Business Technology

Results 351 - 375 of 4259Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Aug 09, 2016
How IBM Watson combines the always-available service that today’s customers demand with the benefits of automation.
Tags : 
ibm, watson, watson engagement advisor, engagement, customer experience
    
IBM
White Paper Published By: Adobe     Published Date: Aug 09, 2016
Read the infobrief for insights on: • What digital transformation is and how other businesses are doing it • How you can save time, money, and improve your customer experience with digitally transformed document workflows • Best practices and first steps in transforming document workflows in your own company
Tags : 
adobe, document cloud, cloud, workflows, digital transformation
    
Adobe
White Paper Published By: LogMeIn     Published Date: Aug 09, 2016
QualiTest Put Rescue and TeamViewer to the Test. Rescue beats Teamviewer in a number of categories. Read on to find out why.
Tags : 
logmein, logmein rescue, teamviewer, qualitest, remote support
    
LogMeIn
White Paper Published By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
How can cloud technology help you to compete in the food & beverage industry? In our new briefing paper, ‘The Power of Cloud’, we provide a summary of everything a food and beverage executive needs to know about cloud technology and how it can help your business.
Tags : 
technology, data, cloud, best practices, business technology
    
Oracle_Hospitality F&B
White Paper Published By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
In our new report, Cost Control in Food & Beverage: How Technology Can Help Maximize Profits, we surveyed more than 200 independent operators and chains to understand how they are managing labor, inventory, and loss prevention costs.
Tags : 
cost control, best practices, technology, maximize profit, operators
    
Oracle_Hospitality F&B
White Paper Published By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
The millennial generation is larger than baby boomers or Gen X. 77% visit a restaurant once a week, and they are expected to spend an average of $3,900 on travel this year alone. Our research report discusses how you can win the business of this unique group of individuals.
Tags : 
hospitality, best practices, millennial, customer service, business technology
    
Oracle_Hospitality F&B
Webinar Published By: IBM     Published Date: Aug 08, 2016
Imagine expanding your business and monetizing your bank's data. Imagine bringing services together and delighting customers. API's can connect your bank to a whole ecosystem of business. With innovative thinking and exploration your bank can capitalize on API's in the new digital economy.
Tags : 
ibm, api, api economy, integration, application program interface
    
IBM
White Paper Published By: IBM     Published Date: Aug 08, 2016
IBM API Connect is a comprehensive management solution that addresses all four aspects of the API lifecycle: create, run, manage and secure. This makes API Connect far more cost-effective than limited point solutions that focus on just a few lifecycle phases and can end up collectively costing more as organizations piece components together. Download this datasheet and find out how IBM API Connect can help your organization.
Tags : 
ibm, api, api economy, integration, application program interface
    
IBM
Webinar Published By: IBM     Published Date: Aug 08, 2016
Learn how YES BANK is reaching more customers in API economy. Digital banking requires applying new technologies to reach new customers. YES BANK approach of using APIs in Mobile banking is helping them reach new customers and open new markets and participating in the API economy.
Tags : 
ibm, api, api economy, integration, application program interface
    
IBM
Webinar Published By: IBM     Published Date: Aug 08, 2016
Hybrid cloud has emerged as the cornerstone for digital transformation, enabling developers to create unique and compelling mobile, IoT, and web applications while extending their IT investments and capabilities. Attend this webinar to learn how you can leverage your WebSphere Application Server infrastructure and investments to maximize performance, lower costs, and successfully move forward into a hybrid cloud world.
Tags : 
ibm, cloud, hybrid cloud, middleware, application infrastructure
    
IBM
White Paper Published By: IBM     Published Date: Aug 08, 2016
Open Source application developer platforms aren't "free." Download the Total Economic Impact Of Migration From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how WAS Liberty can deliver 122% ROI, reduced infrastructure costs by $350K and improved developer productivity by 12% over open source alternatives.
Tags : 
ibm, middleware, application infrastructure, open source application servers, ibm was liberty
    
IBM
White Paper Published By: IBM     Published Date: Aug 08, 2016
In this solution brief, you'll learn how IBM Integration Bus enables you to: - Eliminate the need for point-to-point connectivity - Connect across an array of packaged applications and web services - Route and transform data in virtually any format so you can read, interpret and convert multiple data formats - Expose and extend back-end systems to mobile devices
Tags : 
ibm, middleware, api economy, ibm integration bus, business agility
    
IBM
Webinar Published By: IBM     Published Date: Aug 08, 2016
By taking part in the API economy, you open up a world of possibilities for your business. From innovation for you and your customers, to deployment of strategic growth initiatives, the API economy contains a wealth of opportunities. You are already in the API economy. Now, learn how you can keep moving forward.
Tags : 
ibm, middleware, api economy, business agility, enterprise applications
    
IBM
Webinar Published By: IBM     Published Date: Aug 08, 2016
Using IBM API Connect demonstrates how to create, secure, and provide self-service to API across the ecosystem when designing a mobile app.
Tags : 
ibm, middleware, api economy, ibm api connect, api management
    
IBM
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data, business technology
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
The first two installments of the Cyber-threat defense report began the process of looking beyond major breaches and the never ending evolution of cyber-threats to better understand what IT security teams are doing to defend against them.
Tags : 
security, technology, best practices, information technology, cyber threat
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm
White Paper Published By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : 
security, technology, best practices, information technology, business intelligence
    
LogRhythm
White Paper Published By: Workday     Published Date: Aug 05, 2016
With the large number of baby boomers becoming retirement-eligible, many local and state governments are bracing for a “brain drain.” The Center for Digital Government recently surveyed 165 state and local government IT professionals about their agencies’ recruiting practices. See this infographic to prepare your agency for the silver tsunami.
Tags : 
technology, best practices, productivity, data, competitive advantage
    
Workday
White Paper Published By: Workday     Published Date: Aug 05, 2016
Many government organizations run their core business and operational applications on systems a generation (or two) behind current technologies. This whitepaper from the Governing Institute explains how forward-thinking government agencies are leveraging the cloud to reduce costs and implement a modern, secure platform for delivering IT services.
Tags : 
technology, best practices, productivity, data, competitive advantage
    
Workday
White Paper Published By: CDW     Published Date: Aug 04, 2016
Changing workloads are pushing organizations to consider new infrastructure options. The latest designs address growing interest and the unique demands of the Internet of Things and Big Data. When cloud service provider Virdata needed to develop a highly scalable platform to collect information from millions of devices and offer Big Data analytics to its customers, it chose a converged infrastructure. Download this white paper to learn more!
Tags : 
technology, data, converged systems, big data, cloud
    
CDW
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.