technologies

Results 201 - 225 of 3557Sort Results By: Published Date | Title | Company Name
By: Pentaho     Published Date: Nov 04, 2015
This report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies based on TDWI research plus survey responses from 325 data management professionals across 13 industries. It also covers Hadoop best practices and provides an overview of tools and platforms that integrate with Hadoop.
Tags : pentaho, analytics, platforms, hadoop, big data, predictive analytics, data management, networking, it management, knowledge management, enterprise applications, data center
     Pentaho
By: Adobe     Published Date: Mar 21, 2017
Le cloud est devenu un incontournable des technologies de l'information depuis près de dix ans. SaaS (Software-as-a-Service), IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) et désormais XaaS (Anything-as-a-Service) : autant de solutions technologiques proposées sous forme de services qui stimulent l'adoption de ce que nous appelons collectivement les services cloud.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 21, 2017
Soucieuses de transformer au plus vite leur activité, les entreprises du monde entier font appel aux technologies numériques pour gagner en agilité et en efficacité, réaliser des économies et offrir à leurs clients une expérience hors normes. Les processus de signature documentaire représentent l’un des plus grands atouts pour accélérer cette transformation.
Tags : 
     Adobe
By: Cisco     Published Date: Jan 05, 2015
The United States educational system is in the midst of transformational change due to widespread adoption of technologies, including video, mobile devices, and cloud services. Given the enormous potential of these technologies to improve educational outcomes, increase access to information and collaboration, and reduce costs, schools and libraries across the nation want to do more, not less, with technology.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : datacenter, data management, collaborations, business capabilities
     Cisco
By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence, networking, security
     Cisco
By: Cisco     Published Date: Jun 21, 2016
En adoptant de nouvelles technologies, telles que le cloud, la mobilité, le Big Data et l'Internet des objets, vous améliorez les interactions entre les personnes, les processus, les données et les objets, et tirez le meilleur parti des connexions réseau et des ressources disponibles. L'IT prend également une nouvelle dimension dans l'entreprise. Pour rester en phase avec les objectifs de l'entreprise, le département IT doit innover et offrir des solutions performantes encore plus rapidement. L'infrastructure intégrée Cisco UCS® (Cisco Unified Computing System™) vous permet de migrer vers le Fast IT, un nouveau modèle IT qui transforme votre infrastructure de data center en un environnement rapide, agile, intelligent et sécurisé. Faites tomber les barrières informatiques qui freinent votre croissance et créez des solutions qui exploitent tout le potentiel des nouvelles connexions et informations.
Tags : 
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Enterprises are leveraging advancements in what IDC calls “3rd Platform” technologies — cloud, Big Data, mobility, and social — to create new business opportunities and gain competitive advantage. These trends are putting more pressure on IT organizations to transform their datacenter operations to better support business initiatives aimed at reducing costs, increasing revenue, and strengthening customer relationships. This has driven increased demand for converged or integrated systems that provide the tools needed to reduce capital costs, improve operational efficiencies and, ultimately, increase agility within the datacenter.
Tags : 
     Cisco
By: Epicor     Published Date: Sep 20, 2017
As the world around us becomes increasingly digital, manufacturers must follow suit. Digital transformation presents significant opportunities to achieve growth by addressing key operational issues and aligning products and services to the demands of today’s market. Growth looks different for every company, and with the vast array of digital technologies available, it can be hard to know where to start. Which technologies offer the greatest opportunity for your company to grow? How can you successfully embrace the digital revolution? Epicor has a history of helping manufacturers achieve growth by utilizing cutting-edge technology. By downloading these digital transformation assets, you will: • Understand what growth might look like for your business • Assess the capabilities needed to support your digital transformation journey • Explore best practices to implement your digital transformation strategy • Learn how to capitalize on growth opportunities with speed and conviction
Tags : 
     Epicor
By: Epicor     Published Date: Aug 28, 2018
By now, mobile technology has become an essential part of people’s lives. As both consumers and staff trend more toward a younger, digitally savvy demographic, lumber and building materials (LBM) businesses need to take advantage of mobile tools or risk losing to the competition. Mobile technologies can bring incredible benefits to LBM enterprises for delivery and dispatch, field sales, the selling floor, and the warehouse. To better help you seize the mobile advantage, Epicor has identified eight ways your LBM business can leverage mobile technologies to foster growth, including: • Serving your customers with the latest information • Serving your customers with timely, accurate deliveries • Driving revenue with increased efficiency • Streamlining operations Check out this Epicor tipsheet and discover how else your LBM business can benefit from mobile technologies.
