company

Results 1 - 25 of 2650Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 20, 2015
In this white paper, we look at various cloud models, and assess their suitability to solve IT challenges. We provide recommendations on what to look for in a cloud provider. Finally, we take a look at the IBM Cloud portfolio.
Tags : 
     IBM
By: Bull     Published Date: Dec 04, 2014
Bull, an Atos company, is a leader in Big Data, HPC and cyber-security with a worldwide market presence. Bull has extensive experience in implementing and running petaflopsscale supercomputers. The exascale program is a new step forward in Bull’s strategy to deliver exascale supercomputers capable of addressing the new challenges of science, industry and society.
Tags : bull, exascale, big data, hpc, cyber security, supercomputers
     Bull
By: IBM     Published Date: Nov 14, 2014
A high performance computing (HPC) cluster refers to a group of servers built from off-the-shelf components that are connected via certain interconnect technologies. A cluster can deliver aggregated computing power from its many processors with many cores — sometimes hundreds, even thousands — to meet the processing demands of more complex engineering software, and therefore deliver results faster than individual workstations. If your company is in the majority that could benefit from access to more computing power, a cluster comprised of commodity servers may be a viable solution to consider, especially now that they’re easier to purchase, deploy, configure and maintain than ever before. Read more and learn about the '5 Easy Steps to a High Performance Cluster'.
Tags : 
     IBM
By: VMware     Published Date: Sep 12, 2019
Whether a CIO is on a four-year trajectory or has plans to stay much longer, there’s a way to thrive in this role as business priorities continuously evolve. I advocate producing early wins, setting sights on specific goals at specific points in time, and delivering on those goals whether you plan to be at a company for the long term or expect to move on soon after passing the four-year mark.
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
     VMware
By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
     KPMG
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: Kazoo     Published Date: Oct 11, 2019
Are you ready for a new Recognition & Rewards Platform? Recognition and rewards are an integral part of your company’s employee experience and engagement levels. To determine whether an HR technology provider is the right fit for your organization, we recommend asking questions that address the various components of recognition and rewards, as well as background on the provider’s company and technology. Download our buyers guide for the five major areas you'll need to cover before making a purchase, including: The business value and ROI of recognition & rewards Identifying your need and specific goals for an employee experience program Key questions to ask engagement platform vendors A decision checklist and a detailed comparison sheet Two budgeting exercises to justify your investment
Tags : 
     Kazoo
By: Kazoo     Published Date: Oct 11, 2019
Are you ready for a new Performance Management technology provider? To determine whether an HR technology provider is the right fit for your organization, we recommend asking questions that address the various components of performance management, as well as background on the provider’s company and technology. Download our buyers guide for must-ask questions on: • Performance Management philosophy • Strategic value • Implementation and support • Feature set • Accessibility and reporting • Integrations • and more!
Tags : 
     Kazoo
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Vivek Raman, Head of Security for Yelp explains how they built automation into the company's security practice with Cisco Umbrella.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Employees in every industry are expected to work quickly, but they’re often frustrated by company-issued apps. As a result, they’re downloading personal apps to get the job done instead of using secure, enterprise-approved tools. It’s called shadow IT, and it’s gaining traction fast.
Tags : 
     Cisco Umbrella EMEA
By: BillingPlatform     Published Date: Jul 30, 2019
Focus less on maintenance and operation and more on innovation and growth with automated billing processes. Automation can greatly improve productivity and help your company save money. If you have a complex billing process, your enterprise will benefit greatly from automating as much of your billing as possible. Download this whitepaper and discover the following: • Billing challenges most companies face • Benefits delivered with automated billing processes • Implementation strategies that support automation • Four features critical to billing automation success An agile and automated billing platform simplifies complex processes, dramatically reducing operating expenses and increasing your speed to market. Discover how today.
Tags : 
     BillingPlatform
By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
     Mimecast
By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Jul 22, 2019
Global producer of polycrystalline silicon for semiconductors, Hemlock Semiconductor needed to accelerate process optimization and eliminate cost. With TIBCO® Connected Intelligence, Hemlock achieved centralized, self-service, governed analysis; revenue gains; cost savings; and more. Fueled by double-digit growth in the markets it serves, Hemlock Semiconductor is adapting to the increasing commoditization within the polysilicon industry and better positioning itself to compete. A key factor in this plan is to equip process-knowledgeable personnel with the skills and tools to accelerate delivery of process optimizations and associated cost elimination. Hemlock turned to a TIBCO® Connected Intelligence solution to address the challenges. By implementing TIBCO Spotfire® and TIBCO® Streaming analytics, TIBCO® Data Science, and TIBCO® Data Virtualization, the company created more self-service analytics. Adding TIBCO BusinessWorks™ integration let the company realize the vision of connect
Tags : 
     TIBCO Software
By: PwC     Published Date: Oct 03, 2019
Selling your company takes robust planning and discipline. Whether you are divesting the business completely or bringing in a private equity investor to fuel additional growth, the process you develop and follow will play a critical role in creating value for your shareholders and family. We hope that PwC's "Exit strategies for owners of private companies" guide serves as a useful starting point for the conversations you will have with your stakeholders, trusted employees and family, as well as your advisers as you realize the value you’ve worked hard to create.
Tags : 
     PwC
By: Workday APAC     Published Date: Oct 07, 2019
Limited visibility into the talents of the workforce made HR transformation difficult. The company has been relying on multiple legacy systems as a result of multiple mergers and acquisitions, and multiple HR departments. That's where Workday comes in.
Tags : 
     Workday APAC
By: Workday APAC     Published Date: Oct 07, 2019
"How does Patagonia create its enviable culture for 2,500 employees across the world, achieve a 4 percent corporate turnover, and manage to provide on-site childcare? We sat down with Dean Carter, Patagonia’s head of Shared Services for Finance, HR, and Legal, to find out what life is like at the “un-company” and learn Patagonia’s secret for HR success."
Tags : 
     Workday APAC
By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Basic diagramming tools allow business users to define an initial business process and provide a good path to getting your processes off of sticky notes and into a digital format. However, if company-wide collaboration, real-time change management and integration with automation tools are important to you, a dedicated process modeling tool may be your better choice.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
AI innovation in retail starts with a tech-forward company culture, from C-suite stakeholders down to every employee. AI greatly enhances a retailer’s ability to harness data for better merchandising, marketing, and customer service. It will not only complement existing retail jobs but introduce brand new roles and skill sets into the human workforce.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Organizations in the global industrial products industry face significant challenges: cost pressures, increased regulations, disruptive technologies and the increasingly costly delivery of raw resources. High volatility in commodity prices has put severe pressure on company margins and can quickly expose inefficient operations.
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence (AI), automation, Internet of Things (IoT), blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies.
Tags : 
     Group M_IBM Q4'19
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Oracle     Published Date: Sep 25, 2019
The digital age will transform your supply chain. With hyperconnected, intelligent data at the heart of your logistics you’ll drive your company’s success. Our latest research reveals how today’s supply chain leaders create innovation, consistency and value by employing connected data. It addresses key organisational challenges that you need to be aware of. These include how to disrupt the culture of not just your team, but your whole company, to transform it into a data leader. This is a guidebook for the future of responsive, hyperconnected supply chains. Discover how to become a supply chain leader now.
Tags : 
     Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com