oc

Results 1 - 25 of 14422Sort Results By: Published Date | Title | Company Name
Published By: Lenovo UK     Published Date: Oct 01, 2019
Businesses are using hyperconverged infrastructure (HCI) to untangle todays big IT challenges. HCI can help you accelerate workloads, meet growing storage needs, gain the commercial benefits of hybrid cloud and more all with easy-to-manage building blocks.
Tags : 
    
Lenovo UK
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: SADA     Published Date: Oct 25, 2019
To compete in a digital economy, todays leaders must give their teams the right skills and tools to succeed. Made for a mobile, global workforce, G Suite unlocks teams full potential for innovation by opening up new ways of collaborating so that people can achieve more together. When teams use G Suite, they can react at a moments notice, generate breakthrough ideas, and maintain a shared purpose. Read this whitepaper to find out more.
Tags : 
    
SADA
Published By: SADA     Published Date: Oct 25, 2019
Google commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying G Suite. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of G Suite on their organizations. Google G Suite offers a set of work applications that help organizations transform their businesses. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed eight enterprise customers with years of experience using G Suite.
Tags : 
    
SADA
Published By: KPMG     Published Date: Oct 15, 2019
Were seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. Responsible or sustainable finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Around the globe, voices clamoring for climate-aware investing and carbon controlsare increasing. Demand for ethical treatment of employees, customers and other stakeholders is also growing, as is indignation about poorly-managed companies. Companies are subject to an increasing set of non-financial reporting requirements relating to environmental, social and governance (ESG) factors. A swathe of new requirements will soon impact the investment and lending appetites of EU financial institutions. Coupled with increasing investor demands, these new rules could have a profound impact on companies ability to raise capital, within the EU and beyond.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Consumers have become more educated about the value of data and cyber risks associated with it. As consumer awareness increases so does their expectations of trust and digital security. Read now KPMG's report Trust in the time of disruption to understand the cybersecurity gap that exists between consumers and organisations, and what asset management and financial services firms as a whole can do to close the trust gap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system linking those with money to invest with enterprises and activities that require funding is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of external voices demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms mindset and investment offerings is required.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Welcome to KPMGs third annual report tracking developments in Chinas pension industry. This is a topic of great economic significance. As the worlds most populous country, China has an ageing society and is developing the infrastructure to take care of a growing number of elderly people. The topic also has business significance, especially for financial companies able to find opportunities in the fast-growing pension sector. This report updates and builds on our findings from last year. That report identified sector convergence as one of the most distinct features of the Chinese pension industry, as well as highlighted several strategic themes that will influence its long-term development. In the pages that follow, we explain the most recent developments and their strategic implications.
Tags : 
    
KPMG
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. Its become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interactionwebsite visits, API calls to mobile apps, and othersis being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But thats not all: theyre also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiencesperhaps a chatbot provides instant customer assistance on your site. Whats important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by todays digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. Its all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todays assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion recordsa large majority of which included usernames and passwords.1 This wasnt new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials arent stolen just for funthey are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are botsmalicious onesbecause they enable cybercriminals to achieve scale. Thats why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: ServiceNow     Published Date: Oct 23, 2019
"ITAM teams are uniquely placed to provide a holistic view of the IT landscape through their people, processes, and tools. This holistic view improves strategic decision-making, helps break down silos, and identifies opportunities for innovationand service improvement. This whitepaper provides a roadmap to enable ITAM teams to gain seniority and contribute enhanced business value through effective stakeholder engagement."
Tags : 
    
ServiceNow
Published By: SES     Published Date: Aug 01, 2019
Descubra cmo una empresa de comunicaciones est llevando conectividad a las zonas ms remotas de Per. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avin, Axesat est entregando soluciones por satlite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cmo, en asociacin con SES Networks, la empresa puede aumentar el comercio y la conectividad en Per.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
La brecha digital est obstaculizando el uso del potencial de las regiones de pocos recursos en todo el mundo. Este artculo explora cmo una red 5G puede reducir drsticamente la brecha digital y mejorar las condiciones econmicas en todo el mundo. Descubra cmo la tecnologa satelital puede aumentar la conectividad en regiones de pocos recursos y tener un impacto positivo en la telemedicina, el empleo a distancia y las oportunidades de educacin.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Este blog de nuestro vicepresidente de Desarrollo Tecnolgico e Innovacin ofrece la opinin de un experto sobre la revolucin 5G. Descubra el impacto que tendr la arquitectura 5G sobre nuestra futura sociedad hiperconectada. Adems, explore casos de uso que incluyen comunicaciones masivas tipo mquina, comunicaciones mejoradas de banda ancha mvil y baja latencia.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Este artigo de blog, escrito por nosso VP de Desenvolvimento e Inovao Tecnolgicos, apresenta insights de especialistas sobre a revoluo da rede 5G. Descubra o impacto que a arquitetura da rede 5G ter na nossa sociedade "hiperconectada" do futuro. Conhea casos de uso como comunicaes massivas por mquina, maior largura de banda mvel e comunicaes com baixa latncia.
Tags : 
    
SES
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Workable     Published Date: Oct 09, 2019
In every organization, the recruiting process generates data: how long it took to fill one role, how many candidates progressed to the final hiring stage or how many comments hiring teams exchanged until they made a hire. Through tracking metrics, you can get tangible evidence of how successful your recruiting process is, rather than relying on intuition. In this guide, we put together everything you need to know to start making the most out of your recruiting data. Youll find: A list of common recruiting metrics to track. A detailed look into five of the most important KPIs. How to collect data and track metrics consistently over time.
Tags : 
    
Workable
Published By: SheerID     Published Date: Oct 18, 2019
Standing out in a competitive market is no easy feat. How do you make a splash? It goes beyond innovative technology or relatable brand identity. You need a customer acquisition strategy that will connect your company with the ideal audience. Creating a personalized offer for specific consumer tribessuch as the military, students, or teachersis a great start. But a manual verification process is frustrating for buyers and time-consuming for support teams. Learn how Purple used gated, personalized offers backed by instant verification, which led to: ? A 6x conversion rate ? Saving their support team 49 hours per month of phone calls ? 25:1 ROAS (Return on Ad Spend)
Tags : 
    
SheerID
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Readings survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
    
F5 Networks Singapore Pte Ltd
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee