line

Results 1 - 25 of 5664Sort Results By: Published Date | Title | Company Name
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
Application security is hard. We see headlines about data breaches almost daily. According to F5 Labs, web application attacks are the #1 single source entry point of successful data breaches. Additionally, the fallout from application attacks come with high costs. Insecure software makes web applications so precarious. Always-on, always-connected apps can help power and transform your business–but they can also act as gateways to the data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read this eBook to review the OWASP Top 10 Injection attacks and how to protect your enterprise.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
Sprint’s finance team wanted to overcome the problem of lack of resources. Started with tax department to put handful of automations, Sprint worked with Automation Anywhere with the target to automate 50 use cases as quickly as possible – an unprecedented scope and timeline. The intense focus provided Sprint with an invaluable insight into how automation can change the company’s culture and the ways it’s employees work, with 50+automations already developed and 50+ additional use cases in pipeline. Read the full case study now.
Tags : 
    
Automation Anywhere APAC
Published By: Automation Anywhere APAC     Published Date: May 12, 2020
Signify, formerly Philips Lighting, is the world leader in lighting for professionals, consumers and for the Internet of Things. As an industry innovator, Signify was looking for ways to streamline and improve the performance of several processes within the finance function, including balance sheet account reconciliations (RTR), purchase-to-pay (PTP), and credit and collections (C&C). With the help of Automation Anywhere, Signify standardized and streamlined its reporting process, giving employees valuable time to review real-time data to make more accurate strategic decisions. Download the case study to learn more.
Tags : 
    
Automation Anywhere APAC
Published By: Dell EMC Storage     Published Date: May 13, 2020
Digital transformation (DX) is a hot topic in most enterprises today. DX drives a host of new business requirements that challenge legacy infrastructure, and information technology (IT) organizations are upgrading to new server and storage platforms at a rapid rate to meet them. Although the enterprise storage market overall continues to grow, revenue for storage systems at midrange price points ($25,000 to $249,999) is growing at the fastest rate – in 2019 this market grew 10.6% to comprise 60.3% of all enterprise storage revenues. Part of the reason this segment leads the entry and high-end enterprise storage segments is that systems whose starting prices are in the $25,000 to $249,999 range are increasingly incorporating the performance, availability, scalability and functionality of higher end systems. For IT organizations looking to streamline costs as well as storage infrastructure, systems at midrange price points meet a broader set of requirements than either of the other t
Tags : 
    
Dell EMC Storage
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"The continuous integration and continuous delivery (CI/CD) practices of software development promise to bring new software or new features to market faster. By focusing on frequent code integration, automated testing, and keeping the mainline code version in a state that is deployable to production at any time, CI/CD aims to eliminate the risks and friction of traditional waterfall software development. Add to that the practice of continuous deployment and you can move to a situation where the latest and greatest software version is not just always ready to be deployed—it’s deployed on a frequent basis. Download this guide to learn how CI/CD aims to eliminate the risks of Traditional Software Development "
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 19, 2020
A global chain of department stores has a robust brand that stands for luxury, legacy, and customer satisfaction. The retailer’s bedrock belief is in innovating to improve customer experience, both in-store and online. They strive to provide a friction-free shopping experience with secure login, hassle-free gift cards, and stored payment information. However, the retailer’s dedication to a friction-free shopping experience opened the doors to predatory automation attackers, resulting in five pain points for the company’s IT and loss departments. Download the case study to find out more.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 18, 2020
A global chain of department stores has a robust brand that stands for luxury, legacy, and customer satisfaction. The retailer’s bedrock belief is in innovating to improve customer experience, both in-store and online. They strive to provide a friction-free shopping experience with secure login, hassle-free gift cards, and stored payment information. However, the retailer’s dedication to a friction-free shopping experience opened the doors to predatory automation attackers, resulting in five pain points for the company’s IT and loss departments. Download the case study to find out more.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Oracle     Published Date: May 12, 2020
As the utility-customer relationship continues to evolve and data expands across operations, meters and other smart devices are more important than ever in translating real-world events into digital intelligence. Oracle Utilities Meter Solution Cloud Service delivers the full power of our industry-leading meter solution but without the long upgrade projects, burdensome maintenance, scalability challenges, security concerns and other hassles of on-premises solutions. The result is that utility meter ops and IT teams can focus more on innovation, knowing the always-up-to-date solution is ready to go. • Focus on your business while Oracle Utilities does the heavy lifting on system maintenance • Streamline meter-to-cash processes with productized integration • Access (acceptance-based) new capabilities immediately via multiple mini-updates each year • Easily scale the solution as data volumes and processing needs expand
Tags : 
    
Oracle
Published By: CheckMarx     Published Date: May 11, 2020
This Critical Capabilities guide provides application security testing (AST) tool buyers with vendor rankings for five common use cases, based on relevant evaluation criteria. Buyers can view vendor rankings for each use case to help formulate lists of vendors that, based on Gartner assessments, are well-suited based on product capabilities to address a given use case. Using the online interactive tool, buyers can also formulate custom use cases, and corresponding vendor rankings, where predefined use cases do not offer an appropriate match to an organization’s specific requirements. Using scoring for specific capabilities, buyers can also identify vendors with a product offering that is well-suited for a specific function, such as analysis of mobile applications or APIs.
Tags : 
    
CheckMarx
Published By: HICX     Published Date: May 06, 2020
As procurement teams face increasing pressure to digitalise, strong supplier data forms the foundations for transformation. This report outlines how to breathe new life into supplier data to drive growth. Download it to read the following articles:
Tags : 
    
HICX
Published By: HICX     Published Date: May 06, 2020
It’s impossible to overemphasise the impact that an advanced approach to supplier management can have on large organisations. With the right processes, systems and technology in place, procurement functions can claw back huge amounts of time, meaning scarce resources can be put to use on more value-creating activities. New technologies can introduce control and, with that, ensure that suppliers remain compliant with negotiated terms. And streamlined processes that remove vast volumes of administrative tasks from both supplier and buyer can help to provide a platform for more advanced working relationships with key suppliers. It’s this last point that can take procurement to a new level, where it has a significant and lasting impact on the commercial success of a business. But only organisations that invest in the right tools will make it a reality.
Tags : 
    
HICX
Published By: Corrigo     Published Date: Nov 01, 2019
PropTech is disrupting the facilities management and real estate industries – from big data and IoT to artificial intelligence and augmented reality. The latest advances in PropTech are accelerating change in facilities management like never before, driving bottom line value and helping future-proof FM operations. The promise of PropTech is why our Corrigo team is investing so heavily in frictionless, self-learning platforms to help our clients use technology to truly transform their businesses. But as we amplify FM ops with new technology, we are just as passionate about helping our clients optimize their current processes. Why? Because making even small changes today can mean huge savings for their bottom line. In fact, 80% of organizations are leaking more FM value right now than they could immediately gain with new, emerging tech strategies. That’s no small leak – it’s a staggering loss for organizations of all sizes. After analyzing 700 million facilities management transactions a
Tags : 
    
Corrigo
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 13, 2020
A global leader in robotic-assisted surgical systems automated their unstructured, manual processes into a streamlined, ML-based customer support & quality assurance which also improved compliance and reduced failures.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Menlo Security     Published Date: Apr 30, 2020
Traditional detect-and-respond cybersecurity strategies are highly ineffective and inefficient. Threat actors today are overwhelmingly targeting the weakest link in the security apparatus: people. The soft costs of an unsuccessful cybersecurity strategy can be burdensome. Infections need to be fixed and holes need to be patched. Fines and audits can be costly as well and the loss of public trust can be devastating to a company’s bottom line. In this white paper, we dive into the benefits of Web Isolation and provide an analysis on the true hidden costs of failed web security approaches. This whitepaper examines: • Why traditional cybersecurity strategies aren't effective • The soft costs of an unsuccessful cybersecurity strategy • The benefits of a web isolation approach
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
The Japan Pension Service experienced a massive cyberattack in 2015 when an employee unknowingly opened a virus-laced email attachment. The attackers were able to steal the data of 1.25 million people, the largest successful attack in Japan. After the attack, the Ministry of Internal Affairs and Communication created the Internet Isolation Guideline for businesses. Read how the largest corporation in Japan achieves 100% malware protection without impacting end-user experience or convenience.
Tags : 
    
Menlo Security
Published By: Healthgrades     Published Date: May 12, 2020
As today's consumers begin to schedule medical appointments they delayed, 89% will turn to a search engine to answer health questions and concerns. Download this infographic to debunk 10 common myths about healthcare digital marketing and drive high-value service line appointments.
Tags : 
    
Healthgrades
Published By: Healthgrades     Published Date: May 12, 2020
As we reevaluate digital marketing strategies and service line priorities, it's time to find new ways to quickly capture and then capitalize on consumers' attention. It's a difficult proposition in any industry, let alone for a healthcare organization vying for new patients in a rapidly evolving landscape. Today's consumers expect a personalized experience relevant to their needs. Here are three tips for converting browsing consumers into patients by personalizing your website.
Tags : 
    
Healthgrades
Published By: Healthgrades     Published Date: May 12, 2020
Today’s consumers expect an easy, convenient, and reliable online experience. Hospitals must deliver on this expectation—or risk losing business. A health system website plays an integral role in a patient’s overall experience, perhaps being one of the first impressions of the organization. Download this guide to key features of top-performing hospital websites and why you need them.
Tags : 
    
Healthgrades
Published By: Healthgrades     Published Date: May 12, 2020
With consumers, 77% of online health inquiries start with an online search, and almost three-quarters of patients use online reviews as their first step to find a new doctor. With care delivery options transforming dramatically and the exponential adoption of telehealth, easy access is a critical differentiator. Download this guide to learn the top five solutions for acquiring patients by helping consumer find and connect with your providers through a well-designed digital engagement strategy.
Tags : 
    
Healthgrades
Published By: Healthgrades     Published Date: May 12, 2020
Consumers depend on their local health system to keep them updated. With normal hours disrupted and entire service lines procedures suspended, reaching out to patients with the latest updates is now mission critical. While it may be tempting to just post basic information for each provider, converting profile visits into booked appointments requires carefully curating each profile. Download this guide to know what information matters most to healthcare consumers and tap into six best practices for building a high-converting provider profile.
Tags : 
    
Healthgrades
Published By: Proofpoint     Published Date: May 05, 2020
AN IN-DEPTH LOOK AT USER AWARENESS, VULNERABILITY AND RESILIENCE Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks? Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including: • End-user awareness and knowledge gaps that could be hurting your cybersecurity defences • Impacts of phishing attacks and the ways infosec pros are trying to combat these threats • How Proofpoint customers are approaching phishing awareness training and the ways we’re helping them measure success With this report you will learn how organisations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.
Tags : 
    
Proofpoint
Published By: Group M_IBM Q2'20     Published Date: Mar 18, 2020
B2B Integration is viewed as a competitive differentiator for best-in-class companies and by 2020, 50% of all business software will incorporate AI technology. Discover three ways you can apply AI - today - to build a modern, faster, more efficient B2B network. Access detailed, real-time transactional intelligence across your business Gain in-depth, real-time visibility into supplier and partner performance Empower supply chain and line of business users with self-service Fill out the form to read the paper now.
Tags : 
    
Group M_IBM Q2'20
Published By: Zinier APAC     Published Date: Mar 05, 2020
Field service has a problem. Mountains of paperwork, limited visibility into the field, and slow, manually driven processes are stifling growth — and opening the door for automation. Find out where digitization is falling short, and how field service organizations can use AI-driven automation to solve today’s challenges of speed and scale. In 1910, the Ford Motor Company opened the world’s largest factory in Highland Park, Michigan. Three years later, the plant implemented the first moving assembly line, cutting the production time of Model Ts from over 12 hours to just 90 minutes. By the time Ford stopped producing the Model T in 1927, the automaker had sold more than 15 million vehicles. But time (and technology) marches on, and in 1993 the plant was converted to storage as newer, automated facilities came online.
Tags : 
    
Zinier APAC
Published By: Zinier APAC     Published Date: Mar 05, 2020
Smart machines are everywhere – in our homes, our driveways, even our power grids and assembly lines. Over the last three years, the number of connected devices has almost doubled, from 15 billion in 2015 to more than 25 billion today. By 2025, that number is expected to eclipse 75 billion. At the same time, wireless data traffic has seen explosive growth. In the United States, mobile data usage increased 54% over the last decade (Mobility Report. Ericsson, 2018). The rise of IoT-connected devices and increasing customer expectations around mobile broadband performance is putting tremendous pressure on existing infrastructure. In response, telecom companies are making massive capex investments in small cell networks.
Tags : 
    
Zinier APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.