increase

Results 1 - 25 of 2611Sort Results By: Published Date | Title | Company Name
Published By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: Aventri     Published Date: Apr 11, 2019
"Successful meetings management requires a wide array of skills and tools to help you meet stakeholder's expectations and reach your goals. From tools to assist with budget creation to meeting approval workflows and cost-effective venue sourcing, a great meetings management program takes a lot of effort. That's why at Aventri, we created an eBook that combines all the essential meeting management strategies into one package. Learn how to: • Efficiently source the right meeting venue • Use the right meeting management technology to increase success • Implement money saving strategies with big budget results • Measure your total meeting spend and return. In the end, you will feel confident in your abilities to implement a successful meeting management strategy at your organization."
Tags : 
    
Aventri
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
    
Dell EMC
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware
Published By: Schneider Electric     Published Date: Mar 28, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which can have both a positive and negative impact on their businesses.
Tags : 
decision-making, emerging threats, schneider electric, - colocation data center threats, colocation provider
    
Schneider Electric
Published By: Schneider Electric     Published Date: Apr 02, 2019
Organizations need resilience in the face of an increasingly broad and unpredictable risk landscape. This is especially true when it comes to energy and sustainability. Investors and customers alike recognize the effects of climate change and other factors that increase volatility. And the pressure these and other groups are applying to drive change can no longer be ignored.
Tags : 
economic growth, schneider electric
    
Schneider Electric
Published By: Intel     Published Date: Apr 11, 2019
Robots play a major role in making manufacturing processes more efficient and less labor intensive. They can help control costs and improve quality, as well as increase productivity. The complexity of robotic system design, however, creates obstacles for many manufacturers, and this is made more difficult by the need to identify and integrate subsystems from multiple vendors. NexCOBOT, a NEXCOM company, offers a flexible, modular robotics solution integrating artificial intelligence (AI) with machine vision and powered by the new Intel® Vision Accelerator Design products. The solution brings together the insight of artificial intelligence, the mobility of robotics, and the capabilities of machine vision, providing a new level of precision and optimization for manufacturing and industrial implementations
Tags : 
    
Intel
Published By: VMware     Published Date: Apr 09, 2019
More than 10,000 customers are using VMware vSAN to quickly adopt hyper-converged infrastructure to accelerate their IT modernization initiatives, reduce their total cost of ownership, and increase their businesses agility in preparation of future needs. Read some of their stories and see how hyper-converged infrastructure powered by vSAN can ease the burden of infrastructure management and create new possibilities for your business.
Tags : 
    
VMware
Published By: VMware     Published Date: Apr 09, 2019
Hyper-converged infrastructure has emerged as a breakthrough IT technology over the past several years. With the right HCI solution, IT teams can lower costs, increase agility and reduce complexity— leveraging a modern software-defined IT platform that provides a seamless path to hybrid cloud. IT continues to embrace HCI in great numbers, with the market expected to grow at a compound annual rate of 42% through 2023.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Mar 26, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Apr 11, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon increases NetFlow performance by 100%, reduces hardware and tooling costs by 50%, decreases network downtime by 30% and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can help business and enable new ideas and growth. See why ESG believes the Gigamon Visibility Platform is a critical tool for network success in today’s digital age.
Tags : 
    
Gigamon EMEA
Published By: Location3     Published Date: Feb 07, 2019
Each Location3 partner receives this customized approach as we work through the Local Search Roadmap, resulting in hyper-local optimizations targeting local consumers and queries. These efforts combine to increase online customer conversions and on-offline customer visits to your business.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local seo, local organic search, online visibility
    
Location3
Published By: Location3     Published Date: Feb 07, 2019
In our experience as franchise marketers, Local Ad Fund dollars provide a solid foundation for paid search campaigns that drive consistent, high quality-low cost, leads. However many franchisees and local business owners could be doing more to support established corporate search marketing campaigns, ultimately capturing the maximum search interest for their services within their markets, driving increased local revenue.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, local store revenue, franchise paid search
    
Location3
Published By: Location3     Published Date: Feb 07, 2019
Roughly five years ago, an industry shift occurred in franchising that saw many franchisers and their respective marketing teams hire multiple agencies, partners and vendors to conduct various marketing programs on their behalf.
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, franchise marketing, in-store revenue
    
Location3
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: MicroStrategy     Published Date: Apr 11, 2019
A&BI platforms are evolving beyond data visualization and dashboards to encompass augmented and advanced analytics. Data and analytics leaders should enable a broader set of users with new expanded capabilities to increase the business impact of their investments.
Tags : 
    
MicroStrategy
Published By: Anaplan     Published Date: Apr 02, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Apr 09, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee