com

Results 176 - 200 of 22463Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was — one way or another — getting into “the cloud.” There’s been a shift in customers’ pri
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-ManagingJAP.html
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-OptimazingJAP.html
Tags : 
    
Citrix Systems
Published By: List Sotheby's International Realty, Singapore     Published Date: Jun 26, 2019
Citadel-founder Ken Griffin lit up the luxury residential sector in January 2019 when he bought a super penthouse in New York City for US$240 million. This purchase followed another acquisition he made in London in which he forked out US$122 million for a 200-year old house overlooking London’s St James Park. These ultra-high-net-worth (UHNW) buyers, local or foreign, are chief executive officers (CEOs) of tech companies or investment funds, and chairmen of major multi-national corporations (MNCs). They are also collectors of trophy assets who go for nothing less than the best-in-class attributes such as location, size, views, privacy, luxurious furnishings, and architectural merit. Trophy real estate is the ultimate collectible treasure. Like buying a prized sports car or a high-value masterpiece of art, trophy residences can ignite the desires of the UHNW individuals. As such, many developers of ultra-luxury properties have conceived collectible concepts right from the planning
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: Veracode     Published Date: Jun 26, 2019
Software plays a central role in business processes and in our daily lives, and companies of all sizes and industries are building, buying and downloading more applications than ever before. However, this increased dependence on software makes the applications powering our world a prime target for cybercriminals. Applications are the No. 1 attack vector for cybercriminals and the main source of breaches. In addition, the way software is developed is changing. Contemporary application development methodologies like DevOps are increasing the speed and precision with which software is produced and deployed. The increased speed and precision have created a modern software factory akin to the manufacturing factories of past industrial revolutions.
Tags : 
    
Veracode
Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode
Published By: GFT USA, Inc.     Published Date: Jun 26, 2019
In today's continuously evolving world of technology, the growth of data consumed and analyzed at pace provides a great opportunity to gain competitive advantage. GFT and Google Cloud provide the strategy and support to tap into this opportunity so your company can stay ahead.
Tags : 
    
GFT USA, Inc.
Published By: Gigaom     Published Date: Jun 25, 2019
Join this webinar to learn how the right data management practices and intelligent archives can boost the value of data and make it reusable for new applications, becoming a tool to improve and simplify the digital transformation journey of your organization.
Tags : 
aparavi, digital transformation, data management, data compliance, data storage, data liability, data regulations, data growth, infrastructure, compliance, security policies, data integration, data protection, database security
    
Gigaom
Published By: Zscaler     Published Date: Jun 25, 2019
Una soluzione per un ambiente IT in costante evoluzione Dato questo spostamento verso cloud e mobilità, il tradizionale perimetro di sicurezza che una volta proteggeva utenti e servizi interni alla rete aziendale è ormai in gran parte scomparso. È arrivato il momento per la sicurezza di evolvere, posizionando le protezioni più vicine all’utente e ponendo una nuova enfasi su elementi quali praticità, flessibilità e affidabilità. Scopri di più sulla soluzione SDP di Zscaler in questo libro bianco.
Tags : 
    
Zscaler
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
To become more effective, enterprises must fast-track projects to digitally connect their organizations. Building value and providing compelling customer experiences at lower cost requires more than a quick technology fix; it demands a business and technological commitment to a new target operating model (TOM). This operating model should offer a way of running the organization that combines digital technologies and operational capabilities to achieve improvements in revenue, customer experience and cost. Enabling digital capabilities via the TOM is an ongoing process that requires DevOps skills and agile development techniques. This is easier to achieve with partners that have the requisite capabilities to help with the creation of new digital assets
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
Basic diagramming tools allow business users to define an initial business process and provide a good path to getting your processes off of sticky notes and into a digital format. However, if company-wide collaboration, real-time change management and integration with automation tools are important to you, a dedicated process modeling tool may be your better choice.
Tags : 
    
Group M_IBM Q3'19
Published By: Procore     Published Date: Jun 25, 2019
Download Your Copy: How We Build Now - Tracking Technology in Construction 2019 The Australian construction industry is undergoing a technical transformation and we’ve taken a snapshot of this dynamic and interesting space - examining how construction companies are adopting technologies and implementing new tech-enabled processes. Our inaugural report How We Build Now - Tracking Technology in Construction 2019 examines and tracks key elements in this fast-paced, tech-driven transition. It covers 4 main areas: Taking the Pulse: People and skills development Pick and Mixing: Technology adoption and future proofing Forging Ahead: Processes and implementation The Spirit Level: Business outlooks across industry sectors The new findings provide insight and ideas about technology adoption and how new technologies are influencing modern construction company processes.
Tags : 
    
Procore
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Instructure     Published Date: Jun 25, 2019
The How-to Guide to Developing Your Employees and Retaining Top Talent. Many organisations are finding it difficult to attract, engage and retain the right people. However, companies ranked among 2019’s top places to work all agree on one thing: ‘employee development’ is the secret sauce. Your people need more than fun perks and competitive pay - they require ongoing, personal development to be productive, loyal and engaged. This guide covers: Why ‘employee development’ is key Tips & tricks for setting your employees up for success Effective employee development must-haves How the Bridge employee development platform helps you tackle all this This guide is designed to help HR and L&D leaders to successfully engage their workforce and foster a culture of learning, development and growth. About Bridge Bridge, from the makers of Canvas, is employee development software that creates a positive employee experience and increases engagement through purposeful learning, continuous feed
Tags : 
    
Instructure
Published By: Commscope     Published Date: Jun 25, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up.
Tags : 
    
Commscope
Published By: McAfee APAC     Published Date: Jun 25, 2019
Business accelerates in the cloud. Cloud adoption expands security risks. In this report, McAfee examined the latest IaaS security and adoption trends, analysed the types of sensitive data in the cloud and how that data is shared. They’ve identified the common threats in the cloud and uncovered the largest areas of risk in cloud computing today.
Tags : 
    
McAfee APAC
Published By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
    
McAfee APAC
Published By: McAfee APAC     Published Date: Jun 25, 2019
Gartner Magic Quadrant for Cloud Access Security Brokers. Download the latest CASB MQ report that evaluates the top 13 CASB vendors based on ability to execute and completeness of vision.
Tags : 
    
McAfee APAC
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
BlackBerry Cylance commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying CylancePROTECT and CylanceOPTICS. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed a representative customer currently using CylancePROTECT and CylanceOPTICS. Read the Forrester TEI to learn more about the customer’s benefits, along with the overall ROI that was achieved.
Tags : 
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
To help you distinguish whether your cybersecurity solution is up to the task, download our infographic. It’s a comprehensive reference that will help you ensure that your security protocol is offering true protection for you, your business, and your employees.
Tags : 
    
BlackBerry Cylance
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization” uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: • The impact of the skills gap • How complexity can be the enemy of cyber resilience • Lessons learned from high achieving cyber resilient organisations • The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 24, 2019
Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. So why don’t companies feel more prepared to identify and respond to these threats? For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats – and nearly impossible to demonstrate ROI. IBM Security commissioned Forrester Consulting to evaluate the state of security complexity and the effect it is having on security efficiency and effectiveness. In the study, many respondents reported taking steps to simplify their security environments and the results are promising. Fill out this form to read more about it.
Tags : 
    
IBM APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.