aci

Results 126 - 150 of 2125Sort Results By: Published Date | Title | Company Name
Published By: SAP SME     Published Date: May 09, 2017
Infográfico da The Economist Intelligence Unit baseado em uma pesquisa multinacional realizada com executivos, incluindo 201 de PMEs
Tags : 
    
SAP SME
Published By: RingCentral     Published Date: Nov 10, 2015
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ringcentral, network, cloud, voip, wireless, business technology, data center
    
RingCentral
Published By: Ring Central     Published Date: Mar 21, 2016
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : 
ring central, cloud phone service, communications, network, cloud, business technology
    
Ring Central
Published By: SAP SME     Published Date: May 09, 2017
Não aconteceu de um dia para o outro, mas aconteceu. A comoditização e a concorrência global aumentaram a pressão em quase todos os setores. Para piorar a situação, os mercados inanceiros tornaram-se mais exigentes do que nas décadas anteriores. Todos procuram o crescimento sustentável, mas poucos encontram a fórmula secreta para o conseguir. O que isso tem a ver com engajamento? Tudo. As empresas otimizaram suas operações para obterem ganhos precisos. Os CEOs estão virando sua atenção para as equipes centradas no cliente – marketing, vendas, comércio e atendimento ao cliente – para atraírem mais clientes e manterem relacionamentos mais profundos com eles. As regras do jogo mudaram.
Tags : 
    
SAP SME
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems
    
Internet Security Systems
Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119
Published By: Rockwell Automation     Published Date: Jun 23, 2008
In today's global markets, companies are required to navigate a plethora of standards and regulatory requirements, making global business complex. Rockwell Automation's perspective is that the harmonization of standards and regulatory requirements is the best approach to facilitate global market access, competition and growth.
Tags : 
erp, automation, manufacturing, rockwell, rockwell automation, compliance
    
Rockwell Automation
Published By: Pure Storage     Published Date: Dec 05, 2018
Data is the new currency. Is your organization capitalizing on the full potential of data analytics? In this big data primer, you will learn about the 3 key challenges facing organizations today: managing overwhelming amounts of data, leveraging new complex tools/technologies, and developing the necessary skills and infrastructure. And since storage is where your organization's data lives, it’s a pivotal part of the infrastructure jigsaw puzzle. Thus with a “tuned for everything” storage solution that is purpose-built for modern analytics, you can confidently harness the power of your data to drive your enterprise forward.
Tags : 
    
Pure Storage
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem
    
Symantec
Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: Oracle     Published Date: Apr 04, 2012
This white paper examines how the versatile design of the Oracle SPARC SuperCluster T4-4 along with powerful, bundled virtualization capabilities makes it an ideal platform for consolidating enterprise servers and workloads and deploying apps.
Tags : 
supercluster, sparc, t4-4, workloads, oracle exalogic elastic cloud, oracle, elastic capacity, infrastructure
    
Oracle
Published By: HP     Published Date: Feb 02, 2015
Many businesses continue to rely on outdated IT infrastructures to run the extremely demanding workloads of today. Not surprisingly, these businesses are facing increasing complexity and challenges. However, by taking the important step to adopt next generation infrastructure hardware, leading organizations are gaining a great opportunity to meet the challenges of these workloads with a reliable and optimized environment that delivers the services that customers demand, and brings significant benefits and returns on investment.
Tags : 
    
HP
Published By: HPE     Published Date: Feb 20, 2015
Many businesses continue to rely on outdated IT infrastructures to run the extremely demanding workloads of today. Not surprisingly, these businesses are facing increasing complexity and challenges. However, by taking the important step to adopt next generation infrastructure hardware, leading organizations are gaining a great opportunity to meet the challenges of these workloads with a reliable and optimized environment that delivers the services that customers demand, and brings significant benefits and returns on investment.
Tags : 
    
HPE
Published By: CyrusOne     Published Date: Jul 05, 2016
In June 2016, CyrusOne completed the Sterling II data center at its Northern Virginia campus. A custom facility featuring 220,000 square feet of space and 30 MW of power, Sterling II was built from the ground up and completed in only six months, shattering all previous data center construction records. The Sterling II facility represents a new standard in the building of enterpriselevel data centers, and confirms that CyrusOne can use the streamlined engineering elements and methods used to build Sterling II to build customized, quality data centers anywhere in the continental United States, with a similarly rapid time to completion.
Tags : 
cyrusone, data, technology, productivity, engineering
    
