solutions

Results 1 - 25 of 5538Sort Results By: Published Date | Title | Company Name
Published By: Gigaom     Published Date: Oct 02, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom
Published By: SAP EMEA Global     Published Date: Sep 13, 2019
Managing employee experiences is not about pinpointing a single event or moment. People leaders need the ability to collect feedback at every moment that matters and take action to close experience gaps. With Employee Experience Management solutions from SAP, you can use a wide range of employee listening mechanisms across a variety of engagement channels to create a “digital open door.”
Tags : 
    
SAP EMEA Global
Published By: Oracle     Published Date: Sep 12, 2019
The following guide looks at 6 characteristics that define today’s most compelling commerce environments, and how the right mix of adaptive, intelligent solutions can optimize performance and ultimately be your most intelligent associate, 24 hours a day, 7 days a week, anywhere in the world. Amp Up the Power of Commerce with AI and Analytics Bring the Customer Journey Full Circle Tap into Heightened Data Security and Privacy in the Cloud
Tags : 
    
Oracle
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Alight Solutions     Published Date: Sep 11, 2019
During this 20-minute webinar we’ll uncover the impacts segregation of duties can have on your company if not correctly maintained. We’ll also demo the creation of the reports and dashboards you can set up in your own Workday tenant to uncover potential issues.
Tags : 
    
Alight Solutions
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
    
Akamai Technologies
Published By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Sachant qu’il faut en moyenne 23 jours pour se remettre d’une attaque par ransomware1, découvrez pourquoi la sécurité informatique constitue la priorité des priorités. Téléchargez notre guide de solutions > Wissen Sie, wo Sie am meisten gefährdet sind? Im Wettrennen mit Ihren Mitbewerbern um die digitale Transformation Ihres Unternehmens treten neue Bedrohungen auf. Mit ThinkShield von Lenovo erhalten Sie eine anpassbare, umfassende Lösung, die Ihr Unternehmen rundum schützt. Es dauert durchschnittlich 23 Tage, um die Folgen eines Ransomware-Angriffs zu beheben1. Erfahren Sie, warum IT-Sicherheit ganz oben auf der Prioritätenliste stehen sollte. Lösungsübersicht herunterladen > 1 IBM : 2
Tags : 
lenovo
    
Lenovo UK
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. When it takes 23 days on average to recover from a ransomware attack1, find out why I.T. security is the most important thing, period. Download our solutions guide > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK
Published By: MuleSoft     Published Date: Sep 09, 2019
Digital transformation is something that everybody wants to achieve, but not everyone can define. In this webinar, Accenture managing director Davinder Gautam and MuleSoft founder Ross Mason will discuss the problems CIOs are facing in planning and executing their digital transformation strategies as well as solutions to closing the IT delivery gap and achieving their goals. Attendees will learn: What are the obstacles getting in the way of achieving digital transformation? Strategies to end the misalignment of business and IT on digital initiatives A roadmap to closing the IT delivery gap Presented by: Davinder Gautam, Managing Director, Accenture Ross Mason, Founder and VP Product Strategy, MuleSoft
Tags : 
    
MuleSoft
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ? Extend on-premises networks, apps, and infrastructure resources to the cloud. ? Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ? Sustain operational consistency across on-premises and cloud environments. ? Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the allia
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Oracle     Published Date: Sep 05, 2019
In this guidebook, learn how modern retailers are using integrated hardware and software POS solutions to expand the range of their customer interactions. One thing is certain, hardware and software must work together to readily accommodate new consumer demands.
Tags : 
    
Oracle
Published By: TIBCO Software     Published Date: Sep 03, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software
Published By: Dell EMC Storage     Published Date: Sep 03, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital. Dell EMC Transformation powered by Intel®
Tags : 
    
Dell EMC Storage
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
Published By: FICO EMEA     Published Date: Sep 02, 2019
Real-time payments mean real-time fraud – how will you adapt your fraud strategies? The roll out of real-time payment schemes has bought advantages to criminals as well as to people and businesses. Those countries that have already adopted real-time payment schemes have seen a rise in fraud including authorised push payment fraud and account takeover as well as a rise in money laundering, particularly the use of mule accounts. This executive brief looks at the impact of real-time payments on fraud and examines the changes to fraud strategy and solutions to keep it under control including: The need to assess payments for fraud in real-time. How to protect customers from authorised push payment fraud. The machine learning approaches that can underpin a successful fraud strategy that protects both banks and their customers. Download now
Tags : 
real-time payment, p2p payment
    
FICO EMEA
Published By: 3D Systems     Published Date: Aug 29, 2019
As a mold maker, you have probably experienced challenges with your current software including working with multiple solutions, inefficient mold design capabilities, poor technical support and many more. By switching to an integrated CAD/CAM software that’s dedicated for mold design and manufacturing, you can reduce delivery times, improve tool quality and gain a competitive advantage. Download this whitepaper to learn more about why you need an integrated solution, as well as the key elements to look for in a CAD/CAM solution.
Tags : 
cad cam, cad/cam, cad/cam software, cad software, cam software, mold, mold design, mold design software
    
3D Systems
Published By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest “NonLinear ADaptivity” (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the “true” design solution.
Tags : 
    
ANSYS
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Dell EMEA     Published Date: Aug 28, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security. Download this whitepaper to learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: Dell SB     Published Date: Aug 27, 2019
Vous essayez de lancer ou de faire évoluer une entreprise, et chaque minute compte. Gagnez du temps et augmentez votre productivité en optimisant votre technologie. Des modifications simples, comme choisir la mémoire Intel® Optane™ et migrer vers Windows 10 Professionnel, peuvent vous aider à accomplir vos tâches quotidiennes plus rapidement et vous laisser plus de temps pour vous consacrer à l’innovation. Renseignez-vous sur ces stratégies afin de simplifier vos journées de travail.
Tags : 
    
Dell SB
Published By: AWS     Published Date: Aug 26, 2019
Empower your developers and drive productivity by leveraging Kubernetes. Carmen Puccio, Principal Solutions Architect, Amazaon Web Services, Inc. Michael Gerstenhaber, Director of Product, Datadog Jon Moter, Senior Principal Engineer, Zendesk
Tags : 
    
AWS
Published By: TIBCO Software     Published Date: Aug 26, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: IBM     Published Date: Aug 26, 2019
By choosing the right enterprise platform and pervasively encrypting data, your bank can deliver data security more effectively. For this reason, you should be aware of the best available encryption solutions for your organization. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position. Know five encryption questions to ask your CIO today
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com