aid

Results 51 - 75 of 519Sort Results By: Published Date | Title | Company Name
By: ServiceNow     Published Date: Oct 06, 2015
Les outils de gestion du support des services informatiques (ITSSM) sont essentiels pour les organisations Infrastructure et Opérations (I&O) afin de gérer la prise en charge et la prestation des services informatiques. Cette étude Magic Quadrant dresse le profil des principaux fournisseurs d'outils ITSSM afin d'aider les responsables I&O à faire des choix pertinents.
Tags : 
     ServiceNow
By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
     Pega
By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
     Akamai Technologies
By: Stripe     Published Date: Aug 06, 2019
Platform businesses are reshaping our economy and disrupting entire markets by seamlessly connecting buyers and sellers. However, processing payments and the exchange of value on a platform or marketplace can be challenging. Stripe commissioned Forrester Consulting to evaluate the challenges that platforms and their sellers face, and the solutions they seek. Through a global online survey of 2,030 platform sellers and four in-depth interviews, Forrester found that platforms struggle to provide their sellers with much-needed payment capabilities, reporting, and customer support services with in-house resources alone. Meanwhile, sellers demand that platforms provide these services and will prefer platforms that are service-rich over platforms that are service-poor. KEY FINDINGS • The complexities of managing a platform force executives to divert resources, which stalls growth. • Going global is easier said than done. • Sellers will flock to platforms that simplify the process of sellin
Tags : global payments inc, payment solutions, payment processing, platform as a service (paas), platforms
     Stripe
By: Sage EMEA     Published Date: Jan 29, 2019
Sage pays close attention to what your business demands For nearly 40 years, Sage has followed through on its founding commitment: Making sure we deliver what our customers need. That dedication has helped us become one of the world’s largest suppliers of enterprise management solutions, used by more than 3 million businesses of all types and sizes around the world. Sage helps drive today’s business builders with a new generation of solutions to manage everything from money to people wherever they’re needed, offering the freedom to work with mobility. Above all else, we’re driven to satisfy our customers and keep them coming back. That commitment has paid off. We beat SAP (19), Oracle (25) and Microsoft (34) with our Net Promoter Score (NPS)—a respected customer-satisfaction, customer-experience, and loyalty indicator widely used by Fortune 500 companies. The industry NPS average is 31.75, meaning we are 58% better than the average, and 88% above our closest competition. It shows t
Tags : 
     Sage EMEA
By: Dell EMC     Published Date: May 09, 2019
In such a competitive business market, retaining the best talent is crucial. Knowing what makes them want to walk out the door is the first step in keeping them. The good news is that business leaders recognize the peril they face - and the need to do something about it. In a recent survey, 45% said they fear becoming obsolete in three to five years; 73% agree on the business need to prioritize technology, and 66% are planning to invest in IT infrastructure and digital skills leadership. However, investment without strategy is unlikely to succeed. Because innovation comes from people, investment must foster human creativity. Investment in technology that enables workers to address new challenges in new ways will give rise to new business initiatives, happier customers, and superior corporate financial performance. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
     Dell EMC
By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : fireeye, spear phishing attacks, cybercriminals, malware, malicious activities, security
     FireEye
By: Oracle     Published Date: Aug 09, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : oracle, talent cloud, cloud, talent management
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : oracle, talent cloud, cloud, talent management, enterprise applications
     Oracle
By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care
     GE Healthcare
By: Pega     Published Date: May 24, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
     Pega
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: Schneider Electric     Published Date: Oct 28, 2019
Utilisez notre outil de compromis pour calculer une variété de scénarios à l’aide de données réelles pour voir combien d’argent vous pourriez économiser – ou gaspiller. Vous pouvez même constater l’impact environnemental des différentes solutions de refroidissement. Êtes-vous prêt à calculer les coûts ? Remplissez le formulaire pour accéder à notre calculateur de PUE en mode économiseur de refroidissement.
Tags : des centres de données, colocation, schneider electric
     Schneider Electric
By: Schneider Electric     Published Date: Oct 28, 2019
Ce rapport peut vous aider à relever les défis de l’avenir, à dépasser les attentes de vos clients et à trouver des moyens de coexister avec des solutions de centres de données concurrentielles. 451 Research recueille des informations auprès des acheteurs et des décideurs du monde de la colocation et résume les étapes à suivre pour les centres de données de colocation.
Tags : des centres de données, colocation, schneider electric
     Schneider Electric
By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
     Entrust Datacard
By: Adobe     Published Date: Jan 27, 2014
Make the most effective use of your budget to meet business goals
Tags : media optimizer, paid media, media optimization, technology, marketing
     Adobe
By: Adobe     Published Date: May 13, 2015
This paper discusses the features of Digital Publishing Suite that enable companies to drive sales impact through tablets.
Tags : sales apps, digital sales tools, driving sales through tablets, dps, digital publishing suites
     Adobe
By: Cleversafe     Published Date: Dec 07, 2012
The business case for why IT Executives are making a strategic shift from RAID to Information Dispersal
Tags : data, storage, information, digital, growing, software development, it management
     Cleversafe
By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications
     Cleversafe
By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage
     Cleversafe
By: Socialbakers     Published Date: Jul 22, 2015
In this report, we dive deep into the unique baby food marketing environment to find how the best social marketers at baby food brands build communities, engage new and existing audiences, and optimize their paid strategy.
Tags : social media, social, social marketers, engagement, get value from social marketing
     Socialbakers
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: Red Hat     Published Date: Feb 22, 2019
Dans ce rapport d’analyse, IDC se penche sur le défi auquel font face les entreprises actuellement pour équilibrer leurs investissements dans les infrastructures en place dans le but d’améliorer l’efficacité et de moderniser leur datacenter, tout en répondant simultanément au besoin d’adopter de nouvelles techniques de développement et de déploiement des technologies apportant la promesse d’améliorations significatives en termes de productivité des développeurs, d’agilité opérationnelle et de gestion des cycles de vie à moindre coût. IDC fournit des informations approfondies sur les options à la portée des entreprises pour atteindre ces objectifs à l’aide d’une infrastructure capable de prendre en charge les applications actuelles et celles de prochaine génération, ainsi que sur le rôle joué par la standardisation et la modernisation dans l’atteinte des objectifs d’optimisation opérationnelle.
Tags : 
     Red Hat
By: Dell EMEA     Published Date: Mar 05, 2019
Le groupe Dell Technologies s’est récemment allié à l’IFTF (Institute for the Future) et à 20 experts du monde entier pour se projeter dans le futur, prévoir comment l’émergence de nouvelles technologies (telles que l’IA et l’Internet des objets, ou IoT) changera notre façon de vivre et de travailler d’ici à 2030, et recueillir des avis qui aideront les entreprises à traverser la prochaine décennie. Selon les experts, nous nous trouvons à la lisière de la prochaine ère des partenariats entre hommes et machines. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
     Dell EMEA
By: Hamilton Captel     Published Date: Oct 29, 2019
It’s long been suspected that depression is a condition linked to untreated hearing loss. Recently, a number of studies have not only supported that conclusion — there’s evidence to strongly suggest a causal relationship. This white paper, sponsored by Hamilton® CapTel®, explores these studies, the data they captured, and most importantly, how hearing healthcare professionals are uniquely positioned to help.
Tags : 
     Hamilton Captel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com