pervasive

Results 26 - 50 of 125Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
     Oracle
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: SWsoft     Published Date: Aug 08, 2007
As virtualization becomes more pervasive in the datacenter, organizations are deploying complementary types of virtualization technologies. Read this white paper to learn how blending application and OS virtualization using Citrix and Virtuozzo will provide stronger and more robust virtualization solution.
Tags : os virtualization, virtualization, citrix, best practices, swsoft, sw soft, application virtualization, server virtualization, network management, paravirtualization
     SWsoft
By: Ephesoft     Published Date: May 31, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
     Ephesoft
By: Ephesoft     Published Date: Jun 01, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
     Ephesoft
By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : saas, data center automation
     Apstra
By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
     Mimecast
By: Gigamon     Published Date: Sep 03, 2019
Banking institutions worldwide are expanding their digital capabilities to meet evolving customer expectations and keep pace with new digital banking trends. As financial services firms increasingly embrace a multicloud strategy to achieve greater agility and cost savings, pervasive visibility across data centres and cloud environments is paramount to meet evolving security and compliance requirements.
Tags : 
     Gigamon
By: SAP     Published Date: Jul 18, 2016
Retail is a data-intensive industry. Knowing the customer better than competition and having the ability to orchestrate business decisions is the new retail competitive battlefield. Read the white paper to learn customer insights on the future of retail analytics.
Tags : 
     SAP
By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage
     Commvault
By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
     FireEye
By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
     CA Technologies EMEA
By: Dell-Intel     Published Date: Jun 19, 2009
Despite progress in virtualization, much development still remains. With predictions that virtualization will become pervasive, this research highlights forthcoming challenges and strategic issues facing IT planners. Register now for this free Gartner report sponsored by Dell and Intel to receive important advice on how to deal issues such as heterogeneity, resources and performance optimization, and the increasing fragmented tool market.
Tags : dell, intel, virtualization, gartner, it planner, server virtualization, servers, ovf, itil, vmware, xen, vmotion, homogeneity, x86, cloud migration, cloud
     Dell-Intel
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
     McAfee
By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
     Blue Jeans Network
By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
     Blue Jeans Network
By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
     Waterline Data & Research Partners
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
     F5 Networks Singapore Pte Ltd
By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how to successfully extend your deployment of Group Policy to your servers by implementing end-to-end management of this pervasive technology, including advanced offline management and real-time monitoring of authorized and unauthorized changes.
Tags : group policy, policy management, security management, servers, server management, netiq, net iq
     NetIQ Corporation
By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
     HP and Intel ®
By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
In today's hyper-connected world, with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms, people expect immediate access to information and services.
Tags : autonomic management, storage, service, virtualization, automation, standardization, consolidation, internal services, external services, it service, multi-tenancy, federation, efficiency, flexibilty, agility, utiity storage, data management
     HP and Intel® Xeon® processors
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Encryption, if properly deployed and managed, is one of the most powerful tools that organizations can use to avoid costly and embarrassing data breaches. Yet organizations struggle with the complexity associated with the technology that often stems from a history of siloed investments of point solutions designed to largely address pools of regulated data associated with a compliance mandate.
Tags : 
     Group M_IBM Q418
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com