environment

Results 1 - 25 of 3099Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: Dell SB     Published Date: Jul 31, 2019
Take back control of your infrastructure projects and build the business case using your own data with Dell EMC’s Live Optics. We can help create a defensible proposal, unique to your environment, using your Live Optics data. Take the guess work out of your projects and build a new infrastructure based on your actual needs. When can we set up a call to discuss?
Tags : 
    
Dell SB
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: Experian     Published Date: Aug 29, 2019
As organizations and consumers increasingly interact over digital channels, both parties must find ways to establish mutual trust. Experian’s Global Identity and Fraud Report Asia-Pacific (APAC) edition highlights that trusted online relationships are based on businesses providing both a secure environment and seamless consumer experiences. With insights from almost 6,000 APAC consumers, the report found that majority (71%) value ‘security’ as the most important element of an online experience, followed by ‘convenience’ (20%) and ‘personalisation’ (9%). Download the complete 2019 Asia-Pacific Identity and Fraud Report for more details.
Tags : 
    
Experian
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
The move to a hyperconnected, technology-centric, always-on work environment is creating increasing pressure on companies and employees to keep up in a world where change is not just constant, but ever accelerating. To succeed in this world, businesses need employees who can not only withstand challenge and uncertainty, but who embrace and thrive on the opportunities associated with change. This requires creating a culture that understand and supports the importance of well-being. Well-being is no longer a nice to have. It’s now a critical “strategy for workforce readiness.”
Tags : 
    
SAP EMEA Global
Published By: KPMG     Published Date: Oct 15, 2019
We’re seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. “Responsible” or “sustainable” finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Around the globe, voices clamoring for climate-aware investing and carbon controlsare increasing. Demand for ethical treatment of employees, customers and other stakeholders is also growing, as is indignation about poorly-managed companies. Companies are subject to an increasing set of non-financial reporting requirements relating to environmental, social and governance (ESG) factors. A swathe of new requirements will soon impact the investment and lending appetites of EU financial institutions. Coupled with increasing investor demands, these new rules could have a profound impact on companies’ ability to raise capital, within the EU and beyond.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
    
KPMG
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
    
Barracuda
Published By: Centercode     Published Date: Oct 16, 2019
Today's technology is getting more and more complex, and it's moving from the lab to homes and offices faster than ever. Increasing competition, expanding markets, and a growing expectation for seamlessness mean IoT and SaaS companies alike are looking for a thorough but fast-paced means to validate the quality of their products and releases. This e-book gives a straight-forward introduction to Customer Validation -- the modern framework for beta testing. It anchors the four key components of traditional beta (people, products, environment, and time frame) around the needs of present-day product development. This includes: establishing the building blocks for thoroughly testing interoperability, creating accurate user scenarios, carving out channels for direct customer interaction, and identifying solutions that will delight your audience.
Tags : 
    
Centercode
Published By: HERE Technologies     Published Date: Sep 23, 2019
While the retail industry has made great stri des in understanding the online journeys of consumers, it has been difficult to observe and analyze their wh ereabouts and movements offline . Advanced location intelligence enables marketers to observe consumer journeys to within meters, whether indoors or outdoors, as they move ar ound ever - changing environments, such as stores, malls, restaurants, residential addresses, landmarks, and places of interest. This eBook explores how retailers are starting to launch more targeted campaigns by using location to understand consumer behavior. Find out why location intelligence ca n bring a wide range of benefits to the entire retail industry : data - driven audience segmentation, real - time location targeting, reduced ad - spend, enhanced campaign attribution, and more.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
There are many challenging tasks when developing autonomous driving features to cope with the various changes to the environment. Often lane markings are faded or are covered with snow or dirt and can be difficult for a camera-based detection system. In this report, VSI addresses the application of HD map assets to improve the safety and performance of automated vehicle features within the context of lane keeping and trajectories. VSI has been examining applications of HD maps in our test vehicle. In a previous report, we discussed map-based Adaptive Cruise Control (ACC) using the advised speed attributes from HERE’s HD map data. In this report, we apply HERE’s HD map data to a lane keeping application and examine performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach.
Tags : 
    
HERE Technologies
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Technology empowers governments to improve how and when they reach citizens. It improves the quality and accessibility of public services, ultimately creating a more productive environment where citizens can thrive. Leveraging the cloud is one way governments can accelerate this shift, with benefits occurring first inside the institution.
Tags : 
    
Amazon Web Services EMEA
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around
Tags : 
    
Amazon Web Services EMEA
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Amazon Web Services (AWS) provides rapid access to flexible and low cost IT resources. With cloud computing, public sector organizations no longer need to make large upfront investments in hardware, or spend time and money on managing infrastructure. The goal of this whitepaper is to help you gain insight into some of the financial considerations of operating a cloud IT environment and learn how to maximize the overall value of your decision to adopt AWS.
Tags : 
    
Amazon Web Services EMEA
Published By: Workday APAC     Published Date: Oct 07, 2019
Puma works in a highly competitive environment where they need to innovate, evolve and bring products to market quickly. So they chose Workday as they wanted to streamline their processes and replace their legacy HRIS with an intuitive solution at a reduced running cost.
Tags : 
    
Workday APAC
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
IBM Services helps its customers effectively plan, manage and migrate their applications to a hybrid multicloud environment. IBM Services commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by using IBM Services for migrating and modernizing their applications to a multicloud environment. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of leveraging IBM Services for Application Migration and Modernization services for their organization. Register to learn more.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Virtualization is the standard in enterprise IT environments for consolidating servers, enhancing businstrators that reduces their Total Cost of Ownership (TCO) and helps speed the application development process. However, as improvements have been made with server technology, storage technoless continuity, and improving business agility. VMware provides an architecture for server adminiogy has become the bottleneck. Legacy storage solutions can’t keep pace with thousands of virtual machines demanding maximum IOPS along with high bandwidth at the lowest latency. Infinidat’s InfiniBox removes the storage bottleneck for VMware environments. The InfiniBox enterprise storage array delivers faster-than-all-flash performance, high availability, and capacity density at petabyte scale. This Infinidat white paper is written for VMware and storage administrators to introduce them to the integration capabilities of the InfiniBox for VMware.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Databases represent the backbone of most organizations. And Oracle databases in particular have become the mainstream data repository for most mission-critical environments. Some of the largest companies and organizations in the world rely on Oracle databases to store their most important data. The biggest challenge organizations face relative to an Oracle database is to maintain these databases at optimum performance and reliability without breaking the bank. This paper discusses the storage capabilities customers should consider when choosing storage to support an Oracle database environment.
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.