inform

Results 126 - 150 of 3991Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Feb 22, 2019
De nombreuses entreprises ont investi massivement pour se doter d'une infrastructure et de plateformes qui forment la base de leur environnement informatique. Mais au fil des années et de l'acquisition et de l'ajout de nouveaux systèmes, la dette technique s'accumule. Les infrastructures, applications et processus vieillissants génèrent des problèmes de coûts, d'entretien et de sécurité.— En parallèle, les entreprises concernées doivent impérativement se moderniser et mettre en œuvre de nouvelles technologies pour rester compétitives. Pour cela, elles doivent déplacer ou migrer leurs charges de travail vers des plateformes capables de leur apporter davantage d'efficacité, de sécurité et de flexibilité.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
Dans ce rapport d’analyse, IDC se penche sur le défi auquel font face les entreprises actuellement pour équilibrer leurs investissements dans les infrastructures en place dans le but d’améliorer l’efficacité et de moderniser leur datacenter, tout en répondant simultanément au besoin d’adopter de nouvelles techniques de développement et de déploiement des technologies apportant la promesse d’améliorations significatives en termes de productivité des développeurs, d’agilité opérationnelle et de gestion des cycles de vie à moindre coût. IDC fournit des informations approfondies sur les options à la portée des entreprises pour atteindre ces objectifs à l’aide d’une infrastructure capable de prendre en charge les applications actuelles et celles de prochaine génération, ainsi que sur le rôle joué par la standardisation et la modernisation dans l’atteinte des objectifs d’optimisation opérationnelle.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
Geschäftskritische Anwendungen erfordern eine nachweislich stabile Plattform. Mithilfe von Red Hat Enterprise Linux erzielen Sie deutliche Geschäftsergebnisse, und zwar dank einer außergewöhnlichen Zuverlässigkeit und Sicherheit nach Militärstandards. Mit einer Red Hat Enterprise Linux Server Subskription sind Sie mit dem branchenweit größten Ökosystem aus Partnern, Kunden und Experten vernetzt und haben dadurch beste Erfolgsaussichten. Weitere Informationen erhalten Sie in diesem Datenblatt.
Tags : 
    
Red Hat
Published By: Smarp     Published Date: Feb 22, 2019
What is social recruiting Let’s face it, everybody’s on social media these days. Providing excellent targeting opportunities, social media channels are great channels for advertising jobs. Most of us are present on at least one social media channel, which makes them great places to search and find information about prospective candidates. Long story short, social recruiting is about leveraging social platforms in recruiting.
Tags : 
social recruiting, recruitment marketing, employee brand, employee advocacy
    
Smarp
Published By: Gigamon     Published Date: Feb 20, 2019
Téléchargez le livre blanc de Gigamon, intitulé “Remodeler les déploiements de sécurité réseau”, pour découvrir comment l'évolution des menaces informatiques affecte le modèle de confiance en matière de sécurité.
Tags : 
    
Gigamon
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report from Dell and Intel® for more information Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: StreamSets     Published Date: Feb 13, 2019
Enterprise analytics has quickly evolved from a centralized business intelligence function for historical reporting and dashboards to a democratized capability where anyone can access, analyze and act on all available information, often in real-time while employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration.
Tags : 
    
StreamSets
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
    
Recorded Future
Published By: HERE Technologies     Published Date: Feb 12, 2019
How does a transport authority to provide the safest and most efficient road network possible? How does it ensure the supply of data on road closures, accidents and disruptive events used in its decision-making is of the highest quality? This ebook examines the process used by HERE Technologies to produce industry-leading traffic content. As the foremost global provider of traffic incident information, HERE is well placed to help transport authorities exceed expectations as it produces evermore precise and granular data around the incidents that impact traffic flow.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Marketo     Published Date: Feb 11, 2019
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, TheDefinitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team. ResizedImage389253 dog with laptop lead generation You’ll learn how to: Define a lead and understand his or her buying journey Build a robust lead generation strategy t
Tags : 
    
