prepare

Results 426 - 450 of 578Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Nov 27, 2017
Revenue recognition is no walk in the park. We know—we’ve been there. Workday was one of the first companies to adopt the new standard, ASC 606. Read this whitepaper to help you prepare for the transition to ASC 606 and IFRS 15. Discover the challenges other companies are facing, what they’re doing to make the change, and the key things you need to consider as you prepare.
Tags : asc 606, ifrs 15, prepare, transition
     Workday
By: Workday     Published Date: Mar 01, 2018
: Read this whitepaper to understand ASC 606 and IFRS 15, identify how to prepare for the transition, and find out how other companies are handling the change
Tags : asc 606, ifrs 15, transition
     Workday
By: IBM     Published Date: Sep 11, 2013
Learn how to prepare your bank by having the proper data foundation to enable you to leap at every opportunity and meet new challenges head on
Tags : customer-focused enterprise, bank, data foundation, technology
     IBM
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
     Worldpay
By: Anaplan     Published Date: Mar 05, 2015
For most large organizations, sales planning is a siloed process. Organizations typically need to analyze multiple years’ worth of data to prepare for planning. There is an even split between organizations that lead the planning process from the top down and those that lead it from the bottom up. Most sales organizations complete the planning process before the beginning of the fiscal year.
Tags : consolidation, planning, survey, performance, sales, audience, finance, strategic exercise
     Anaplan
By: Symantec     Published Date: Nov 21, 2014
Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources. Forward thinking organizations use these and other techniques promoted by frameworks such as the Critical Security Controls. The key is to—as quickly as possible—detect hostile activity, identify and locate affected systems and devices, and respond appropriately.
Tags : computer viruses, automated attacks, encryption, deceptive packaging, security controls, security
     Symantec
By: Okta     Published Date: Jun 15, 2015
Cloud-based applications need to be secure and Okta is an identity network and platform that allows you to safely scale these tools overtime. Read this white paper to learn how you can prepare for customer and employee growth and cloud identity management.
Tags : cloud-based applications, identity network and platform, customer and employee growth, identity management, it management
     Okta
By: Okta     Published Date: Jul 01, 2015
Cloud-based applications need to be secure and Okta is an identity network and platform that allows you to safely scale these tools overtime. Read this white paper to learn how you can prepare for customer and employee growth and cloud identity management.
Tags : 
     Okta
By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : palo alto, security framework, security, business leaders, digital
     Palo Alto Networks
By: Epicor     Published Date: Jun 11, 2018
Growth is definitely on the agenda for manufacturers, along with avoiding the pitfalls of rapid growth. This was clear in a global survey recently undertaken on behalf of Epicor Software Corporation (Epicor) by MORAR Consulting. Our research identified key factors that growing manufacturers cited as essential to their success, along with risks that manufacturers believe could threaten growth for unprepared businesses. The Epicor “Profitable Growth in Action” eBook features seven manufacturers and the factors they consider critical to their success. Get the eBook to learn how you can help boost your company’s potential for profitable growth.
Tags : erp software, enterprise resource planning software, manufacturing, manufacturing technology, manufacturing software
     Epicor
By: Dell     Published Date: Oct 21, 2008
Practicing good image management is important in any customer's OS environment, but it comes even more into focus as companies prepare for a migration to Windows Vista.
Tags : dell, image management, company image for vista migration., security
     Dell
By: Polycom     Published Date: Feb 25, 2015
The workplace is undergoing fundamental changes, with people persistently connected by digital collaboration technologies and an evolving work environment. Understanding these key trends will enable enterprises to prepare for and implement a collaborative workplace.
Tags : polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, user experience
     Polycom
By: Cisco EMEA     Published Date: Nov 08, 2018
In today's global economy, small business networking is about reducing your operating costs. It's about reacting quickly to changing markets and customer needs. It's about being prepared for the future. Invest in a network that can grow over time, so you can add features and functionality. Make sure your switches and routers are easy to install, use, and manage To find out more, download this whitepaper today to see how Cisco can help your business.
Tags : 
     Cisco EMEA
By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy
     KeyBanc Capital Markets
By: Tyco Integrated Security     Published Date: Mar 09, 2016
In today’s challenging retail world, businesses have little time to spare. Every day, retailers are under extreme pressure to reduce shrink, improve store operations, increase profits and enhance the customer experience, all at the same. When every minute counts, time-saving solutions like source tagging, can help.
Tags : tyco, security, source tag, time-saving, retail
     Tyco Integrated Security
By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : app security, mobile apps, operating systems, corporate security, enterprise data
     MobileIron
By: NetApp     Published Date: Mar 12, 2010
Find out how NetApp and VMware enable customers to improve disaster preparedness while saving money. Today, at Tucson Electric Power, almost 90 percent of servers are virtual, 100 percent of daily backups can now be performed within a 24-hour window, disaster preparedness is greatly improved, regulatory requirements are met, and the IT infrastructure is ready for the future. Download this report to learn more.
Tags : netapp, data management, disaster recovery, back up, storage, server virtualization
     NetApp
By: AWS     Published Date: Dec 19, 2018
Migrations to the cloud sometimes face difficulties in transitioning apps, operational inconsistencies, and incongruent networks. VMware Cloud on AWS is an on-demand hybrid cloud service designed to preserve existing investments and legacy applications, while reaping the rewards of cloud scalability and flexibility. But what are the right use cases for VMware Cloud on AWS, and how do you best approach this new solution? Download our webinar to find answers to both questions, and to see specific use cases like migration, disaster recovery, and M&A integration. Download our webinar to learn How to prepare and validate your environment for integration The right circumstances for and expected benefits of deploying VMware Cloud on AWS The value of deploying a right-sized VMware Cloud on AWS environment based on your application needs
Tags : 
     AWS
By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : sca, online economy, online payment
     Stripe
By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : internet, web, attacks, technology, ddos
     Akamai Technologies
By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Atlassian     Published Date: Feb 29, 2016
In this article, we’ll discuss how Git benefits each aspect of your organization, from your development team to your marketing team, and everything in between. By the end of this article, it should be clear that Git isn’t just for agile software development—it’s for agile business.
Tags : 
     Atlassian
By: Symantec     Published Date: Jun 02, 2011
Download this survey now to understand the attitudes and practices of SMBs toward disaster preparedness.
Tags : symantec, smb, disaster prepardness survey, backup and recovery, data protection, disaster recovery
     Symantec
By: Citrix Systems     Published Date: Nov 23, 2015
Citrix NetScaler is helping prepare enterprises for today’s network challenges while supporting modern virtual, cloud, mobile, social and big data environments. For more information on ADCs, and the cutting edge benefits of NetScaler, read the Network World QuickPulse report, "Take a Load Off Your Data Center"
Tags : citrix, data center, netscaler, adc, networks, networking, storage, data management
     Citrix Systems
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
     Hewlett Packard  Enterprise
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com