bring

Results 1 - 25 of 1022Sort Results By: Published Date | Title | Company Name
Published By: AnalytixDS     Published Date: Mar 21, 2017
AnalytiX DS Mapping Manager is an award winning platform that has enabled organizations worldwide to meet challenges, bring wide-spread collaboration, and put structure and governance in place, regardless of the size of their architecture, data, or user base. Scalable, adaptable, and value-added through its feature rich modules, it can make a difference as to whether you see BASEL III as a challenge or an opportunity.
Tags : 
    
AnalytixDS
Published By: ROKITT     Published Date: Apr 11, 2016
Few things benefit an organization as much as information governance. Data is now one of the most valuable holdings for any business, but unfortunately in many environments much of the data is ignored and its potential value lost. Ignored data is also inherently less secure than data that’s tracked. Businesses need a way to bring hidden data out of the shadows and make it safe and useful again. Data discovery facilitates unearthing previously unknown data relationships. Mapping data flow and data lineage helps make data safe, compliant, and auditable. Good metadata makes a system more navigable. All these tools make data more accessible to staff and more useful for capitalizing on business opportunities.
Tags : 
    
ROKITT
Published By: Snowflake Computing     Published Date: Apr 19, 2016
Data warehouse as a service brings scalability and flexibility to organizations seeking to deliver data to all users and systems that need to analyze it. The ability to access and analyze data is the critical foundational element for competing in new and old industries alike. Yet, a recent survey of IT executives finds that most are still struggling— and frustrated — with widely used data analytics tools. Find out what your peers are saying, and see how your data analytics environment compares.
Tags : 
    
Snowflake Computing
Published By: Dataiku     Published Date: Feb 01, 2018
A proof of concept (POC) is a popular way for businesses to evaluate the viability of a system, product, or service to ensure it meets specific needs or sets of predefined requirements. But what does running a POC mean in practice specifically for data science? POCs should prove not just that a solution solves one particular, specific problem, but that the solution in question will provide widespread value to the company: that it's capable of bringing a data-driven perspective to a range of the business's strategic objectives. Get the 7 steps to running an efficient POC in this white paper.
Tags : 
    
Dataiku
Published By: Dataiku     Published Date: Feb 19, 2018
A proof of concept (POC) is a popular way for businesses to evaluate the viability of a system, product, or service to ensure it meets specific needs or sets of predefined requirements. But what does running a POC mean in practice specifically for data science? POCs should prove not just that a solution solves one particular, specific problem, but that the solution in question will provide widespread value to the company: that it's capable of bringing a data-driven perspective to a range of the business's strategic objectives. Get the 7 steps to running an efficient POC in this white paper.
Tags : 
    
Dataiku
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Cities are changing at a pace never before possible, bringing smart features online daily. But smart features don’t equal smart cities. That’s why aspiring smart cities are shifting from siloes of smart features to a more holistic approach that connects and makes sense of all people and things. This shift demands technology solutions that are edge-centric, cloud-enabled and data-driven, able to deliver citizen-centric outcomes now and into the future.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell SB     Published Date: Jan 24, 2019
Creators, inventors and designers across the world’s industries rely on Dell Precision workstations to expand the horizons of the possible and bring their ideas into reality. Some of the most noteworthy features of the Precision workstation family include: • A broad solution portfolio that ranges from mobile devices to rack and tower workstations • Innovative designs that enhance user experiences • Power to enable emerging technologies • The industry’s most comprehensive service and support offering, Dell ProSupport • A world-class ecosystem of displays, input devices and accessories
Tags : 
    
Dell SB
Published By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
    
PwC
Published By: PwC     Published Date: Jul 19, 2018
What if you could give every employee a blueprint for tomorrow's most-needed skills? Your teams know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here.
Tags : 
    
PwC
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
Published By: ASG Software Solutions     Published Date: Jul 20, 2009
Managing service delivery in todayís complex and dynamic business environments demands new and different approaches from IT. The explosive growth and the rate of change of information has brought particularly daunting challenges for IT that have contributed to incredibly complex underlying infrastructures. To get a true picture of all of the components necessary to support an IT or Business Service, you must access and bring together data that resides in disparate data silos throughout the enterprise.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, analytical applications, business intelligence, database development, data integration
    
ASG Software Solutions
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: SailPoint     Published Date: Feb 12, 2019
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world.
Tags : 
    
SailPoint
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Jan 12, 2016
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept