romi

Results 1 - 25 of 802Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Feb 24, 2020
Empower your business decisions with upgraded IT security There’s no better way to rapidly deal with intricate security threats than moving to Lenovo Think devices with Windows 10 and ThinkShield built in. Think devices, powered by Intel® vPro® platform, bring together some of the most prominent security trends and approaches out there to deliver end-to-end security that adapts as your business faces new challenges. Learn more >
Tags : 
    
Lenovo - APAC
Published By: Ensign InfoSecurity     Published Date: Feb 05, 2020
"The pressure on the Banking, Financial Services & Insurance (BFSI) industry to perform has never been greater as the digital world struggles to deal with the onslaught of more prevalent and pernicious threats. To drive growth and increase customer trust, financial institutions are taking advantage of various platforms such as mobile, cloud and social, exposing them to further cybersecurity risks. The recent news has flagged flaws in mobile and web applications as the major routes of intrusions. The Equifax incident was prominently singled out with massive amounts of its customer data being compromised due to a web-application vulnerability. Third-party vendors, including FinTech partners, continue to pose great risk to the financial industry. The 2016 Bangladesh Bank breach cost some USD81 million due to a vulnerability in SWIFT, a shared banking system. As customers continue to move away from physically transacting with banks and other institutions, more enhanced investment in se
Tags : 
    
Ensign InfoSecurity
Published By: Schneider Electric     Published Date: Feb 13, 2020
Digital remote monitoring services provide real-time monitoring and data analytics for data center physical infrastructure systems. These modern cloud-based platforms offer the promise of reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved energy efficiency for power and cooling systems. However, with the cost of cyber security crime projected to quadruple over the next few years reaching $2 trillion by 20191, there is concern these systems could be a successful avenue of attack for cyber criminals. This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
    
Schneider Electric
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Forcepoint     Published Date: Feb 03, 2020
When it comes to data security, the best-case scenario is to prevent data from being compromised entirely. However, as any security team knows, blocking every threat can impede workflows and productivity across a company. But it doesn’t have to be this way. This infographic outlines the nine steps you can take today to guard against data security incidents in the future while giving employees the freedom to get their work done efficiently. Download to learn how to: • Identify and categorize risks to your data security • Proactively define responses before incidents arise • Integrate data loss prevention controls across your business
Tags : 
    
Forcepoint
Published By: LeadSpace     Published Date: Feb 03, 2020
THE B2B MARKETER’S GUIDE TO AI | 1 INTRODUCTION Artificial Intelligence (AI) is the New Buzzword for B2B Marketing… And as with every new marketing buzzword, behind the hype there are many real, exciting opportunities for marketers. The question is: how can B2B marketers see through the hype to understand the true applications and benefits of AI? How can marketers soberly evaluate the potential ROI of any given AI platform in this emerging industry? And on the flip side, how can marketing organizations avoid falling for false promises and illusory or misleading offers of “AI” which ultimately don’t deliver — with all the frustration and wasted resources that entails? In this ebook we’ll be answering these questions and more, by demystifying AI and its real-world applications to B2B marketing.
Tags : 
    
LeadSpace
Published By: LeadSpace     Published Date: Feb 03, 2020
If you’re reading this guide, you’re probably a B2B marketer. If so, you probably spend a lot of your time coming up with new ways to reach the right prospect, at the right time, with the right message. Which means you’re one of a million B2B marketers trying to do exactly the same thing. Welcome to the club! To make it worse, nearly everyone who sells solutions to B2B marketers like us will promise they can help you reach the right prospect at the right time with the right message. Not too long ago, you could buy lists from ads in the back of inflight magazines that made the same promise. Now those promises come from marketing technology vendors, as well as bloggers and authors and consultants putting their own spin on marketing strategies, both proven and unproven. Account-based marketing (ABM) is the latest strategy those folks are trying to sell you. But with ABM, there’s one key difference: ABM isn’t a new, unproven idea; it’s a new way of combining proven fundamentals to help B2B
Tags : 
    
LeadSpace
Published By: IBS Software     Published Date: Dec 20, 2019
"There is a lot of buzz around “blockchain” being the go-to solution across most industries. While blockchain promises robustness, security and reliability in a rapidly digitalizing global trade ecosystem, what does it have in store for the Air Cargo industry? In this webinar, Radhesh Menon, AVP & Head – Strategy & Product Management, Cargo & Logistics Solutions, IBS Software will explore the basic premise of blockchain and its potential use cases in Air Cargo Management. Radhesh has over 18 years of experience in the Air Cargo Industry and building Business Solutions like iCargo from the scratch. He has in-depth knowledge of air cargo business processes, industry best practices and is techno-savvy professional who could articulate intricate techno-business solutions like blockchain in a lucid manner with fitting examples. This webinar will: 1. Help you understand what “blockchain” means in a business context 2. Tell you where it is heading and how possibly it will evolve 3. S
Tags : 
    
