growing

Results 326 - 350 of 1177Sort Results By: Published Date | Title | Company Name
By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : application protection, app protection, security, cloud, cloud computing, public cloud, security application
     F5
By: SAP     Published Date: Oct 03, 2018
How can you ensure the Enterprise Resource Planning (ERP) solution you’re considering will meet all the needs of your growing business? Be sure to get answers to these critical questions before making a decision.
Tags : 
     SAP
By: SAP     Published Date: Oct 03, 2018
Growing businesses are putting cloud-enabled ERP systems at the heart of their digital transformation strategies. Discover how your company can benefit.
Tags : 
     SAP
By: Sage People     Published Date: May 15, 2018
Your customers won’t rave about a simple payment experience. But they will make a lot of noise about a bad experience. And your conversion rates and sales will take a hit. These payment niggles have a particularly big impact on retailers with ambitious growth targets. The good news is, growing retailers can easily upgrade their payment systems to boost CX.
Tags : 
     Sage People
By: LexisNexis     Published Date: Mar 25, 2013
In 2010, Murphy & King recognized they needed to hire an experienced litigation support manager to assist the firm's growing litigation practice. Learn how they reduced client's expenses, increased profitability and obtained quality with E-Discovery.
Tags : client expenses, increases profitability, expenses, e-discovery, lexis nexis
     LexisNexis
By: IBM     Published Date: Apr 18, 2017
The data integration tool market was worth approximately $2.8 billion in constant currency at the end of 2015, an increase of 10.5% from the end of 2014. The discipline of data integration comprises the practices, architectural techniques and tools that ingest, transform, combine and provision data across the spectrum of information types in the enterprise and beyond — to meet the data consumption requirements of all applications and business processes. The biggest changes in the market from 2015 are the increased demand for data virtualization, the growing use of data integration tools to combine "data lakes" with existing integration solutions, and the overall expectation that data integration will become cloud- and on-premises-agnostic.
Tags : data integration, data security, data optimization, data virtualization, database security, data analytics, data innovation
     IBM
By: IBM     Published Date: Sep 28, 2017
Welcome to the era of the digital enterprise, where digital is your journey and cognitive is your destination. As business leaders, you are under growing pressure to use information to its fullest potential, delivering new customer experiences as fuel for business growth. The digital economy is changing the way we gather information, gain insights, reinvent our businesses and innovate both quickly and iteratively A hybrid cloud environment, combining traditional IT systems and public cloud, enables you to extend business processes beyond the walls of your organization. For example, many organizations use public cloud as a collaborative development environment to create innovative applications that can then be ported to an on-premises or hybrid production environment.
Tags : cognitive era, digital, database, hybrid cloud environment, public cloud
     IBM
By: Oracle     Published Date: Nov 07, 2018
This guide for finance directors and CFOs of growing businesses provides pointers for creating a more fruitful and valuable relationship between finance and the front office.
Tags : 
     Oracle
By: Oracle     Published Date: Nov 07, 2018
Bringing finance closer to the rest of the business is an enticing prospect. But enabling accountants to serve as advocates for other departments is much more than just a relocation task. This latest NetSuite guide helps finance leaders in a growing business discuss business partnering: the whys and the hows.
Tags : 
     Oracle
By: Oracle     Published Date: Mar 07, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: • Customer satisfaction has become a key KPI for innovation • Having too many innovation projects is their biggest hurdle • Establishing business case viability and go/no-go decisions are a key challenge Read the report
Tags : 
     Oracle
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
     Sage People
By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
     Sage People
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
     Symantec
By: IBM APAC     Published Date: Aug 25, 2017
Machine learning automates the development of analytic models that can learn and make predictions on data. It has been one of the fastest growing disciplines within the world of statistics and data science, but the barrier to entry has been high, not only in cost, but also in the need for specialized talent.
Tags : machine learning, apache spark, additional resources, big data, ibm
     IBM APAC
By: IBM APAC     Published Date: Aug 25, 2017
Two-thirds of organizations that blend traditional and cloud infrastructures are already gaining advantage from their hybrid environments. However, leaders among them use hybrid cloud to power their digital transformation, going beyond cost reduction and productivity gains.
Tags : cost reduction, infrastructure, business process, workflow, scalability, resiliency
     IBM APAC
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
     CA Technologies
By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : roi, soa, job scheduling, ca wa, workload automation
     CA WA
By: CA WA 2     Published Date: Oct 01, 2008
CA's vision is to unify and simplify the management of enterprise-wide IT. The rapidly growing use of virtualization and clustering in enterprise infrastructures provides a rich environment for increasing complexity. Unlike physically bounded infrastructures, the logical entities in virtualized and clustered environments are not visually apparent. Nevertheless, one needs to know what resources one has and if one is using those resources to their fullest capacity.
Tags : virtual, virtualization, network management, ca wa, ca wa 2, networking
     CA WA 2
By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
     EMC Corporation
By: Citrix Systems     Published Date: Jul 28, 2015
This white paper explores the evolution of secure remote access requirements, focusing in particular on the impact of user mobility and growing adoption to bring your own device (BYOD) practices.
Tags : 
     Citrix Systems
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com