line data

Results 51 - 75 of 776Sort Results By: Published Date | Title | Company Name
By: Workday Netherlands     Published Date: Jul 05, 2019
"How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders "
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday     Published Date: Jul 05, 2019
How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders
Tags : workforce-technologie, digitale strategie
     Workday
By: Pure Storage     Published Date: Jul 03, 2019
Splunk® has become a mission critical application. Thousands of organizations are gaining insight from their machine data and transaction logs using Splunk, and many more are planning to deploy Splunk. No matter what stage you’re in, having guidelines to follow can help improve the Splunk experience. Since a mission critical data application deserves a mission critical data platform, Pure Storage® built the solution on the Pure FlashStack™ converged infrastructure solution. FlashStack is a joint offering from Cisco® and Pure Storage. This paper is intended to provide a framework for designing and sizing a high-performance, scalable, and resilient Splunk platform. Pure Storage is a leading all-flash array provider focused on reducing storage complexity while improving Splunk performance, resiliency, and efficiency. To assure that your Splunk platform is sized appropriately, Pure Storage tested Splunk Enterprise on Pure’s FlashStack platform. The top takeaways from these efforts are tha
Tags : 
     Pure Storage
By: MuleSoft     Published Date: Jun 27, 2019
As the leading CRM system, Salesforce can accelerate and increase sales, enhance customer loyalty, and grow marketing capabilities. But how can businesses extend Salesforce to streamline business processes and maximize services and solutions? Effective and efficient integration of Salesforce with adjacent enterprise systems — such as databases, ERP and CRM systems, and custom applications — is critical to enabling sales teams, increasing revenue, and better serving customers. Across the broad spectrum of Salesforce integration needs, patterns emerge for how to best address integration challenges. Integration patterns are the most logical sequence of steps to solving a specific type of integration problem. Learn how to synchronize CRM systems, migrate from legacy CRM systems, broadcast ERP data into your CRM system, and more. Download the whitepaper now.
Tags : 
     MuleSoft
By: Adobe     Published Date: Jun 26, 2019
Customers expect to have the same experience with a store no matter where they are shopping – in a brick and mortar location, on the store’s website via laptop or on the store’s app via mobile device. Combining online and offline data helps retailers stay informed about their customers so they can drive customer loyalty and increase revenue.
Tags : 
     Adobe
By: Adobe     Published Date: Jun 26, 2019
Put your data in the hands of those who need it most, so they can act quickly to deliver great customer experiences. And a better bottom line. Data is no longer the domain of a few. Everyone in your organization should be thinking about it. And more importantly, acting upon it. This means taking data insights out of the realm of data scientists and making them a natural part of everyone’s workflow — from the marketing department to the executive team. To seize and capitalize on the data you already have, it’s important for analysts and marketers to rethink data—shifting from a reporting mindset to an action mindset. 74% of organizations want to be data driven, yet only 29% say they’re good at connecting analytics to action.
Tags : 
     Adobe
By: Samsung     Published Date: Jun 20, 2019
We are witnessing the digitisation of the entire retail ecosystem. While many have long debated whether online or offline will ‘win’ the retail battle, it is becoming clear that the future face of retail is a seamless merger of the two. Converge with data and logistics and you have a single, integrated overview that forms the blueprint for the next wave of disruption in retail. Samsung Display Solutions provide a digital canvas for retailers to create their own immersive experiences. To find out how download this whitepaper today!
Tags : samsung, display solutions, retail ecosystem
     Samsung
By: Google - SAP     Published Date: Jun 20, 2019
According to SiriusDecisions, 79% of companies miss their forecast by 10% or more. Pipeline management is often mismanaged and sales forecasting often off-base. Getting accurate and reliable information about the state of the deals in your pipeline is the key to a happy sales force. Accurate pipeline information also is the foundation of predictable and reliable sales forecasts. Wouldn’t a sales forecast that’s right all of the time be a boon to your organization? Download our new eBook “Pipeline Management and Forecasting are Key to Improving the Sales Experience” to find out how automated tools, AI, and clean data sets can help you as a sales manager to: ? Eliminate the mid-pipeline “black hole” and find out what’s really going on ? Use signals outside of your CRM to get scarily accurate deal opportunity scores and quarterly forecasts. ? Help align the customer journey with your sales process and get happy customers and happy sales reps
Tags : 
     Google - SAP
By: Workday     Published Date: Jun 14, 2019
Putting people analytics into practice can be difficult, but this eBook outlines six key steps that can guide you through the journey. Learn how to demystify the tools and processes that help you derive insights from your people data. Read now.
Tags : 
     Workday
By: Workday     Published Date: Jun 14, 2019
Putting people analytics into practice can be difficult, but this eBook outlines six key steps that can guide you through the journey. Learn how to demystify the tools and processes that help you derive insights from your people data. Read now.
Tags : workday, workforce technology, digital strategy
     Workday
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : mapping, public saftey, location data
     HERE Technologies
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : mapping, public saftey, location data
     HERE Technologies
By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
     AWS
By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
     CheckMarx
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Domino Data Lab     Published Date: May 23, 2019
Lessons from the field on managing data science projects and portfolios The ability to manage, scale, and accelerate an entire data science discipline increasingly separates successful organizations from those falling victim to hype and disillusionment. Data science managers have the most important and least understood job of the 21st century. This paper demystifies and elevates the current state of data science management. It identifies best practices to address common struggles around stakeholder alignment, the pace of model delivery, and the measurement of impact. There are seven chapters and 25 pages of insights based on 4+ years of working with leaders in data science such as Allstate, Bayer, and Moody’s Analytics: Chapters: Introduction: Where we are today and where we came from Goals: What are the measures of a high-performing data science organization? Challenges: The symptoms leading to the dark art myth of data science Diagnosis: The true root-causes behind the dark art m
Tags : 
     Domino Data Lab
By: HERE Technologies     Published Date: May 23, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com