critical it

Results 351 - 375 of 1939Sort Results By: Published Date | Title | Company Name
By: Dassault Systèmes     Published Date: Nov 11, 2019
Getting transformation right in today's competitive world is critical, and one key factor is the ability to manage and use data to achieve enterprise Strategic Objectives. A Digital Twin is often at the very heart of the metamorphosis. Every single product has definable characteristics in the real world, and the Digital Twin combines and portrays the attributes virtually. In a perfect world, the Digital Twin would capture every single attribute of a product or system and its processes. In reality, the technology is still evolving to accomplish this vision and we're not there yet. That doesn't mean manufacturers can't proceed with and derive tremendous value from a simpler virtual model.
Tags : 
     Dassault Systèmes
By: Dassault Systèmes     Published Date: Nov 11, 2019
Learn about challenges, solutions and benefits of 7 DELMIA customers from different industries. Delivering quality products is important in all industries, but it is especially critical where consumer health and safety are affected. Automotive is one of those industries. That’s why Autoliv, a supplier of airbags and safety systems to all of the global automotive OEM’s, wanted to better manage quality and material flows, achieve greater traceability, and drive continuous improvement across its manufacturing plants. They have chosen DELMIA Apriso as their manufacturing execution platform. Autoliv has now an enterprise solution to streamline production operations from planning, to inventory and material flow management, to traceability and continuous improvement.
Tags : 
     Dassault Systèmes
By: Workday UK     Published Date: Jan 31, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : ibm, digital business, api economy, api management, apim, api, enterprise applications
     IBM
By: IBM     Published Date: Oct 26, 2016
Predictive analytics transforms organizations. Watch this video to see how predictive analytics can improve outcomes in four strategic areas critical to the success of your business: - Customer satisfaction and retention - More effective HR processes - Fraud and threat detection and prevention - Revenue growth and profitability
Tags : ibm, analytics, predictive analytics, enterprise applications
     IBM
By: IBM     Published Date: Jan 18, 2017
The synergy between predictive analytics and decision optimization is critical to good decision making. Predictive analytics offers insights into likely future scenarios, and decision optimization prescribes best-action recommendations for how to respond to those scenarios given your business goals, business dynamics, and potential tradeoffs or consequences. Together, predictive analytics and decision optimization provide organizations with the ability to turn insight into action—and action into positive outcomes. In this white paper, you’ll gain a better understanding of: The difference between predictive and prescriptive analytics How predictive and prescriptive actions complement one another to help you achieve optimized business decisions IBM’s approach to creating a powerful end-to-end decision management system
Tags : ibm, predictive analytics, decision optimization, synergy, decision making, business goals, prescriptive analytics, decision management
     IBM
By: IBM     Published Date: Jun 13, 2018
Today’s workloads are dynamic and power-hungry. Cloud requirements for mission-critical workloads often change overnight – causing IT priorities to shift, deadlines to tighten, and budgets to shrink. Seconds matter, especially when it comes to the bottom line. And bottom lines take brutal hits when companies haven’t properly established a powerful and flexible infrastructure.
Tags : 
     IBM
By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : technology, security, vulnerabilities, internet, virus, solutions, vulnerability management
     Qualys
By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
     BitSight Technologies
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This paper looks at how the cloud landscape is rapidly evolving to address the needs of critical enterprise applications. On the way, we’ll highlight some common cloud misconceptions. Finally,we’ll set out how IT leaders can create a clear, robust enterprise cloud strategy for their organizations that enables digital innovation and business transformation.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Optimizely     Published Date: Apr 06, 2018
We live in the age of the consumer. Across touchpoints, customer expectations for digital interactions and brand experiences are evolving. Today, it is critical for organizations to deliver high-performing, personalized encounters across the customer journey. To drive innovation and stay competitive, organizations need to reorient towards the customer—which means being able to understand their needs, adapt to their expectations, and quickly make improvements. But pinpointing where to make iterations across your tactics and digital entities like websites and landing pages can be a difficult task—especially in today’s multi-touch environment.
Tags : 
     Optimizely
By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
     Optimizely
By: Workday UK     Published Date: Nov 12, 2019
Now more than ever, it's critical to keep employees engaged and happy at every stage of their journey. The right technology gives you the tools to make that happen. View this infographic to see how a complete approach to employee engagement – from recruiting and hiring to onboarding and career development – helps create a winning experience.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Workday UK     Published Date: Mar 20, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: JBoss Developer     Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
Tags : middleware, java, big data, analytics, mobile development
     JBoss Developer
By: Workday     Published Date: Feb 04, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : workday, workforce technology, digital strategy
     Workday
By: Workday Netherlands     Published Date: Mar 20, 2019
New research reveals there’s a digital disconnect in many organisations – with the gap widening between the needs of digital leaders, and the ability of core business systems to support broader digital transformation programmes. Several critical challenges include: • 80% say they can’t integrate new digital solutions with existing finance and HR processes, or it requires effort to do so • 80% say they can’t get real-time forecasts and dashboards, or it requires effort to do so • 80% say they find it difficult or impossible to adapt finance and HR processes to new requirements Download now to learn how you can successfully drive digital transformation at scale – and avoid the dreaded digital deadlock.
Tags : workday, workforce technology, digital strategy
     Workday Netherlands
By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
     Rackspace
By: Pure Storage     Published Date: Jan 12, 2018
Apache Spark has become a critical tool for all types of businesses across all industries. It is enabling organizations to leverage the power of analytics to drive innovation and create new business models. The availability of public cloud services, particularly Amazon Web Services, has been an important factor in fueling the growth of Spark. However, IT organizations and Spark users are beginning to run up against limitations in relying on the public cloud—namely control, cost and performance.
Tags : data, storage, scalability, cost efficiencies, pure storage
     Pure Storage
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Novagalicia Banco secured critical applications with HP Fortify improving the security of the discrete applications that were coming from myriad sources
Tags : novagalicia, applications, hp fortify, financial service industry, saas, security, fortify on demand
     HP - Enterprise
By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall, security, data management
     F5 Networks Inc
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com