e le pubbliche amministrazioni stanno riprogettando le proprie infrastrutture tecnologiche per stare al passo con le richieste dei clienti, incentivare l'innovazione e rimanere competitive in un'economia digitale in continua evoluzione. Una recente survey di PwC ha evidenziato che il 45% dei dirigenti aziendali e IT provenienti da 51 paesi ha indicato la crescita delle entrate attraverso la Digital Transformation come una delle priorità principali1. Per avere successo in questo scenario digitale caratterizzato da ritmi serrati, le aziende devono trasformare le infrastrutture IT e raggiungere così nuovi livelli di flessibilità e reattività. Allo stesso tempo, i dirigenti aziendali devono trovare un equilibrio tra il finanziamento dei principali aspetti del business e l'investimento in nuovi business e innovazioni
Tags : 
    
Dell EMC & Intel
Published By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 01, 2013
Linux has already established a solid position in the industry and can be expected to expand its footprint within all workload types, according to IDC. Furthermore, the analyst firm says customers that are using Linux today should be looking at the potential for new deployment scenarios.
Tags : 
linux, enterprise, deployment, red hat, business
    
Red Hat
Published By: Oracle     Published Date: Feb 15, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
La nostra indagine indica nel complesso che la storia di IaaS sta diventando interessante e ha un ruolo preciso in uno scenario IT in evoluzione. Ci sono ancora dubbi e preconcetti, che vanno tuttavia scemando con la graduale adozione da parte delle aziende e il manifestarsi dei primi vantaggi. Nel complesso, la tecnologia IaaS è molto più facile da integrare di quanto non si creda: infatti quasi due terzi (64%) degli utenti di lungo corso indica che la migrazione è stata più semplice del previsto. È facile prevedere che il quadro sarà sempre più positivo con l’aumentare delle aziende che adottano le nuove soluzioni IaaS avanzate ora disponibili sul mercato.
Tags : 
iaas, imparare, service, infrastructure, oracle
    
Oracle
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security, application security, email security, firewalls, internet security, network security appliance, security management
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.