news

Results 51 - 75 of 306Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 3d secure, ca technologies, mobile, data management
     CA Technologies
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
These are troubling times if you are looking for talent. As I talk with organizations, one theme continues to come up: “We can’t fill open jobs… and people that join us don’t stay for very long.” All you have to listen to is one of the many economic reports that are on the news every day to hear that the economy is strong and jobs are plentiful.
Tags : human resources, employee engagement, talent management
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Accountability in marketing means one thing: Can you deliver on what you promised? The good news is that using a data management platform and data-driven marketing can help you improve accountability—especially when it comes to revenue. Because the more you know about your prospects, the more precisely you can market to them at the moment they’re ready to buy. Get this guide to see how revenue accountability can help you cut marketing costs by reducing waste and dramatically improving your ROI.
Tags : 
     Oracle Marketing Cloud
By: Oracle Marketing Cloud     Published Date: Oct 11, 2017
As more and more industries clamor to adopt an Account-Based Marketing program, B2B marketers must re-think how they drive revenue. According to SiriusDecisions, 92% of companies call ABM a B2B must-have—while 84% of B2B marketers say that ABM delivers higher ROI than any other approach. This is good news, but it gets even better. Now you can deliver Account-Based Marketing directly form your Marketing Automation System (MAS) using Demandbase and Oracle Eloqua. Download this infographic to see how you can optimize your ABM and MAS systems, align with sales, and drive revenue for B2B success.
Tags : 
     Oracle Marketing Cloud
By: TIBCO Software     Published Date: May 31, 2018
Reduced costs, increased subscribers and advertiser revenue
Tags : 
     TIBCO Software
By: RelayHealth     Published Date: May 31, 2013
Join RelayHealth for a recorded Healthcare Finance News webinar, Accelerating Service-to-Payment Velocity. With all of the changes happening in healthcare today, some things do remain the same. Your two primary sources of cash are still patients and third-party payers. While patient financial responsibility is rapidly increasing, a large percentage of revenue still flows in via governmental payers and commercial health plans.
Tags : accelerate payment, payment resolution, service-to-payment velocity, claims data, continuing education credit
     RelayHealth
By: Mimecast     Published Date: Nov 26, 2018
If you are among the IT professionals feeling a little uneasy about relying solely on the email security provided by Microsoft in Office 365™, you are not alone. Here’s the good news, you can regain the same sense of security that you had when you were managing email servers on-premises with the right third-party solution. TechTarget summarizes how you can easily and effectively realize the benefits of Office 365 with a complementary third-party solution that can not only mirror the kind of layered security built for on-premises solutions, but also ensure uninterrupted access to Office 365 email, even if it crashes.
Tags : 
     Mimecast
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure
     Cisco
By: Cisco     Published Date: Jul 01, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure
     Cisco
By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure
     Cisco
By: Cisco     Published Date: Jul 27, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure
     Cisco
By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
     Vectra Networks
By: Rackspace     Published Date: Apr 15, 2019
Scale events — like online sales and digital product launches — present great revenue opportunities, but they also present large risks to your business. Whether you are a retailer preparing for Black Friday and Cyber Monday, or a digital vendor launching a new service, your brand is both at its most visible and its most vulnerable during these scale events. Many more customers visit your site over a short period of time, raising the potential for resource constraints and discovery of software bugs. Information about issues spreads quickly via social media and news outlets. And, your customers typically spend more per transaction, so every lost order has a greater negative impact on your bottom line. Site reliability engineering (SRE) can help you better prepare for scale events through an iterative cycle of data-driven improvement.
Tags : 
     Rackspace
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Software delivery processes and systems, and the people involved with them, are under increasing pressure. Sometimes it’s digital transformation, other times it’s simply the challenge of keeping up with the demands created by ever more dynamic markets and an escalating pace of change. None of this is news, but is does provide an important backdrop to the discussion of how software delivery needs to evolve, especially given that traditional methods and approaches were never designed to deal with the fastmoving and unpredictable environment you are probably working in today.
Tags : delivery, testing, software development, integration, business solutions, ca technologies, continuous testing, testing effort
     CA Technologies EMEA
By: Fiserv     Published Date: Nov 09, 2017
Digital loan origination processes can still require significant manual support, which is often inaccurate and time-consuming. This National Mortgage News paper, sponsored by Fiserv, explains how you can improve your current loan production while reducing costs and risk of non-compliance.
Tags : loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, trid
     Fiserv
By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. BusinessNewsDaily.com notes that CIOs and business-minded technology leaders are moving beyond being supportive functions and into being an integrated part of overall business strategy and operations. IT is delivering added value, enhanced business performance, and greater security. This best practices paper outlines eight important ways that IT teams can make meaningful progress in their digital transformations."
Tags : digital, practices, professional, technology, esignature, docusign
     DocuSign UK
By: Resource     Published Date: Dec 04, 2018
What’s a common characteristic of the best talent? They all have jobs. In today’s marketplace, to get the best talent you have to convince them your opportunity is better than what they currently have. The good news: it can be done - and you can win consistently with a deliberate outbound process. The bad news: it requires an intentional approach which is challenging without the right tools and data. Your success depends on your ability to build a repeatable process to identify and recruit a steady volume of high quality applicants. The way to accelerate and scale your outbound process is to benchmark and refine it regularly using data. Below we’ll walk through the steps to building a data-driven recruiting process, based on.. you guessed it.. data.
Tags : 
     Resource
By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : anti-phishing, cyber security, secure email gateway, url filtering, mimecast
     Mimecast
By: Teradata     Published Date: May 02, 2017
even West Media (SWM) is Australia’s leading multiple platform media company with a market-leading presence in broadcast television, magazine and newspaper publishing, and online. To support its unprecedented broadcast of the Rio de Janeiro 2016 Olympic Games, SWM integrated the world’s first production implementation of the Teradata Database running on Amazon Web Services (AWS) into its existing data ecosystem. This enabled the delivery of critical insights during the event and helped directly drive audience engagement with SWM’s digital products, resulting in the creation of a powerful audience asset that that now informs their broadcasting, marketing, and advertising plans. Find out how with in this case study.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Teradata
By: Sage People     Published Date: May 15, 2018
Your customers won’t rave about a simple payment experience. But they will make a lot of noise about a bad experience. And your conversion rates and sales will take a hit. These payment niggles have a particularly big impact on retailers with ambitious growth targets. The good news is, growing retailers can easily upgrade their payment systems to boost CX.
Tags : 
     Sage People
By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
     Redstor UK
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue
     newScale
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com