inform

Results 226 - 250 of 3998Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Dec 05, 2018
Car data consumption is critically important to auto manufacturers. As more vehicles are produced with built-in infotainment systems, the cost of supplying them with live information and real-time updates via a data connection grows ever greater. Auto manufacturers need to be able to enhance the driving experience with smart traffic, navigation, and entertainment services, while reducing costs and data volumes. HERE is the world’s leading provider of traffic data to the automotive industry. This eBook shows how HERE optimizes traffic solutions and it outlines how data use modelling, standardization, and good data management can help reduce usage.
Tags : 
traffic data, auto, location data
    
HERE Technologies
Published By: StreamSets     Published Date: Dec 05, 2018
Enterprise analytics is quickly evolving into a democratized capability where anyone can access and act on all available information, often in real-time employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration. This paper proposes that DataOps, the application of DevOps practices to data analytics, is the best way to overcome these challenges to create an iterative build-operate process for data movement. Read this white paper to: Understand how modern data analytics create data integration challenges due to architectural complexity, operational blindness and data drift. Learn how DevOps pillars of automation and monitoring can create higher developer productivity, operational efficiency and business confidence in data. See specific examples of DataOps functionality being applied to data integration across modern architectures.
Tags : 
    
StreamSets
Published By: Pure Storage     Published Date: Dec 05, 2018
"Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning—especially deep neural networks—make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject, but also helps you get started building efficient deep learning networks. Dive into machine learning concepts in general, as well as deep learning in particular Understand how deep networks evolved from neural network fundamentals Explore the major deep network architectures, including Convolutional and Recurrent Learn how to map specific deep networks to the right problem Walk through the fundamentals of tuning general neural networks and specific deep network architectures"
Tags : 
    
Pure Storage
Published By: Comcast Business     Published Date: Dec 04, 2018
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
    
Comcast Business
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements. Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV replacement project and the critical elements to consider • How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions • What prevalent technologies are available and what are the pros and cons of each? • How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results • Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: Lucidchart     Published Date: Nov 28, 2018
Does it take forever for your sales team to close deals? There’s a potential roadblock you may have missed: your internal sales communication. Take a look around—new sales reps are overwhelmed with processes and messaging during onboarding, your sales reps don’t pass discovery information off to sales engineers or customer support, and you aren’t always sure where deals stand, which makes it rather difficult to predict pipeline. If the members of your org aren’t completely aligned, you can’t take a prospect across the finish line or keep the org running smoothly. Download this eBook to see how visuals can solve these communication breakdowns and align your sales organization to close bigger and faster.
Tags : 
    
Lucidchart
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: MuleSoft     Published Date: Nov 27, 2018
Every company today is a software company and, as a result, business and technology strategies ought to be very intertwined. But often, those strategies aren’t in alignment, leading to challenges in information technology. And in today’s hyper-competitive business environment, that can be disastrous. Companies have to ask themselves: How can we tackle challenges of information technology? Are we doing IT wrong? Today’s CIOs are the key players who enable organizations to respond to the disruptive forces and information technology challenges impacting all industries — mobile, IoT and SaaS among others. In order to increase speed and agility there must be a strong partnership between IT and the rest of the business. Read this eBook to learn: Why we have been doing IT wrong and how putting culture first and technology second, valuing reuse and leveraging KPIs can push CIOs to the right direction. How IT teams can address their delivery gap and increase project delivery speed by adoptin
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
    
MuleSoft
Published By: Nexmo     Published Date: Nov 27, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
    
Nexmo
Published By: Nexmo     Published Date: Nov 26, 2018
Companies have always been focused on the customer experience, but with the ever-changing landscape of how information is consumed, they have to react faster and provide more impactful interactions. Today's consumers expect businesses to communicate with them on the channels they prefer. This means messaging customers on the channels that provide straightforward and/or media-rich features. Savvy companies know that SMS is the messaging leader, but that MMS and other OTT channels, such as WhatsApp, Facebook Messenger, and Viber, provide a more engaging experience. They think about their overall messaging goals and as a big-picture concept. Join Sheri Atienza, Product Marketing Manager at Nexmo, in this webinar examining how messaging solutions can be the power behind your 2019 messaging strategy. You’ll learn how to customize your messages to both the audience and the medium, and how easy this can be with Nexmo.
Tags : 
    
Nexmo
Published By: Salesforce     Published Date: Nov 26, 2018
Nucleus estimates that over 70% of companies using Customer Relationship Management (CRM) have not completely tied their systems to customer service. This report shows why they should. Learn how you can empower customer service to take advantage of untapped revenue opportunities. Key findings include: Customers interact with service five times more than sales Tying CRM to service empowers agents with critical customer information 80% of customers would be willing to buy from a service agent Empowered agents plus willing customers can generate greater upsell
Tags : 
    
Salesforce
Published By: Sage     Published Date: Nov 26, 2018
Do you know your people as well as you know your customers? Your people’s expectations and the way they work are changing. Employees are more diverse, mobile and technologically savvy than ever before. HR processes are changing from focusing on transactions to knowing and engaging people. Just as sales and marketing teams use data to develop actionable and informed insights about their customers, you need to do the same in HR to know your people. Everything from attracting and keeping the best talent to creating better workplace experiences and increasing employee engagement and productivity, depends on smarter decisions. These in turn rely on more actionable insights. These are only possible through accurate HR data and analytics. They are vital to address the people challenges you face, so you can make smarter decisions. Discover in this guide how to improve visibility of your workforce with data-driven and actionable insights. Ultimately, it will help you know your people better and
Tags : 
    
Sage
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
En décembre2017, Dell a demandé à ForresterConsulting de mener une étude pour déterminer comment les organisations d'entreprises sont structurées en termes de services informatiques. L'étude a exploré deux types de profils technologiques, les contrôleurs numériques et les transformateurs numériques, ainsi que les tendances et défis rencontrés dans l'approvisionnement en ordinateurs. Les contrôleurs numériques sont souvent associés à l'approche descendante, la structure linéaire, et mettent l'accent sur la sécurité et l'exactitude. En revanche, les transformateurs numériques mettent l'accent sur l'innovation, s'orientent vers l'employé et le client, et donnent la priorité à la rapidité et la souplesse. En comprenant les deux groupes, les entreprises peuvent surmonter les défis qui découlent de la gestion du cycle de vie des ordinateurs. En investissant dans les outils de gestion des ordinateurs existants et en s'associant avec une entreprise spécialisée dans le déploiement et la gestion
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Los patrones de compra de ordenadores personales para empresas están cambiando, pues los compradores buscan mejorar la seguridad y la experiencia de los empleados al mismo tiempo. Con el aumento global en la movilidad de los empleados y la tendencia de las empresas a dirigir sus inversiones hacia las tabletas y los ordenadores portátiles, las organizaciones están evaluando su inversión constante en los ordenadores de sobremesa . Queda claro que los compradores de ordenadores personales para empresas siguen valorando la seguridad y el rendimiento que ofrecen los equipos de sobremesa. También dicen que los nuevos formatos de sobremesa, como el formato Micro , les permiten ofrecer una mejor experiencia para los empleados, lo que para ellos es casi tan importante como la seguridad. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Les technologies matérielles ne durent pas éternellement. Elles ont un cycle de vie mesurable, un début et une fin à leur productivité, donc à leur valeur. Il incombe au département IT d’optimiser le cycle de vie des PC tout en gérant les avancées stratégiques pour son entreprise. Étant donné qu'il doit composer avec le coût et la complexité liés à la gestion des PC, le département IT n’a que peu de temps à consacrer à l’innovation. Nous mettons à disposition des options de financement souples qui garantissent au département informatique de disposer de tout ce dont il a besoin au moment opportun, afin que les utilisateurs restent impliqués et productifs. En savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnologia hardware non dura per sempre, ma ha un ciclo di vita, un periodo misurabile di inizio e di fine in termini di produttività e valore. Il reparto IT ha il compito di ottimizzare il ciclo di vita delle risorse PC mentre promuove i passi avanti per la propria organizzazione. Tuttavia, il costo elevato e la complessità della gestione dei PC lasciano al reparto IT poco tempo per l'innovazione. Offriamo opzioni di finanziamento flessibili che consentono di garantire che il reparto IT possa sempre contare su ciò che serve, quando serve, per mantenere gli utenti finali impegnati e produttivi. Ulteriori informazioni sulle soluzioni Dell con tecnologia Intel®.
Tags : 
    
Dell EMC EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.