Marketo
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. To find out more on how Cisco can help with these challenges download this white paper today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Time Clock Plus     Published Date: Feb 07, 2019
For most companies, the Human Resources department has a long history of guarding sensitive employee data. Rows of beige file cabinets line a back closet where only those with a key and knowledge of the filing system have access to the personal information of countless employees. The greatest risk to this data has always been fire or water damage, but that’s quickly changing with the emergence of online data storage.
Tags : 
    
Time Clock Plus
Published By: Comcast Business     Published Date: Feb 06, 2019
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
restaurants, quick-serve restaurants, qsr, fast food, convenience food, restaurant technology, qsr technology, guest experience, pos, digital entertainment, wifi, television, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Workday Italy     Published Date: Feb 04, 2019
Quando si tratta di scegliere la tecnologia giusta per la propria attività, è meglio un sistema che offra informazioni in tempo reale, approfondimenti e dati fruibili. Guarda il video per scoprire in che cosa Workday si differenzia profondamente dalla concorrenza e perché questo dovrebbe interessarti.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Workday Italy     Published Date: Feb 04, 2019
Lo studio di Deloitte ""Human Capital Trends 2018"" ha rilevato che per la forza lavoro odierna le carriere non sono più definite dai ruoli e dalle competenze, bensì dalla flessibilità di apprendimento. Per soddisfare queste nuove aspettative di carriera, la tua organizzazione necessita di nuove strategie per la forza lavoro e di approcci diversi nei confronti dell'apprendimento, della performance enablement e dello sviluppo della carriera. Scopri le informazioni principali nel report per scoprire le origini del cambiamento nelle aspettative di carriera e il modo in cui puoi: Utilizzare strumenti basati sui dati e sull'apprendimento dinamico per migliorare l'esperienza dei dipendenti Ridefinire le carriere in un mondo del lavoro in continuo cambiamento Sfidare i pregiudizi sull'età e coinvolgere lavoratori di ogni generazione
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Workday Spain     Published Date: Feb 04, 2019
"Aunque muchas empresas todavía no saben exactamente qué significa para ellas la transformación digital, no cabe duda de que los CIO tienen una oportunidad perfecta para liderar la innovación en sus organizaciones. En este informe se analiza la transformación digital con la lupa del CIO para definir lo que significa y explorar los pasos para lograrla. Lea el informe para acceder a insights de CIO en activo y con otros que ya no desempeñan este puesto, académicos, expertos del sector y otras personas que han sido testigos de la transformación digital y saben cuáles son los ingredientes que componen la receta del éxito."
Tags : 
    
Workday Spain
Published By: Workday Spain     Published Date: Feb 04, 2019
Lea en el informe de Deloitte información sobre los tres pasos fundamentales que ayudarán a las organizaciones emergentes a mejorar su plantilla: Redefinir las carreras profesionales como experiencias en lugar de considerarlas series de puestos Personalizar programas de capacitación del desempeño Seguir el ritmo de las innovaciones tecnológicas
Tags : 
workday, workforce technology, digital strategy
    
Workday Spain
Published By: Workday Spain     Published Date: Feb 04, 2019
El estudio de 2018 sobre tendencias globales de capital humano llevado a cabo por Deloitte revela que en la actualidad la plantilla ya no define su carrera profesional en función de los puestos o las habilidades, sino de las experiencias y la agilidad de aprendizaje. Para satisfacer estas nuevas expectativas profesionales, su organización necesita nuevas estrategias de plantilla y distintos enfoques de aprendizaje, capacitación del desempeño y desarrollo profesional. En el informe encontrará las claves del porqué del cambio en las expectativas profesionales y aprenderá a: Usar un aprendizaje dinámico y herramientas basadas en datos para mejorar la experiencia de los empleados Rediseñar las carreras profesionales de acuerdo con los cambios en el mundo laboral Desterrar prejuicios sobre la edad y emplear a trabajadores de distintas generaciones
Tags : 
workday, workforce technology, digital strategy
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.