data system

Results 1 - 25 of 1098Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 04, 2018
Digital transformation has become a business imperative as most aspects of economic engagement have become digital. Around the globe, businesses and government agencies are re-engineering their technology infrastructures to keep pace with customer demands, spur innovation and stay competitive in an ever-evolving digital economy. Hyper-Converged Infrastructure (HCI) systems bundle multiple technology components together into single systems, enabling IT departments to spend less time managing separate data center components and more time proactively delivering value to the business. In this white paper, we compare the portfolio offerings of Dell EMC and HPE, and highlight significant benefits to be realized when partnering with the HCI market leader: Dell EMC. Dell EMC provides a tightly integrated software ecosystem and the flexibility to run multiple workload types, providing solutions to a broader customer base than HPE.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Oracle     Published Date: May 15, 2018
More than 75% of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. To help you navigate your own journey to modernization, we’ve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : 
    
Oracle
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Windows Server 2016 is an important release in enabling IT to deliver on the promise of the third platform. It provides a path to a seamless, integrated cloud environment—incorporating public, private and hybrid models—with the software-defined data center as the hub. In migrating to this next-generation data center model, it is essential that IT leaders choose the right partner for the compute platform, as well as storage, networking and systems management
Tags : 
    
Dell PC Lifecycle
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge It is not uncommon for SAP system copies, including any post-editing, to take several days to complete. Meanwhile, testing, development and training activities come to a standstill, and the large number of manual tasks in the entire process ties up highly skilled SAP BASIS staff. Opportunity Enterprises are looking to automation as a way to accelerate SAP system copies and free up staff. However, this is only one part of the problem: What further complicates the system copy process is the need to safeguard sensitive data and manage huge data volumes while also ensuring that the data used in non-production systems adequately reflects the data in production systems so the quality of development, testing and training activities is not compromised. Benefits This white paper explains how a considerable portion of the SAP system copy process can be automated using the CA Automic Automated System Copy for SAP solution and SNP T-Bone, helping enterprises become more agile.
Tags : 
    
CA Technologies_Business_Automation
Published By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : 
call center, conversions, health, proactive
    
Evariant
Published By: Workday     Published Date: Mar 02, 2018
: Many CIOs are wary of moving data out of on-premise systems and into the cloud. But the cloud is the best choice for agility, flexibility, and data security. Read this report from CIO.com to learn about the benefits your business could experience by moving to the cloud.
Tags : 
cloud, data, data security, flexibility
    
Workday
Published By: Workday     Published Date: May 09, 2018
Operating finance and HR in silos leaves your organization with incomplete data, inconsistent metrics, and strategic uncertainty. Fortunately, you don’t have to settle for silos. Read this whitepaper to learn eight key benefits of bringing finance and HR together in one system.
Tags : 
    
Workday
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : 
mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi, value-based care, episode-of-care, mortality data, process-of-care model, hospital insights, health system insights
    
IBM Watson Health
Published By: Groove     Published Date: May 16, 2018
From equipping them with accurate data to efficiency-driving tools to impactful training, you want to find the best systems to help your reps soar. As the market floods with technology (and a lot of lofty claims), it may be tough to know what you actually need and where to start your research process to help — not hinder — your team. You’ve probably heard a lot of buzz about sales engagement platforms, and there are quite a few to choose from. But what is it? What does it do? In sales, time is money. If you find that your team’s time is tied up in manual or administrative tasks, consider looking into a sales engagement platform. The right sales engagement platform will power outreach quality and quantity, ultimately helping your team crush their goals and boost the bottom line. In this guide, we’ll help you think through what features you should look for and what questions to ask as you begin to compare your options.
Tags : 
    
Groove
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: IBM     Published Date: Jul 02, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 25, 2018
A collaboration between IBM and CLS, the largest provider of settlement and risk mitigation services for the global foreign exchange market, showed how financial institutions can reap blockchain’s benefits by managing and minimizing risks to the existing business. Instead of a wholesale approach of replacing existing systems, new functionalities were gradually embedded into current processes, moving data from legacy systems to the new blockchain solution operating in parallel. Read this report to learn more about the ongoing CLS-IBM blockchain initiative and what drives the success of its commercial implementation. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Workday UK     Published Date: Mar 08, 2018
Most organizations today lack access to company-wide analytics and data. And it’s a problem. To make smart and timely business decisions, it’s important that your organization can get to the real data that matters, and do it fast. Read the CIO.com report to learn: •The importance of having a single source of truth across your entire business •How a cloud-based system provides data you can trust •Why you need actionable, real-time data to drive decision-making
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Mar 09, 2018
The clock is ticking: A year from today, the EU’s General Data Protection Regulation (GDPR) will take effect. With that in mind, now is a good time to talk about how Workday offers tools that help customers meet their GDPR obligations. But first, here’s a brief refresher: The GDPR is an EU regulation meant to harmonize the patchwork of data protection laws in Europe. The GDPR repeals and replaces not just the current EU data protection directive, but also the Byzantine system of privacy legislation that each EU member state enacted under that directive.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Mar 15, 2018
As May 25th, 2018 approaches, many of the organisations that I speak to are choosing to modernise their HR systems to help with their compliance efforts. In particular, where organisations have a complicated mix of different HR systems and spreadsheets, with employee data spread across different databases managed by multiple security models, GDPR compliance will be more difficult. Contrast such a complicated mix of HR systems with Workday’s unified, single system approach to HR, with a single source of HR data and a single security model, and you can see why organisations are choosing to move to Workday as they work to both modernise their HR systems and move towards GDPR compliance. We hope you find this research an i
Tags : 
    
Workday UK
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee