familiar

Results 1 - 25 of 144Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 05, 2014
An executive summary of the results of a survey conducted by Desktop Engineering to gauge its audience’s familiarity with high performance cluster computing and its benefits.
Tags : ibm
     IBM
By: IBM     Published Date: Nov 14, 2014
The necessary compute power to drive modern biomedical research is a formidable and familiar challenge throughout the life sciences. Underlying infrastructures must evolve to keep pace with innovation. In such demanding HPC environments, Cloud computing technologies represent a powerful approach to managing technical computing resources. This paper shares valuable insight to life science centers leveraging cloud concepts to manage their infrastructure.
Tags : 
     IBM
By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache
     BitGravity
By: Esker     Published Date: Jun 14, 2019
Customer and supplier portals are one of the many fruits borne from the age of digital transformation. However, the level of accommodations that portals provide to customers and suppliers has spawned a whole new set of challenges that didn’t exist less than a decade ago. Chief among these is something referred to as “portal fatigue.” Many AR departments and CSR teams are painfully familiar with the term, as it’s often their job to either retrieve orders from a customer portal or submit invoices directly into customers’ AP systems. On paper, these tasks don’t seem all that odious. But when you consider the amounts of different portals being used, and the fact that not every user is trained on each portal, it’s easy to see why portal fatigue is a very real and concerning problem for today’s businesses.
Tags : 
     Esker
By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Nov 13, 2017
If this snapshot of working life looks familiar, keep reading. Cisco® technology can help the busiest executives not only stay in touch, but also get work done throughout the day.
Tags : cisco, spark, daily, workplace, employee, management, optimization, efficiency
     Cisco EMEA
By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
     BigCommerce
By: Coupa     Published Date: Dec 14, 2018
Visibility remains a huge challenge for CFOs in today’s dynamic and ever-evolving business environment. A study of more than 500 CFOs and senior finance executives conducted by the Economist Intelligence Unit (EIU) and commissioned by Coupa, reveals that more than 60 percent of CFOs lack complete visibility into the transactions within their organization. Sound familiar? Read the report to learn how CFOs are responding in a rapidly evolving world where new technologies, uncertainty, and emerging threats abound. The report also includes five qualitative interviews with the CFOs from Ally Financial, Driftwood Acquisitions and Development, Hays, Micron Technologies, and Zendesk.
Tags : 
     Coupa
By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : poneman, credential stuffing, it security, damage mitigation, research report
     Akamai Technologies
By: Workplace by Facebook     Published Date: Jun 17, 2019
Workplace connects everyone in an organization using familiar Facebook features like video calling, instant messaging, posts and groups. It works with other tools you already love, providing a simple and secure way for people to share knowledge, work together and build connected communities.
Tags : 
     Workplace by Facebook
By: Workplace by Facebook     Published Date: Jun 26, 2019
To meet the work challenges of the future, business leaders need to create resiliency by connecting their employees. But they also need to make sure those employees are bought in to the strategy. That’s why the IC department has a huge role to play. Workplace connects everyone in an organization using familiar tools like instant messaging, posts and video calling. We’ve identified six attributes that are critical to building connected organizations, and which act as the cornerstones for digital transform initiatives. Download this whitepaper to find out more.
Tags : 
     Workplace by Facebook
By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
     Lenovo UK
By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
     Hewlett Packard Enterprise
By: Frontier Communications     Published Date: Dec 22, 2016
Miscommunications? Inefficiencies? Sound familiar? The same set of issues can plague multi-location businesses. Here are a few ways to keep your locations working together.
Tags : 
     Frontier Communications
By: Pentaho     Published Date: Feb 26, 2015
Ventana’s benchmark research on big data integration will help you become familiar with the tools and technologies you need to help your organization succeed with big data.
Tags : benchmark research, big data integration, big data, business intelligence systems, business analytics, data integration
     Pentaho
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Global Payments     Published Date: May 02, 2019
Doing business across borders presents a whole host of unfamiliar challenges to today’s merchant. As technological advancement and increasing globalization unlock international markets, it’s tempting to imagine that a business model successful in one region can simply be transplanted into another. Not so. The logistics of domestic and international transactions have changed, and so too have customer expectations and preferences. Customer and merchants pain points have transformed and multiplied. In this report, we explore some of the core challenges businesses today face in their quest to succeed in global commerce. We offer an overview of how unified commerce can both resolve these issues and offer new advantages and standards of best practice, enabling your business to meet the demands of tomorrow’s customer, no matter their location, preferred payment method, and mode of contact.
Tags : unified commerce, global commerce, payment convenience, payment speed, global payments technology, retail, wechat pay, alipay, chinese wallets, mobile payments, international payment solutions, international payment systems, payments, online payments, omnichannel commerce
     Global Payments
By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : software, asset management, software asset management, webinar, software development, it management, data management
     ServiceNow
By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security
     Webroot
By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
     CA Technologies EMEA
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com