it function

Results 1 - 25 of 908Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Jul 19, 2019
Disruption to data availability has the ability to cripple an organisation, and in the consumer goods market, restricted access to data could cause goods to take longer to get to market. To prepare for data outages, it is imperative that businesses have effective backup and recovery solutions in place to minimise downtime and maintain functionality. This case study examines how PT Wings Surya, a leader in the Indonesian consumer goods market, was able to increase business uptime, cut the time taken to run backup jobs from 8 to just 2 hours, and reduce backup costs by 60%.
Tags : 
    
IBM APAC
Published By: Expert System     Published Date: Jul 18, 2019
Although computers are better when it comes to processing and making calculations, they haven’t been able to accomplish some of the most basic human tasks, until now. Thanks to cognitive computing, machines are bringing human-like intelligence to many business applications, including big data. So, what is cognitive computing? According to Forbes, “cognitive computing comes from a mashup of cognitive science—the study of the human brain and how it functions—and computer science.” This definition is a good place to start. However, to really understand what cognitive computing is, we have to go a little deeper.
Tags : 
    
Expert System
Published By: Canon Solutions America     Published Date: Jul 15, 2019
It’s hard to imagine running a school without printers and multifunction devices. But you should know they can put your students’ personal data at risk. Learn how you can help your school avoid the financial, legal, and social consequences of data breach.
Tags : 
    
Canon Solutions America
Published By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
    
ETQ
Published By: ETQ     Published Date: Jul 10, 2019
Quality professionals recognize that streamlining processes can deliver significant returns, but many are unsure where or how to start. With dozens or even hundreds of processes, automating them all can seem overwhelming. In this white paper you'll learn: The three most important quality functions to automate for process excellence Strategies for streamlining your quality process so you can turn insight into action Tips for choosing a flexible platform that harnesses creative problem-solving.
Tags : 
    
ETQ
Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
    
NetApp APAC
Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Veracode     Published Date: Jul 01, 2019
The demand on software development teams is greater than ever. With the cultural move towards DevOps, the implementation of CI/CD systems, and the desire to operate in an agile manner, developers are being asked to push out more software - and in shorter periods of time - than ever before. In turn, developers are increasingly relying on open source libraries, or pre-built pieces of code available online, which allow them to add functionality to their code without having to build it from scratch. As a result, software today is rarely completely made of first-party code and is more often "assembled" from other sources.
Tags : 
    
Veracode
Published By: Red Hat APAC     Published Date: Jun 27, 2019
"To be competitive today, you must deploy robust, innovative applications that meet your customers’ needs. Many times, those new apps depend on existing apps and data sources to function. The success of your apps—not to mention your ability to compete—depends on your ability to integrate new services with old systems and technologies. By integrating with Red Hat Fuse, these organizations achieved: - An average three-year ROI of 520%. - A payback time of six months. - 5.5x more apps integrated per year. - 31% better app performance. Download the IDC whitepaper to learn more, and see how Red Hat Fuse can make your apps more efficient and productive."
Tags : 
    
Red Hat APAC
Published By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling today’s biggest content management challenges. Learn how they’re thinking, what they see as opportunities, and how they’re planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options — making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling today’s biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
The fight for customer attention is a daily struggle, but it doesn’t have to be. With a data management platform (DMP), you can be confident that the experiences you deliver are the ones your customers want and expect. Learn: o What a DMP can do for you o The three functions of a DMP o How Adobe Audience Manager can help
Tags : 
    
Adobe
Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization” uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: • The impact of the skills gap • How complexity can be the enemy of cyber resilience • Lessons learned from high achieving cyber resilient organisations • The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2B Commerce Suites, Q3 2018 report. Forrester evaluated the 12 most significant B2B commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and [SAP] C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength, fully functional commerce platform.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
    
Google - SAP
Published By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2C Commerce Suites, Q3 2018 report. Forrester evaluated the 11 most significant B2C commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and SAP C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength full function commerce platform that is in wide use across several industry verticals.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
    
Google - SAP
Published By: Genesys     Published Date: Jun 19, 2019
Successfully managing a contact center requires a collaborative, multidisciplinary approach to handle a broad range of operational and tactical tasks. Planning, day-to-day operations and quality management must be seamlessly orchestrated, along with human resources functions like recruitment, learning and development, and employee scheduling. Read this executive brief to learn how to transition to an AI strategy that can take your team – and business results – to the next level. See how you can: Create an AI strategy with a single data model that includes routing, interaction analytics, forecasting/scheduling and predictive engagement Harness the power of your data to align customers with the best resource Drive employee effectiveness by ensuring you hire the right people and manage their performance to drive their success over the long term
Tags : 
    
Genesys
Published By: Red Hat     Published Date: Jun 19, 2019
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by:
Tags : 
    
Red Hat
Published By: Evariant     Published Date: Jun 18, 2019
In healthcare, a traditional call center experience can feel much like calling a cable company—detached, dull, frustrating. Personalized engagement is critical to the future of healthcare, but call center agents are often not given the tools to meet consumer expectations. Agents may be limited to a basic set of functions with minimal insights on patient journeys. Download this infographic which highlights the enormous opportunity healthcare providers have to modernize their approach to the call centers.
Tags : 
    
Evariant
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee