app

Results 1 - 25 of 12326Sort Results By: Published Date | Title | Company Name
Published By: 02 Business     Published Date: Jan 10, 2014
Untapped Opportunity in the world of passenger services.
Tags : 
    
02 Business
Published By: Dell APAC     Published Date: Nov 20, 2019
Users are on the go, working from almost anywhere and on multiple devices, reshaping the traditional work-place. We know for you as an IT leader this means more: ? devices to provision and deploy ? end points to secure ? applications to support ? systems to manage Which results in more headaches for you and less time to focus on more important, strategic initiatives. And your role has transformed too; you’re now a critical partner of the company’s leadership. You’re thinking about bringing the best experience to your users, accelerating collaboration and maximizing productivity. You’re being tasked to help the company remain innovative. With all of these added responsibilities, thinking about the more repetitive tasks like resetting user passwords and giving access to VPN should be a thing of the past. At Dell Technologies, we understand your top priority is transforming your organization for ultimate value and efficiency.
Tags : 
    
Dell APAC
Published By: Hewlett Packard Enterprise     Published Date: Jan 14, 2020
Companies in every industry and from every corner of the world are increasingly adopting cloud storage, addressing use cases such as backup, archiving and disaster recovery. More than 96% of organizations we recently surveyed are housing at least some of their data in the cloud, up from just 65% five years before. Firms deploying storage in the cloud are looking to increase IT agility and workload scalability, while taking advantage of a more flexible, pay-as-you-go consumption model. But for enterprises and mid-sized organizations alike, the cloud journey nearly always starts on premises. A large majority of organizations still run the core of their business-critical workloads in the data center, supported by significant and proven investments in on-premises hardware, workflows and business processes that support key business apps and ensure maximum value to users and other stakeholders. Not surprisingly, IT decision makers tread carefully when it comes to considering public cloud dep
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to explore the five reasons enterprises urgently need a new application access model — one that supports a Zero Trust security framework. The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to learn the 5 reasons enterprises need a new application access model that supports a Zero Trust framework."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network. Read this white paper to learn how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers: • Simplified security • Lower latency and better performance • Fewer broken web pages and applications"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats. Read this white paper to learn how to progress your Zero Trust transformation, safeguarding users, applications — and the future of your business — with best practices including: • Isolating your network infrastructure from the public Internet • Enabling WAF to protect corporate applications • Monitoring Internet-bound traffic and activity"
Tags : 
    
Akamai Technologies
Published By: SAP Concur     Published Date: Dec 26, 2019
As we move from the digital era to the intelligent era, enterprises need to turn to the tools of the future. S/4HANA Cloud is the cornerstone of an intelligent enterprise. SAP can help. Here’s how: 1. Connecting people and data 2. Make integration easy 3. Extend your core offerings and unlock business value The winning combination of SAP S/4HANA Cloud and SAP Cloud Platform brings everything together to build the applications of the future while making the most of your existing investments today. Download the Gold Guide.
Tags : 
    
SAP Concur
Published By: Rubrik EMEA     Published Date: Dec 16, 2019
Modern businesses are rapidly embracing Microsoft Azure Cloud to fast track their digital transformation, achieve cost efficiency, and gain business agility. Join this on-demand webinar with experts from Rubrik, Microsoft, and joint customer Cranfield University for a deep-dive on how Rubrik and Microsoft Azure accelerate the cloud journey with a simple, integrated solution for data protection and application mobility across the hybrid data center. View this webinar to learn how Rubrik and Microsoft have enabled Cranfield University to: Protect, secure, and manage their entire hybrid cloud across their Microsoft environment including Hyper-V, physical Windows, and instant database recoveries with SQL Live Mount. Automate backup, recovery and archival to Azure via Rubrik's SLA policy. Lower their TCO and reduce their data center footprint by 75%.
Tags : 
    
Rubrik EMEA
Published By: Vmware     Published Date: Dec 13, 2019
What Every CIO Should Know about Security: Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the tactics they should be focusing on to protect their most valuable assets.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Dec 16, 2019
Le aziende hanno un disperato bisogno di innovazione per proteggere il proprio business e stimolare la crescita. Tuttavia le difficoltà di esecuzione sono dietro l'angolo. Il problema è il divario tra innovazione e realizzazione. Ma alla base di tutto vi è la tecnologia cloud. È il modo in cui le organizzazioni creano una Digital Foundation su cui si fonda tutto: l'infrastruttura, le app, i servizi e i dispositivi. Per questo motivo, il cloud computing gioca un ruolo fondamentale per aiutare i CIO a colmare il divario. Ecco come il cloud può supportarli in questo percorso.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Dec 16, 2019
LA SICUREZZA INFORMATICA È MINATA, MA LA SITUAZIONE È DAVVERO IRREVERSIBILE? LEGGI IL QUADRO DI SINTESI DI FORBES. Il settore della sicurezza IT ha deluso i suoi clienti. Viviamo in un mondo molto più complesso, caratterizzato da sempre più interazioni, dispositivi connessi, sensori, lavoratori remoti e dal cloud che hanno contribuito a incrementare in modo esponenziale la superficie di attacco. Ciò pone dei dubbi sull'effettiva capacità delle aziende di proteggersi in quest'era digitale più sofisticata. Per un approfondimento su come la tua azienda può rimanere un passo avanti alle minacce informatiche, leggi il nostro report di Forbes Insights.
Tags : 
    
Vmware
Published By: Dassault Systèmes     Published Date: Nov 11, 2019
"The term Value Network describes enterprises that truly connect into a network of partners that collaborate and communicate with lightning speed and agility. The supply chain is now overshadowed by interconnected Value Networks. One example for Value networks applications is the digital twin, where the physical environment is replicated in a virtual model to harmonize new product design, process design and manufacturing design with planning, logistics, service and execution. When the virtual world and real world truly work together, we are able to speed up decision-making, reduce risk and cost, deliver great customer experiences, and minimize waste to make businesses more sustainable. Dassault Systèmes DELMIA,powered by the 3DEXPERIENCE platform, delivers the solutions to industries and service providers to transform their operations and orchestrate their entire Value Network."
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Nov 12, 2019
The Life Sciences industry has changed significantly over the past 10 years. With a view to developing new, more effective treatments, industry leaders are exploring new therapeutic areas and approaches like biologics and precision medicine. To address this shift, pharmaceutical and medical devices manufacturers look to connect systems, people and data - characterized by more predictive and adoptive facilities that leverage machine learning, 3D modeling, Industrial Internet of Things (IIOT), digital twin, and augmented reality. This eBook explains the main challenges of manufacturing and explores 5 manufacturing experiences that disrupt the future of manufacturing in the Life Sciences industry.
Tags : 
iiot, medical device, life sciences, machine learning, 3d modeling, digital twin
    
Dassault Systèmes
Published By: Schneider Electric     Published Date: Jan 09, 2020
"Medium Voltage protection relays with a focus on safety and cyber security. Easy to use for panel builders, system integrators and end users. From overcurrent to differential protection with arc flash protection, LPCTs, LPVTs, redundant Ethernet communication and IEC 61850. Easergy P5 is our latest protection relay for demanding medium-voltage applications. It offers best-in-class safety, security, reliability, and connectivity. The Easergy P5 is part of the PowerLogic range of power monitoring and control solutions and has been built on more than 100 years of experience in protection relays."
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
Arc faults in low voltage electrical installations within buildings pose significant safety risks. Electric arcs in conductors and connections are not detected by existing protective devices such as circuit-breakers or residual current devices (RCDs), even though these arcs cause fires. To minimize the threat of electrical installation-related fires, electricians, contractors and building occupants need to consider deploying new Arc Fault Detection Devices (AFDD). This paper discusses new break-through in the field of electrical protection, and identifies critical application areas where AFDDs enhance safety
Tags : 
    
Schneider Electric
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed-breach world. Credential theft is the leading attack type for causing a data breach, and bots are the driving force behind the majority of them. To defend against credential stuffing, prioritizing secure access and bot protection needs to be part of every organization’s security strategy.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
The rise of microservices has been a remarkable advancement in application development and deployment. Moving to a microservices-based approach makes app development faster and easier to manage, requiring fewer people to implement more new features. Microservices are a critical part of a number of significant advancements that are changing the nature of how we work. Agile software development techniques, moving applications to the cloud, DevOps culture, continuous integration and continuous deployment (CI/CD), and the use of containers are all being used alongside microservices to revolutionize application development and delivery. In this ebook, you’ll take away with pro-tips on how to solve many potential development problems before you even start writing code.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Workday     Published Date: Dec 19, 2019
Now more than ever, it's critical to keep employees engaged and happy at every stage of their journey. The right technology gives you the tools to make that happen. View this infographic to see how a complete approach to employee engagement – from recruiting and hiring to onboarding and career development – helps create a winning experience.
Tags : 
    
Workday
Published By: Hewlett Packard Enterprise     Published Date: Nov 20, 2019
Traditional networks can’t deliver modern experiences The IT ecosystem is changing. Today’s technology leaders must oversee a department that supports more customers, remote workers, BYOD policies, and IoT devices. They must also deliver cloud, video, collaboration, and other bandwidth-hungry apps that today’s users crave. Supporting these new technologies and the demands of modern users is crushing today’s networks. To offer the best user experience, no matter the location or device, IT leaders need a modern networking infrastructure that successfully delivers these latest technology advances.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 22, 2019
Traditional networks can’t deliver modern experiences. The IT ecosystem is changing. Today’s technology leaders must oversee a department that supports more customers, remote workers, BYOD policies, and IoT devices. They must also deliver cloud, video, collaboration, and other bandwidth-hungry apps that today’s users crave. Supporting these new technologies and the demands of modern users is crushing today’s networks. To offer the best user experience, no matter the location or device, IT leaders need a modern networking infrastructure that successfully delivers these latest technology advances.
Tags : 
    
Hewlett Packard Enterprise
Published By: Group M_IBM Q1'20     Published Date: Jan 14, 2020
Ten years ago, the journey began to find a flexible, versatile approach to build a central data store where all enterprise data could reside. The solution was the data lake — a general-purpose data storage environment that would store practically any type of data. It would also allow business analysts and data scientists to apply the most appropriate analytics engines and tools to each data set, in its original location. As these data lakes began to grow, a set of problems became apparent. While the technology was physically capable of scaling to capture, store and analyze vast and varied collections of structured and unstructured data, too little attention was paid to the practicalities of how to embed these capabilities into business workflows. Today, many organizations have recognized their failures, have changed leadership teams for the data lake implementation and are launching a second, third or even fourth attempt to implement a data lake successfully – this time leading with da
Tags : 
    
Group M_IBM Q1'20
Published By: Salesforce     Published Date: Dec 18, 2019
With Salesforce, building amazing customer experiences is everyone’s business — declarative and technical developers alike. Yes, with Salesforce anyone can build anything from authenticated websites, branded partner portals, published mobile apps, to high-fidelity applications. It’s about transforming your customer experience strategy so you can easily connect with your customers in new and innovative ways. Get started here. Get to know these four tools for declarative builders and technical developers — a full suite of solutions that can help you to build high-fidelity, business intelligent websites and mobile apps.
Tags : 
    
Salesforce
Published By: Salesforce     Published Date: Dec 18, 2019
IDC interviewed organizations using the Salesforce Lightning Platform (Lightning Platform) to understand its impact on their application development activities, including application development by line-of-business (LOB) users. These Salesforce customers are creating significant value by enabling delivery of timely and highly relevant new applications and features to the business. IDC’s analysis shows that study participants will realize value worth an average of $181,900 per 100 internal users of applications developed on the Lightning Platform ($13.67 million per organization) by: Enabling line-of-business users to deliver enhancements and new features Accelerating development life cycles for IT developers, thereby helping organizations better address business opportunities Improving the quality and functionality of new applications and features, which bolster employee productivity levels Requiring less IT staff time for management and support, freeing up IT resources for other busi
Tags : 
    
Salesforce
Published By: A-lign     Published Date: Dec 04, 2019
When preparing for breaches, companies should think in terms of “WHEN a breach happens, we will do this” instead of “We will do this IF a breach happens.” As data breaches are being discovered and reported more frequently, it is critical for organizations to recognize that establishing and implementing a security breach response plan is an integral part of their cybersecurity preparedness.
Tags : 
    
A-lign
Published By: A-lign     Published Date: Dec 04, 2019
The Cybersecurity Landscape As we look at the breach landscape, it becomes apparent that the need for continued and expanded security training, as well as optimizing the policies and procedures in place to protect information becomes increasingly necessary.
Tags : 
    
A-lign
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.