CyrusOne
Published By: Engagio     Published Date: Jun 26, 2018
This is an inside look at the state of Account Based Marketing. More specifically, our research examined: ?How companies are utilizing ABM as a strategy ?How organizations are structuring their teams to support ABM ?How ABM can be measured at different stages ?The challenges most organizations are facing regarding ABM Along with showing the results, we’ve included our interpretation of the data to help you draw insights and apply them as you continue down your ABM journey. The research underscores where companies are at with their ABM programs and the key challenges they are facing. Regardless of your company size or maturity, there is always a need to grow your business and drive efficiency. The data from this survey illustrates how ABM can help.
Tags : 
    
Engagio
Published By: Lenovo UK     Published Date: Nov 09, 2018
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK
Published By: Cisco     Published Date: Apr 11, 2016
El panorama de amenazas actual no se parece en nada al de hace solamente 10 años. Los ataques simples que provocaban daños controlables han dado lugar a operaciones modernas de ciberdelito que son sofisticadas, están bien financiadas y son capaces de generar interrupciones importantes en las organizaciones y en la infraestructura nacional. Estos ataques avanzados son difíciles de detectar, además permanecen en las redes por mucho tiempo y acumulan recursos de red para lanzar ataques a todas partes.
Tags : 
    
Cisco
Published By: FICO EMEA     Published Date: Feb 11, 2019
The automotive leasing and financing industry is facing its most competitive times. Market disruptors are moving quickly, leveraging technology to provide polished and high-value customer experiences to lure business away from more traditional lenders. However, the use of smart technology and automated credit decisioning can enable auto lenders to make accurate lending decisions and gain a competitive edge. Learn how you can: • Issue accurate and immediate credit financing decisions at the point of sale • Reduce delinquencies and credit losses • Grow your lending portfolio • Create winning offers using data and analytics • Speed up credit decisions to prospects and stay competitive • Use smart analytics to enhance the customer service experience Download the case study round up Digital Transformation for Automotive Finance to learn how you can transform your business.
Tags : 
collections treatment optimisation, customer retention, lending decision, collection optimisation, debt managemen, auto leasing financing, automated credit decisioning
    
FICO EMEA
Published By: Pure Storage     Published Date: Nov 02, 2017
Pure Storage has significant expertise creating scalable, enterprise-class, flash-optimized storage platforms, and with FlashBlade, Pure Storage has crafted a turnkey, purpose-built platform that is well suited to cost effectively handle the performance and capacity requirements of genomics workflows. Pure Storage has differentiated itself from more established enterprise storage providers by delivering an industry-leading customer experience, as shown by its extremely high NPS, indicating it knows how to meet and is committed to meeting customer requirements. Whether genomics practitioners plan an on-premises deployment or a cloud-based deployment for their genomics workflows, they should consider the performance, cost, and patient care advantages of the Pure Storage FlashBlade when choosing a platform, particularly if they plan to retain data for a long time and use it frequently.
Tags : 
results, management complexity, high costs, new flash array, afa, pure storage, market, scale ability
    
Pure Storage
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
If your business is like most, you are grappling with data storage. In an annual Frost & Sullivan survey of IT decision-makers, storage growth has been listed among top data center challenges for the past five years.2 With businesses collecting, replicating, and storing exponentially more data than ever before, simply acquiring sufficient storage capacity is a problem. Even more challenging is that businesses expect more from their stored data. Data is now recognized as a precious corporate asset and competitive differentiator: spawning new business models, new revenue streams, greater intelligence, streamlined operations, and lower costs. Booming market trends such as Internet of Things and Big Data analytics are generating new opportunities faster than IT organizations can prepare for them.
Tags : 
    
Hewlett Packard Enterprise
Published By: iOctane     Published Date: Sep 07, 2010
In this briefing iOctane explores the issues and options facing organisations seeking to transformation their business.
Tags : 
business transformation, process improvement, process technology
    
iOctane
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.