high tech

Results 501 - 525 of 537Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management, as-a-service, asset investment planning
     IBM
By: Riverbed     Published Date: Apr 14, 2017
"As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services. But what IT leaders are failing to grasp is that this cultural shift also requires modifications to the underlying application performance management (APM) technologies and processes that have historically been used to manage IT service delivery. Read this analyst paper to explore: Key challenges IT organizations face as they roll out DevOps practices Additional APM tools and capabilities needed to support DevOps Recommendations for forming the right organizational structure and processes"
Tags : 
     Riverbed
By: Adobe     Published Date: May 15, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate, customer engagement, online marketing
     Adobe
By: Adobe     Published Date: Aug 14, 2014
Adobe received the highest score for current digital experience (DX) delivery offerings in The Forrester Wave™: Digital Experience Delivery Platforms, Q3 2014 report. And, we’re continuing to innovate. Since the evaluation, we’ve launched several new capabilities that include richer support for mobile apps, increased usability through visual workflows, and a master marketing profile. Read the report to see why Adobe was named a Strong Performer and to learn more about: -The DX challenges that companies face and how they’re addressing them -The array of tools and technologies available in digital experience delivery platforms -The journey to unified, cross-channel digital experiences “Strategically, Adobe differentiates with its vision of the connective tissue between its tools, and its aim for single customer profile.” – Forrester Research, Inc.
Tags : digital experience, delivery platforms, mobile apps, software vendors
     Adobe
By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : online marketing, marketing practices, mobile usage trends
     Adobe
By: Epicor     Published Date: Aug 22, 2018
In the world of retail, the only returns you want are returns on your business investments. With Epicor Eagle N Series, you get precisely that—a tool that is engineered to go the distance, hit revenue and profit targets, keep customers coming back, and deliver great returns on your technology investment. The latest technology advances, and higher customer expectations, make it critical to have a solution in place meets your business goals and your customer’s needs. This eBook details seven way you can make your Point of Sale system deliver growth and profits including-- • Easy-to-use inventory management tools • Ability to streamline and simplify everyday processes • Keep customers coming back with customized loyalty programs Download the eBook and take advantage of the years of experience Epicor has providing technology for retailers and understanding their needs.
Tags : retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
     Epicor
By: Epicor     Published Date: Sep 20, 2018
In the world of retail, the only returns you want are returns on your business investments. With Epicor Eagle N Series, you get precisely that—a tool that is engineered to go the distance, hit revenue and profit targets, keep customers coming back, and deliver great returns on your technology investment. The latest technology advances, and higher customer expectations, make it critical to have a solution in place meets your business goals and your customer’s needs. This eBook details seven way you can make your Point of Sale system deliver growth and profits including-- • Easy-to-use inventory management tools • Ability to streamline and simplify everyday processes • Keep customers coming back with customized loyalty programs Download the eBook and take advantage of the years of experience Epicor has providing technology for retailers and understanding their needs.
Tags : retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
     Epicor
By: Epicor     Published Date: Sep 20, 2018
In the world of retail, the only returns you want are returns on your business investments. With Epicor Eagle N Series, you get precisely that—a tool that is engineered to go the distance, hit revenue and profit targets, keep customers coming back, and deliver great returns on your technology investment. The latest technology advances, and higher customer expectations, make it critical to have a solution in place meets your business goals and your customer’s needs. This eBook details seven way you can make your Point of Sale system deliver growth and profits including-- • Easy-to-use inventory management tools • Ability to streamline and simplify everyday processes • Keep customers coming back with customized loyalty programs Download the eBook and take advantage of the years of experience Epicor has providing technology for retailers and understanding their needs.
Tags : retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
     Epicor
By: Epicor     Published Date: May 21, 2019
In their report, “Magic Quadrant for Cloud ERP for Product-Centric Midsize Enterprises,” ¹ Gartner recognized Epicor as a Visionary in the cloud ERP marketplace. Additionally, Epicor scored highest in the ERP Functionality use case in Gartner's critical capabilities report. ² We believe Gartner’s positioning of Epicor ERP reflects our focus on providing solutions that fit manufacturing businesses to drive growth with greater ease. Read the report from Gartner to learn more. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GART
Tags : cloud, erp, magic quadrant, visionary, epicor
     Epicor
By: HPE     Published Date: Feb 11, 2015
Delivering high-quality services with greater speed and efficiency is one of the greatest pressures facing your information technology (IT) infrastructure. The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success. Traditional, siloed IT infrastructures are often too labor intensive, inefficient, and slow to overcome these challenges. Organizations need a converged, cloud-ready, software defined infrastructure to help them meet the evolving demands of their business. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. Sponsored by: HP and Intel® Xeon® processor HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP’s
Tags : 
     HPE
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking
     McAfee
By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
     Tyco Integrated Security
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
     VMware SD-WAN by VeloCloud
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
     VMware SD-WAN by VeloCloud
By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 04, 2015
Current approaches for predicting with a high degree of confidence the application performance prior to implementation into production can be antiquated, expensive and time consuming. This document outlines a next-generation performance management approach using Service Virtualization and Application Performance Management being adopted by progressive organizations around the world. Adopting a next-generation performance management approach can offer a range of benefits including efficiency gains in delivering applications, cost savings, improved agility and better performing applications. For organizations that increasingly rely on technology to provide value to stakeholders improving application delivery capability is critical to remaining competitive and relevant.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
     CA Technologies
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
     Intel Security
By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : aberddeen, data center, datacenter, cloud, server security, networking, data management
     Intel Security
By: Samsung     Published Date: Feb 02, 2016
New high-brightness displays built for use outdoors or in other high ambient light environments are now enabling businesses to take the message outdoors.
Tags : samsung, display, digital, outdoor tech
     Samsung
By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : ibm, forrester, apache spark, spark technology, z systems, security, enterprise applications
     IBM
By: Genesys     Published Date: Dec 20, 2018
Successfully implementing and managing a comprehensive suite of customer experience technologies is essential for global businesses seeking to sustain high levels of customer experience and brand value. However, knowing how to temper the instinct to throw technology solutions at efficiency problems is what distinguishes global customer experience leaders from the rest. New technologies must be balanced with appropriate investment in human resources. This is the central finding of a global survey of over 550 senior executives conducted by MIT Technology Review to examine the pressures that shape their customer experience processes and the tools and strategies they employ to mitigate those challenges and continuously improve customer engagement. Read the report to get a detailed look at: • The strategies that differentiates an Iconic firm from other businesses • How strategies vary across regions based on maturity and customer expectations • Future innovation management and technology
Tags : 
     Genesys
By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Becoming a high-performing team or organization is more than implementing a new process or initiative. Simply launching another program without vision, purpose, connection, meaning, communication, and belief —is just another program, and people see it for just what it is—and the chances that you will be able to move the organization forward are pretty slim. As an organization, how do you make sense of technology, culture, innovation, performance, the talent marketplace, demographics, and the need to deliver results?
Tags : 
     Oracle HCM Cloud
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
     CrowdStrike
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com