technology

Results 5926 - 5950 of 5989Sort Results By: Published Date | Title | Company Name
Published By: Ephesoft     Published Date: Jun 01, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
    
Ephesoft
Published By: MineralTree     Published Date: Jan 23, 2018
With automation technology, they are on track to save 60% of their finance department time to achieve their goal to focus on more critical areas of finance.
Tags : 
    
MineralTree
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. Intel Inside®. Intel islemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Contending with the cost and complexity of PC management leaves IT little time for innovation. Rapidly evolving technologies and business needs, means less opportunity to take advantage of new trends that are changing the way technology is delivered and consumed. And, hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 08, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC can help you refresh your entire PC and technological ecosystem with latest hardware, software, peripherals and lifecycle services, including deployment, support and asset recovery. Our services and technology can reduce costs of PC lifecycle management by up to 25%. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Magento     Published Date: Feb 13, 2018
Omnichannel isn’t about making a quicker, cheaper sale with fewer human touchpoints: it’s about creating a system which lets you to nurture your customers at every step of their buyer’s journey. This white paper from Magento and Premier Technology Partner dotmailer describes how well connected ecommerce and marketing teams and systems are crucial for a true omnichannel approach. Download the paper to discover: Why automated marketing messages, sent in real time, are the most effective way to communicate throughout the purchase journey Web and email personalization tips for omnichannel merchants Why an email address is your unique identifier Three tried and tested marketing methods to drive customers to your site and stores Note that by downloading this paper, you consent to receive future emails from dotmailer. You may opt-out at any time.
Tags : 
    
Magento
Published By: Workday UK     Published Date: Jan 31, 2019
Featuring selections from our Day in the Life video series, this page focuses on how technology helps make these Workday HR leaders' day-to-day more productive. Hear how the cloud empowers them to tackle things such as workforce planning and mergers and acquisitions with ease.
Tags : 
    
Workday UK
Published By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 17, 2018
For those struggling to convince their leadership to adopt software defined storage (SDS), this eBook from Dell EMC can help you make the case. We’ve gathered 5 ways server technology is advancing software-defined storage adoption, making it easier for businesses to implement SDS in the modern data center. The biggest misconception about SDS is that the underlying hardware is not important. It’s true, many of the features and performance enhancements are now provided by software.1 But, if you thought the hardware provider doesn’t matter when implementing an SDS solution, think again. We’ll show you why.
Tags : 
    
Dell Server
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara
Published By: Pindrop Security     Published Date: Mar 21, 2018
For a long time, the phone channel was thought to be isolated and less important to defend, when compared to the physical and online channels. The general consensus was that fraudsters could only steal so much over the phone, and it had little impact on fraud across the rest of the organization. But those assumptions are wrong, and they’re becoming grossly inaccurate as technology evolves. The phone channel is now more vulnerable and exploitable than ever before, as annual fraud loss is now a $14 billion problem. Between aggressive fraud rings, social engineering and sophisticated techniques, vulnerable call centers are feeling the sting. Legacy and stand-alone solutions won’t stand up to the perseverance and lengths to which fraudsters are willing to go.
Tags : 
    
Pindrop Security
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Bluewater Learning     Published Date: Apr 30, 2018
Addressing the frustration that people experience with their LMS or TMS does not necessarily mean going through the involved process of selecting and implementing a new system. Often, it simply requires a realignment of business drivers, supporting processes Bluewater experts will lead you through examining User Experience, Administration, Process, Content, Data, Reporting and Technology.
Tags : 
    
Bluewater Learning
Published By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
Published By: Intel Corp.     Published Date: May 11, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: TIBCO Software APAC     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
    
TIBCO Software APAC
Published By: KPMG     Published Date: Sep 13, 2018
Companies are facing more complex challenges than ever, requiring a variety of disciplines to come together to set a future vision and strategy. Historically, says Alec Binder, director, advisory at KPMG, these challenges have been treated as technology problems that can be solved simply by buying a better platform or solution. However, as explained in Part 1 of this series on KPMG’s Technology Strategy and Selection (TSS) framework, that outlook often does not drive the outcomes or the value that companies are expecting. For large transformations, a business-driven, technology-support effort is becoming an imperative, not a nice-to-have. The modular approach of the TSS framework allows for the right services and business ideas to be brought in seamlessly and holistically — toward setting a future vision and choosing technology that truly drives change.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 13, 2018
Create a transformation vision and an integrated technology roadmap to get started towards your goals. As digital complexity increases, you’ve probably spent a lot of time making sure your customer-facing strategies and technologies are ready to meet the next challenge. And rightly so. But what about your internal functions? Are your ERP, finance, HR, procurement and supply chain strategies ready? You may be asking some hard questions: • How do I manage a large-scale transformation of my back office underpinned with the right technologies? • Is my technology strategy truly aligned to meet my business goals? • What are other organizations doing to make the transition? KPMG Technology Strategy and Selection gives you the tools to frame such decisions by working with you to develop a transformation strategy that’s based on your organization’s overarching business needs. One that will diminish some of the noise of disruption by helping you see what’s coming--while focusing on an integr
Tags : 
kpmg, business transformation
    
KPMG
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure. Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value. In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert
Published By: Sage Software     Published Date: Oct 23, 2018
Be ready for the future today, with Sage Business Cloud Enterprise Management To manage this growing technology and business complexity, modern ERP is a must for distributors. It’s needed due to: • A need for multiple sales channels, both offline and digital • Ever-growing product portfolios, including offerings that may be customized, complex or bundled • The addition of value-added services, which could include assembly and labelling • Pricing, rebates and the addition of incentives that could drive profitability • Calculation and demand complexity, which increases the need for customer segmentation Modern ERP is the driver of digital transformation for a distribution business. It can provide streamlined processes, centralize back office functions, allow new service offerings, and help in understanding profitability.
Tags : 
bms, enterprise accounting, enterprise intelligence
    
Sage Software
Published By: Sage Software     Published Date: Oct 23, 2018
Innovative ways to take your business efficiency and collaboration to the next level. Across every industry, C-level executives are focusing on innovation and technology to improve the efficiency and performance of their businesses. Now more than ever they need to develop strategies that make their organizations relevant, memorable and competitive in an era where digital business transformation is not just a goal, it’s a continuous, speeding journey. • Take advantage of new opportunities • React to emerging threats and take advantage of new markets • Cope with disruptive forces
Tags : 
bms, enterprise accounting, enterprise intelligence
    
Sage Software
Published By: Box     Published Date: Jun 22, 2018
Content is a core element of digital business. Companies must create, secure, manage, and collaborate upon content with both internal and external participants. But traditional ECM technology is costly and dated while EFSS is limited in functionality. The result? Too many content repositories, leading to silos and broken communication. Companies need a better way to work! • Join us as we chat with Cheryl McKinnon, our featured speaker from Forrester Research, to learn how to make the most of your content investment and drive innovation through IT. Takeaways from the webinar include: o 5 key trends shaping the market o Key capabilities of content management vendors o Essential use cases and recommended tactics to accelerate digital transformation
Tags : 
    
Box
Start   Previous    226 227 228 229 230 231 232 233 234 235 236 237 238 239 240    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com