discover

Results 1851 - 1875 of 1887Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: OnBase by Hyland     Published Date: May 16, 2017
Discover how the real savings associated with document capture start when automatically capturing and validating data from your organization’s scanned documents to eliminate costly process steps and free up staff time.
Tags : 
hyland, document capture, ecm, ecm solutions, erp, document scanning, documentation
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
An integral part of your information management technology strategy is how you actually get the needed information into your business systems. Do you have staff devoting time to manually entering data in those systems? Data capture solutions automatically extract data from incoming documents and make data validation simple. Download this AIIM article to explore the history of data capture, its evolution into truly intelligent solutions and how you can benefit from these capabilities today.
Tags : 
information, management, technology, intelligent, data, capture, strategy, capabilities, solution, content, systems, onbase, hyland, validation
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : 
cloud, solutions, ecm, onbase, hyland, data, availability, encryption, compliance, security, platform, content, management, information, on-premise, infrastructure, future
    
OnBase by Hyland
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Whether we’re talking about a life partner, a business partner or an enterprise information platform, you don’t want to start any kind of relationship without all relevant information – or worse yet, go in blind. Selecting a case management solution provider is no different. Download this white paper to discover key considerations and questions to ask when evaluating case management vendors and software solutions.
Tags : 
case, management, software, solution, dynamic, onbase, hyland, knowledge, worker, bpm, investigations, information, content, unpredictable, whitepaper, service, requests, issue, tracking
    
OnBase by Hyland
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
    
Dassault Systèmes
Published By: Kronos     Published Date: Sep 20, 2018
Advanced analytics tools can help SMB retailers trim expenses while simultaneously improving shopper/associate engagement. Armed with big data insight into the performance of individual associates and stores small- and mid-size retailers can close the gap on the industry’s biggest players. Download this Retail IQ report and discover how retailers both big and small can benefit from cutting-edge insight into the performance of their workforce to better schedule, plan and assign tasks.
Tags : 
    
Kronos
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
    
IBM Watson Health
Published By: DocuSign UK     Published Date: Aug 08, 2018
HR is all about serving your people, whether they are shiny new recruits or lifetime employees. But all too often, outdated and cumbersome paper-based processes get in the way of those goals. Discover how HR departments are using electronic signatures to streamline the on-boarding experience, increase employee satisfaction, and focus staff away from mundane tasks. Watch this webinar and discover how eSignatures can help you: - Simplify the new hire process: NDAs, offer letters, background checks and on-boarding - Streamline compensation and benefits: comp plans, stock option grants, and benefit plan notices - Reduce admin overheads: holiday requests, contractor agreements, and internal approvals - Ensure compliance: ISO compliance, new hire check-offs and audit support
Tags : 
    
DocuSign UK
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Sophisticated banking requires sophisticated computing systems. But which systems offer the greatest chance for success? Many banks are discovering that the answer can be found within their on-premise data centers – the mainframe computer. Mainframes have become a modern platform for innovation. When operating in a hybrid cloud environment, mainframes provide cost flexibility, scalability, agility, sophistication and unmatched security. And they support innovation, business transformation and new types of monetization. The power of mainframe computing is being rediscovered. Specifically, in a recent 2017 survey of banking executives, we found that: • 50 percent said they believe hybrid cloud – and the systems that underpin it – can significantly lower the cost of IT ownership • 47 percent said they believe mainframe enabled hybrid cloud can improve operating margin • 47 percent said they believe dual-platform hybrid cloud can accelerate innovation. While innovation and improved p
Tags : 
    
Group M_IBM Q418
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Magento     Published Date: Feb 13, 2018
Omnichannel isn’t about making a quicker, cheaper sale with fewer human touchpoints: it’s about creating a system which lets you to nurture your customers at every step of their buyer’s journey. This white paper from Magento and Premier Technology Partner dotmailer describes how well connected ecommerce and marketing teams and systems are crucial for a true omnichannel approach. Download the paper to discover: Why automated marketing messages, sent in real time, are the most effective way to communicate throughout the purchase journey Web and email personalization tips for omnichannel merchants Why an email address is your unique identifier Three tried and tested marketing methods to drive customers to your site and stores Note that by downloading this paper, you consent to receive future emails from dotmailer. You may opt-out at any time.
Tags : 
    
Magento
Published By: Magento     Published Date: Feb 15, 2018
Discover 3 tips for transforming your digital experience. Customer expectations are changing the face of B2B commerce. How are you meeting your customers' demands? Discover three tips for transforming your B2B commerce experience. Highlights from this whitepaper, include: An omnichannel strategy for B2B commerce Modifying sales models to meet demands Integrating content for growth Download this whitepaper to learn more!
Tags : 
    
Magento
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deployments—and failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box
Published By: KPMG     Published Date: Nov 21, 2018
Many BPO providers have already invested heavily in robotic process automation (RPA), providing an opportunity to renegotiate your BPO contract to reflect the cost savings they are making as a result. But there’s more. Contract renegotiation also creates an opportunity to leverage providers’ investment to accelerate automation in your own business. Read this to discover: • the benefits of automating business processes and the impressive level of cost savings this can deliver • the impact of automation on the BPO market and the implications this has for BPO contracts • a five-step processing for assessing and renegotiating your outsourcing contract • three options for starting your automation journey.
Tags : 
    
KPMG
Published By: EDF Energy     Published Date: Aug 22, 2018
Download this document to discover EDF Energy's top tips to save energy for your business: - Get to know your usage - Savings by area - Rally your teams to help you save. To find out how these tips and more can help, download today!
Tags : 
    
EDF Energy
Published By: Workday Italy     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
    
Workday Spain
Start   Previous    62 63 64 65 66 67 68 69 70 71 72 73 74 75 76    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.