identify

Results 26 - 50 of 1100Sort Results By: Published Date | Title | Company Name
Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.
Published By: SAP     Published Date: May 18, 2014
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies’ march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : 
it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 29, 2017
IT executives are in one of the most dynamic, challenging business environments of all time. The business expects speed; the IT function strives to keep up while pursuing innovation and efficiency. Many CIOs recognize that cloud is a possible solution to achieving both but they are uncertain about the best way to get there. Whether your company seeks to modernize IT, fuel innovation or accelerate growth, you’ll find that by identifying the most appropriate cloud journey for your organization, you can determine the best potential entry points to cloud migration as well as identify, prepare and prevent possible roadblocks. And, you’ll discover how the right cloud platform and partner can enable your success by leveraging different layers of the cloud to reach your desired business outcomes—and ultimately achieve true business transformation.
Tags : 
    
Oracle
Published By: Cisco EMEA     Published Date: Nov 08, 2018
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third party perspective is based on our own hands on testing as well as on interviews with customers who use these products in production environments.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
There are quite a few things that your customers just aren’t telling you. But since you aren’t a telepath and you don’t own a Cerebro, the only thing you can do is wait for them to come to you with it. But not anymore. In this whitepaper, you'll learn the most important things that your support team should already know, but customers will never tell you, like: - Why you should design intelligence into your self-service experience - When you should resort to analytics and when "gut-feel" helps - How you can proactively manage, and prevent customer frustrations - What your core support bottlenecks are, and how to identify them - How to set a "Priority" driven support work-flow
Tags : 
    
Freshdesk
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
A fresh approach to cloud-based website load testing is proving more effective in identifying and isolating application performance anomalies.
Tags : 
    
HP Enterprise Business
Published By: HP Enterprise Business     Published Date: Jan 27, 2017
HPE StormRunner Load is a cloud based performance testing solution that helps agile development teams release robust products that scale with confidence. The comprehensive analytic will identify performance bottleneck before deployment.
Tags : 
    
HP Enterprise Business
Published By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mobility is being approached by mid-market and enterprise organizations globally Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and Business leaders’ views, priorities and objectives align and differ • Building a global and local view from over 1400 respondents across 14 countries in every geography
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Cisco's 2015 Mobility Landscape Survey provides new insights into how mid-market organizations globally are approaching mobility. Specific objectives include: • Discovering insights into current strategy and future plans • Identifying priority mobility initiatives and top challenges • Learning how IT and business leaders’ views, priorities, and objectives align and differ • Building a global and local view from over 1400 total respondents and over 570 who consider themselves mid-market, across 14 countries in every geography
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Disruptors now harness the power of digital to create new sources of value that reduce costs, improve the customer experience, and scale their offerings. Digital disruptors also enjoy a decided innovation advantage over established companies: they are better able to identify new opportunities, and move faster to take advantage of them. In this intensely competitive environment, startups and agile firms are overturning incumbents with digital business models, products, and services.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: VMware AirWatch     Published Date: Jul 19, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware AirWatch
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
Be ready for digital learning today, and tomorrow. Building efficient, impactful, future-ready districts takes planning. Our checklist, Digital District Leadership in Five Steps, helps you get started by asking the questions needed to identify new learning opportunities supported by technology. • How can new content engage students? • How robust is your network? • Do you have the right technology resources across classrooms? Let’s get started now. Download this checklist.
Tags : 
lenovo, digital district, digital learning, classroom technology, digital classroom, learning opportunities, digital district leadership, student engagement
    
Lenovo and Intel®
Published By: Lenovo and Intel     Published Date: Jan 19, 2017
Nowhere is technology more important than in healthcare, where the integrity of devices, systems, and infrastructure ultimately impacts patient lives. When evaluating existing technologies or considering investment in new solutions, there are a number of key factors healthcare entities must take into account. With this checklist, we’ll help you: ? Identify common demands ? Get an easy-to-use technology evaluation checklist ? See an example of how to apply new technology solutions
Tags : 
lenovo, healthcare, infrastructure
    
Lenovo and Intel
Published By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
digital business, technology, best practices, forrester, enterprise
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Storage is normally the first suspect when identifying the causes of the App-Data Gap, but the facts tell a different story. Flash Alone Isn’t Enough. Infrastructure complexity makes it difficult to pinpoint the real problem, resulting in: • Extended downtime and frustration • Inefficient use of IT resources and budget • Long hours spent resolving cross-vendor issues
Tags : 
    
Hewlett Packard Enterprise
Published By: VMware     Published Date: Feb 24, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.