iod

Results 1 - 25 of 163Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 05, 2019
Global fashion powerhouse Perry Ellis International upgraded from a six-year-old CRM system. In this guidebook, follow their journey to gaining a comprehensive view of consumer shopping behavior in an accelerated seven-week, implementation-to-launch period.
Tags : 
    
Oracle
Published By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
Published By: Alert Logic     Published Date: Oct 25, 2019
In today’s threat landscape, attackers use a wide range of sophisticated methods to infiltrate vulnerable systems. The key to minimizing the impact of an attack is to detect threats early, effectively and over a long period of time. In any threat detection effort, organizations must focus on visibility, assessment of risk, and potential impact to the business. Download 5 Top Recommendations for Effective Threat Detection to learn how to improve the effectiveness of your threat detection program in cloud and hybrid environments.
Tags : 
    
Alert Logic
Published By: Iovation     Published Date: Aug 02, 2019
You may have heard that storing device data for more than a few months has no value because fraudsters frequently switch devices. Our data shows otherwise. Over a typical 30-day period, iovation saw 2M transactions from devices with a history of fraud that was first seen on our network 3+ years earlier. That number is even more sobering for devices first seen 1-2 years earlier: 16M transactions. Fortunately, iovation’s unique device history capability provides our customers with the knowledge of whether a device has a history of fraud.
Tags : 
    
Iovation
Published By: Workday     Published Date: Oct 22, 2019
The consolidation and close process is often tedious and time-consuming—but it doesn’t have to be. Following the 10 steps in this guide can help you achieve a more efficient and accurate period close. Read now to learn more
Tags : 
    
Workday
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Icertis     Published Date: Oct 24, 2019
As the global economy adapts to a period of long-term uncertainty, procurement teams are being tasked with diversifying the supplier base of the organization in order to maintain business continuity and avoid risks, all while delivering quality outcomes. This report seeks to contextualize the performance and alignment of Procurement departments both within the larger organizations they serve and amid their place in the global economy.
Tags : 
    
Icertis
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. When it takes 23 days on average to recover from a ransomware attack1, find out why I.T. security is the most important thing, period. Download our solutions guide > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"IT needs to reach beyond the traditional data center and the public cloud to form and manage a hybrid connected system stretching from the edge to the cloud, wherever the cloud may be. We believe this is leading to a new period of disruption and development that will require organizations to rethink and modernize their infrastructure more comprehensively than they have in the past. Hybrid cloud and hybrid cloud management will be the key pillars of this next wave of digital transformation – which is on its way much sooner than many have so far predicted. They have an important role to play as part of a deliberate and proactive cloud strategy, and are essential if the full benefits of moving over to a cloud model are to be fully realized."
Tags : 
    
Hewlett Packard Enterprise
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Cisco     Published Date: Feb 23, 2016
A discussion of wide area networking is extremely timely because after a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. As a result, for the first time in a decade network organizations have an opportunity to make a significant upgrade to their WAN architecture.
Tags : 
wan architecture, business optimization, network development, network management
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Mar 23, 2016
Expedia Cruise Ship Centers saved $76 per agreement over a 3 year period by eliminating printing, faxing, and scanning. Read this case study to see how making the switch to DocuSign for their contract renewal and new-hire paperwork process has helped them save $1.5 million.
Tags : 
    
DocuSign
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
    
Oracle
Published By: Adobe     Published Date: Nov 09, 2017
IDC, a global market intelligence firm, studied the business value of the Adobe Primetime multiscreen TV platform. Bottom line? Over a five-year period, it delivered a 385% ROI and $14.3 million total benefits per organization. Download the report to learn more.
Tags : 
    
