aps

Results 1 - 25 of 579Sort Results By: Published Date | Title | Company Name
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Published By: Sage EMEA     Published Date: Jul 16, 2019
Running a retail company has never been so challenging – perhaps more so for mid-sized businesses. With high customer expectations, shrinking margins, and intense competition from start-ups and global retail giants alike, it’s difficult to know which areas of your business to prioritise for improvement. In this guide, we’ll discuss some of the key challenges for growing retailers. We’ll also look at the digital tools that could help you overcome them, and keep your competitive edge.
Tags : 
    
Sage EMEA
Published By: Apptio     Published Date: Jul 16, 2019
Get the poster that maps AWS, Azure, and GCP services to a standard IT taxonomy. The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Download the Cloud Cost Management Poster for best practices to: - Map AWS and Azure billing to a standard taxonomy - Better understand cloud costs and usage to avoid surprises and drive accountability - Optimize resources by taking action on underutilized and idle instances
Tags : 
    
Apptio
Published By: Adobe     Published Date: Jul 10, 2019
Every organisation is at a different point in their progression with campaign management. Maybe you’ve had some success with email marketing and you want to expand your efforts across additional channels. Perhaps you invested in a campaign management solution several years ago when you had fewer marketing channels, simpler data sets and less sophisticated customers. It could be you’re a new marketing team, eager to set yourself up for success with an enterprise-class campaign management solution that meets all the requirements you know about—and even some you don’t.
Tags : 
    
Adobe
Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Published By: Mimecast     Published Date: Jun 28, 2019
There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibility – usually at a lower cost and with reduced complexity. Global adoption of cloud enterprise productivity platforms hit an all-time high of 81% in 2018, up from 24% in 2014.* If you’re a longtime Microsoft customer, a logical first step in making the journey from on-premises to the cloud is to move your email to Microsoft Office 365™. You aren’t alone. Office 365 is Microsoft’s fastest-growing business, ever. According to Gartner, 84% of IT decision makers indicated that they are currently using or planning to use Office 365 in the next six months.
Tags : 
    
Mimecast
Published By: Adobe     Published Date: Jun 26, 2019
Like the oxygen we breathe, journey analytics brings life to the customer behind those devices, over time getting to know their favorite pastry choice, when they’re most likely to buy gas, and how long they stay online while in the station’s café. If you want your customers to enjoy seamless, personalized experiences, you need to treat them like people. That means marketing to the person — not the device. When you know a customer’s interests, wants, and needs — perhaps even before they do — you’ve succeeded at becoming a true experience business. For some, this may require a shift from analytics as a tool to analytics as a way of life. It may also mean evolving corporate or office culture.
Tags : 
    
Adobe
Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode
Published By: Procore     Published Date: Jun 25, 2019
Download Your Copy: How We Build Now - Tracking Technology in Construction 2019 The Australian construction industry is undergoing a technical transformation and we’ve taken a snapshot of this dynamic and interesting space - examining how construction companies are adopting technologies and implementing new tech-enabled processes. Our inaugural report How We Build Now - Tracking Technology in Construction 2019 examines and tracks key elements in this fast-paced, tech-driven transition. It covers 4 main areas: Taking the Pulse: People and skills development Pick and Mixing: Technology adoption and future proofing Forging Ahead: Processes and implementation The Spirit Level: Business outlooks across industry sectors The new findings provide insight and ideas about technology adoption and how new technologies are influencing modern construction company processes.
Tags : 
    
Procore
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
To learn more about the insurance platform download our recently published white paper now.
Tags : 
    
Group M_IBM Q3'19
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
With endless media, services and products available in just a few taps on a smartphone, people are becoming accustomed to a new level of instant access. Whether it’s a ride to a party, payment sent to a friend or streaming a movie, speed is everything. Thanks to technology, Gen Y has come of age in the on-demand economy. Meeting these expectations is crucial to Workplace’s mission to empower people to work together efficiently and effectively. In order to better understand this generation's expectations – and how to cater to them – we’ve partnered with behavioural insights agency, Canvas8 to explore how this desire for immediacy is reshaping the future of work. In this report, we uncover why employees want companies to pick up the pace and what on-demand looks like at work.
Tags : 
    
Workplace by Facebook
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: pepperjam     Published Date: Jun 18, 2019
It happens too often: Marketers relying on advertising methods and platforms that work “just well enough” to keep the business going. And while many marketers realize their existing affiliate network provider isn’t delivering the results they crave, they’re under the assumption that this is as green as the grass gets. Perhaps they assume that it’s just simply, too hard, too costly, or too risky to move. The truth is that it’s far more effective, easier and profit-boosting to make a switch to a new affiliate provider. Let us show you how less than 30 days and three simple steps can take you from good enough to great. You’re almost there! Just complete the form to download Migrate Your Affiliate Program in 30 Days or Less!
Tags : 
    
pepperjam
Published By: Workplace by Facebook     Published Date: Jun 17, 2019
With endless media, services and products available in just a few taps on a smartphone, people are becoming accustomed to a new level of instant access. Whether it’s a ride to a party, a payment sent to a friend or streaming a movie, speed is everything. Thanks to technology, Gen Y has come of age in the on-demand economy.
Tags : 
    
Workplace by Facebook
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Rackspace     Published Date: Jun 14, 2019
Don’t let the end of support for SQL Server 2008 and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Forcepoint     Published Date: Jun 06, 2019
In a recent study, IDC analyzed the business value and benefits of supporting network operations with Forcepoint NGFW solutions. The research included interviews with eight organizations relying upon Forcepoint’s NGFW to connect and protect their networks and business operations. IDC created a model based upon their analysis to identify the costs and real benefits of deploying Forcepoint NGFW. The highlights of this analytical model are captured in their Business Value Snapshot; and the complete results are available for download now in the IDC Quantifying the Operational and Security Results of Switching to Forcepoint NGFW Whitepaper. Download the Snapshot now Download the IDC Whitepaper now to learn how the eight organizations surveyed realized improved efficiency, availability and security with Forcepoint NGFW, as well as a return of cost in only seven months and an average 5-year ROI of 510%.
Tags : 
    
Forcepoint
Published By: Oracle EMEA     Published Date: Jun 04, 2019
IT Teams are reporting satisfaction with their organisation’s performance, but the gaps between their aspirations to drive innovation and thei ractions to see it through tell a different story. Across the organisation, respondents are not clear which department owns innovation. On top of that, the organisation is burdened by too many projects, which creates a conflict between quality and quantity. As a result, globally and across all lines of business, the majority of innovation projects do not make it to market. This problem is exacerbated by a lack of collaboration and clear leadership. Fortunately, organisations are placing value on the customer experience, thereby helping to move the business forward. Unfortunately, this momentum is hindered by the lack of priority that the organisation places on talent. Overall, organisations are generating ideas but struggling to execute them due to poor process and lack of focus. As a result, there is a big gap between ambition and ability, a
Tags : 
    
Oracle EMEA
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: Rackspace     Published Date: May 28, 2019
Don’t let the end of support for SQL Server and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com