IBS Software
Published By: IBS Software     Published Date: Feb 19, 2020
Pharma logistics today is about the safe and secure transportation of pharmaceuticals from production to consumption while ensuring that integrity of product is not compromised. However, with increasing complexity of the global pharma supply chain to meet the increasing spend in healthcare sector, regulatory requirements surrounding transportation of temperature controlled pharma will become increasingly stricter and wider in scope and reach. Partnerships between logistics service providers will become key for business expansion ably supported by IT vendors supplying the right tools for operating temperature sensitive products and services. In this Whitepaper, we touch upon: • The Business Opportunity – Pharma logistics by airfreight • The challenges at multiple touch-points in the entire supply chain • Solutions & effective Mitigation Strategies
Tags : 
    
IBS Software
Published By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift
Published By: Sift     Published Date: Oct 16, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
    
Sift
Published By: Appcast Q1 2020     Published Date: Feb 14, 2020
Every now and then, a technology comes along that promises to revolutionize how we find and engage quality candidates. In recruitment, that technology is programmatic advertising — the concept of using technology, not people, to buy, place, and manage job ads. In this whitepaper, Appcast will give you an overview of programmatic, how it works, how it could impact your talent acquisition results, and how you can leverage it to strengthen and improve your recruitment advertising.
Tags : 
    
Appcast Q1 2020
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : 
application modernization, forrester consulting, apo, asg, application portfolio optimization
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Ricoh     Published Date: Feb 14, 2020
Thank you for your time today. As promised, here is the link to Ricoh’s Designed for Tomorrow eBook. We hope you find the content valuable. A Ricoh representative will be in touch with you shortly to discuss how they can help you expedite your digital transformation
Tags : 
    
Ricoh
Published By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
    
SAP
Published By: QTS     Published Date: Nov 04, 2016
At the heart of the Data Solved promise are three core attributes - People Powered, Technology Focused and Infrastructure Invested. We leverage our strong, diverse team of more than 700 employees to enable our Powered by People motto and deliver on our promise. With 24 data centers on four continents, we are poised to deliver world-class infrastructure and value added technology services to our more than 1,000 customers in North America, Europe, Asia and Australia.
Tags : 
data centers, infrastructure, value added technology services, data security, data center, colocation, cloud needs, security
    
QTS
Published By: Lenovo     Published Date: Nov 09, 2018
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, workforce mobility
    
Lenovo
Published By: Lenovo     Published Date: Nov 09, 2018
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Nov 09, 2018
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Dans un contexte où 48 % des compromissions sont dues à des erreurs humaines2, découvrez comment protéger votre entreprise contre les menaces internes. Téléchargez notre infoguide > Wissen Sie, wo Sie am meisten gefährdet sind? Im Wettrennen mit Ihren Mitbewerbern um die digitale Transformation Ihres Unternehmens treten neue Bedrohungen auf. Mit ThinkShield von Lenovo erhalten Sie eine anpassbare, umfassende Lösung, die Ihr Unternehmen rundum schützt. 48 % der Datensicherheitsverletzungen werden durch menschliche Fehler verursacht2. Erfahren Sie, wie Sie Ihr Unternehmen vor solchen Versehen schützen können. Leitfaden herunterladen > 1 IBM : 2017 Global CODB Report Final
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Dans un contexte où 48 % des compromissions sont dues à des erreurs humaines2, découvrez comment protéger votre entreprise contre les menaces internes. Téléchargez notre infoguide > 2 Kaspersky : “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Remarque : il manque un "s" à "Kaspersky" dans les références de l’infoguide]
Tags : 
    
Lenovo
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Lenovo - APAC     Published Date: Dec 18, 2019
Empower your business decisions with upgraded IT security There’s no better way to rapidly deal with intricate security threats than moving to Lenovo Think devices with Windows 10 and ThinkShield built in. Think devices bring together some of the most prominent security trends and approaches out there to deliver end-to-end security that adapts as your business faces new challenges. Learn more >
Tags : 
    
Lenovo - APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.