Adobe
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC interviewed organizations that have deployed Dell EMC VxRail and VxRack hyperconverged solutions powered by Intel® Xeon® Platinum processor to support their expanding IT and business operations. Study participants reported that Dell EMC HCI solutions serve as a foundation for innovation across their distributed organizations by providing a cost-effective, agile, and high-performing IT infrastructure foundation. The result is that these organizations are realizing a 619% five-year return on their investment in Dell EMC HCI solutions, which IDC puts at a value of $150,776 per 100 users per year, resulting in a six-month payback period.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC ha intervistato organizzazioni che hanno implementato le soluzioni iperconvergenti Dell EMC VxRail e VxRack basate su processore Intel® Xeon® Platinum per supportare l'espansione delle loro operazioni IT e aziendali. I partecipanti allo studio hanno segnalato che le soluzioni HCI Dell EMC fungono da elemento fondamentale per l'innovazione nelle loro organizzazioni distribuite, fornendo una base di infrastruttura IT efficiente in termini di costo, agile e a prestazioni elevate. Il risultato è che queste organizzazioni stanno realizzando un ritorno quinquennale del 619% sugli investimenti in soluzioni HCI Dell EMC, che IDC traduce in un valore di $ 150.776 all'anno per 100 utenti, con un conseguente periodo di recupero dell'investimento di sei mesi.
Tags : 
    
Dell EMC & Intel
Published By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
    
Oracle
Published By: Dell EMC Storage     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnologia hardware non dura per sempre, ma ha un ciclo di vita, un periodo misurabile di inizio e di fine in termini di produttività e valore. Il reparto IT ha il compito di ottimizzare il ciclo di vita delle risorse PC mentre promuove i passi avanti per la propria organizzazione. Tuttavia, il costo elevato e la complessità della gestione dei PC lasciano al reparto IT poco tempo per l'innovazione. Offriamo opzioni di finanziamento flessibili che consentono di garantire che il reparto IT possa sempre contare su ciò che serve, quando serve, per mantenere gli utenti finali impegnati e produttivi. Ulteriori informazioni sulle soluzioni Dell con tecnologia Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC
Published By: Box     Published Date: Jul 29, 2019
Den meisten CIOs ist heute bewusst, dass Initiativen zum digitalen Wandel dazu beitragen können, Geschäftsprozesse zu optimieren, die Ef?zienz zu steigern und die Wettbewerbsfähigkeit zu erhöhen. Auf lange Sicht initiieren sie dadurch die Modernisierung und Zukunftsorientierung des Unternehmens. Einige der laufenden Transformationsinitiativen – auch in vielen wachstumsstarken Unternehmen – haben mit der Problematik zu kämpfen, den explosionsartigen Anstieg von unstrukturierten Daten zu verwalten und den damit verbundenen höheren Compliance- und Sicherheitsanforderungen gerecht zu werden. Zum Glück können neue Lösungen, die künstliche Intelligenz (KI) einsetzen, nicht genutzte Informationen aus unstrukturierten Daten extrahieren, beispielsweise aus Dokumenten, Bildern, Videos und Audiodateien. KI trägt auch dazu bei, viele der zeitaufwendigen Prozesse zur Klassi?zierung, Organisation und Analyse unstrukturierter Daten zu automatisieren.
Tags : 
    
Box
Published By: Limelight Network     Published Date: Aug 12, 2019
Many companies that need to deliver content online at scale use Content Delivery Networks (CDNs) to improve performance. However, even with a reliable CDN, there can be issues with service quality in different regions, insufficient capacity during peak periods, and lack of resiliency and diversification. To address these concerns, some companies distribute their delivery load across more than one CDN, a concept often called a multi-CDN implementation. In this paper, we’ll explore frequently-asked questions and best practices for implementing multi-CDN workflows based on extensive experience.
Tags : 
    
Limelight Network
Published By: Dell     Published Date: Aug 17, 2016
Windows 10 is the OS of the future and fundamentally changes how PCs and other devices will be used and supported in organizations. However, with different support periods set by Microsoft for Windows 7, each IT and procurement organization need to evaluate what hardware and software combination will best support their workforce if they are not ready to move to Windows 10 right away. Even purchasing new PCs to take advantage of performance improvements and new form factors while downgrading the OS may not be an optimal strategy going forward.
Tags : 
dell, windows 7, procurement
    
Dell
Published By: Siemens     Published Date: Jun 02, 2016
Researchers of occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns.
Tags : 
siemens, arc defense, fault-resistant, medium voltage
    
Siemens
Start   Previous   1 2 3 4 5 6 7    Next    End
Search