Tags : lumber, building materials, lbm, erp, bistrack, lumber distributors
     Epicor
By: HPE     Published Date: Feb 11, 2015
Emerging technologies, like mobile, big data and cloud, lead to increasingly complex and demanding workloads that can overwhelm outdated infrastructures. But by leveraging server and management systems designed for the technologies of today, Best-in-Class organizations can easily meet these demands and gain benefits.
Tags : 
     HPE
By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology
     Oracle
By: Salesforce     Published Date: Nov 19, 2015
Based on responses from more than 1,100 adults who currently have investments, the research found the wave of millennials (ages 18-34) entering the market is not only putting pressure on financial advisors to use newer technologies in managing their money, but also pushing even Gen Xers (ages 35-54) and baby boomers (ages 55+) toward more modern financial tools, such as modeling on mobile devices or online portfolio rebalancing.
Tags : 
     Salesforce
By: LogMeIn     Published Date: Mar 19, 2015
Support organizations are implementing new technologies and processes to better connect customers with technical support teams, and customer satisfaction is paramount. However, most organizations admit they're not proactively aligning their priorities with their customers’ expectations. Are the needs of the support team different from what customers want and expect? Recent research by HDI delves into the two groups’ expectations and priorities— according to support professionals—and explores how closely they're aligned. Download this white paper to learn more.
Tags : customer support, customer expectations, support technology, technical support
     LogMeIn
By: Concur Technologies     Published Date: Oct 08, 2015
This report examines the strategic actions being taken by companies to enable the expense report that writes itself. It covers what is being done and how it affects the overall ability of companies to create the effortless expense report.
Tags : t&e, expense report, concur, reduce spending
     Concur Technologies
By: Lenovo and Intel     Published Date: Jan 19, 2017
Nowhere is technology more important than in healthcare, where the integrity of devices, systems, and infrastructure ultimately impacts patient lives. When evaluating existing technologies or considering investment in new solutions, there are a number of key factors healthcare entities must take into account. With this checklist, we’ll help you: ? Identify common demands ? Get an easy-to-use technology evaluation checklist ? See an example of how to apply new technology solutions
Tags : lenovo, healthcare, infrastructure
     Lenovo and Intel
By: AWS     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
     AWS
By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : digital business, technology, best practices, forrester, enterprise
     Pega
By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : interaction management, business technology, enterprise, forrester, best practices, pegasystems
     Pega
By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
     CrowdStrike
By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
     DataStax
By: Oath     Published Date: Nov 17, 2017
The medium is evolving at a rapid pace, perhaps faster than any other. New technologies are emerging regularly—such as native, instream, and outstream— and each carries as many opportunities as they do challenges.
Tags : 
     Oath
By: Symantec     Published Date: Jul 31, 2017
Uncover shadow data lurking in the cloud with the industry’s first integrated cloud security solution that combines the best-in-class data loss prevention (DLP) and cloud access security broker (CASB) technologies from Symantec.
Tags : cloud, cloud security, dlp, casb
     Symantec
By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager Schützt und steuert privilegierte Anwender und die Anmeldeinformationen, die sie für die Nutzung und das Management Ihrer digitalen Infrastruktur verwenden. Die Lösung erzwingt proaktiv Security-Richtlinien und rollenbasierte Begrenzungen für Zugriffe privilegierter Anwender – und überwacht und zeichnet gleichzeitig die Aktivitäten privilegierter Anwender in virtuellen, physischen und Cloud-basierten Umgebungen auf.
Tags : 
     CA Technologies EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com