Whitepaper Library
 

businesses

Results 1 - 25 of 2091Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Jan 11, 2017
As our businesses become increasingly digital, we tend to think about technology in non-physical terms. Our IT infrastructure becomes “the cloud.” Our servers and storage become “virtual.” Our networks become “software-defined.” The reality, however, is that information technology (IT) always depends on physical infrastructure. Without hardware there is no software. So to lose sight of technology’s physical realities is to jeopardize the wisdom with which we manage its physical underpinnings. And unwise management of those physical underpinnings leads to both higher operational costs and higher operational risks.
Tags : 
data center
    
Raritan
Published By: EMC     Published Date: Mar 12, 2011
ESG believes businesses are looking for a better way to protect data and manage it without going broke or getting lost in the process. Solutions that once closed the gap are now falling short. Learn how EMC is filling the gaps through smart acquisitions and integrations that address customer needs. Read the paper.
Tags : 
    
EMC
Published By: EMC     Published Date: Mar 12, 2011
If you still yearn for an infrastructure that can handle unpredictable data growth and enable you to enhance service levels, while ensuring data protection, read this ESG white paper. Learn how EMC is helping businesses completely transform their data protection processes. Read more now.
Tags : 
    
EMC
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"In today’s Idea Economy, businesses need to turn ideas into services faster. Every new business and established enterprise is at risk of missing a market opportunity and being disrupted by a new idea or business model. It has never been easier, or more cru cial, to turn ideas into new products, services, or applications —and quickly drive them to market. But IT needs an infrastructure that enables them to partner with the business to speed the delivery of services."
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Sep 24, 2018
As the shift into a digital economy continues to accelerate, companies must out-innovate, outthink, and outpace their competition. Businesses must embrace change and transform to become the disruptors in their industries rather than wait to be disrupted by their competitors. In the face of this pressure to evolve, organizations need to transform IT to reduce both the capital and operational costs of legacy IT. They must offload repeatable and time-intensive manual tasks like backup, disaster recovery, and service deployment to software and policy-driven automation.
Tags : 
economic, value, cloud, data, protection, dell emc
    
Dell
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 06, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world.
Tags : 
    
Dell EMC
Published By: Zendesk Ltd     Published Date: Sep 11, 2018
Customers have caught on that support interactions are getting better. When they reach out, they’ve come to expect an instant response that says “we’re here for you”. When they want information, it’s expected to be accurate, up-to-date, and easily accessible. Essentially, they come to expect efficiency during support interactions. As a result, businesses are becoming more cognizant of their self- service offerings. Customers want to be left feeling empowered; it’s even better when they can do so on their own. Self-service saves time for agents, cuts down on organizational costs, and leaves the customer with a positive outlook of a brand. This eBook delves into how AI can enhance your customer self-service offerings with automatically-generated knowledge bases, content cues for your service agents, and chatbots.
Tags : 
customer service, customer experience, artificial intelligence, chatbots, self-service
    
Zendesk Ltd
Published By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office – like mobile phones, wearables, tablets, and even desktop phones – and the need becomes even greater.
Tags : 
atlantic broadband, transmit, data, payroll, cloud, data
    
Atlantic Broadband Business
Published By: Dell     Published Date: Aug 08, 2018
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. In July 2017, Dell commissioned Forrester to conduct a study of the 21st century workforce and how their new habits, attitudes, and workstyles are reshaping the world of work. With more personas in a single organization to cater to, businesses are failing to deliver against workforce demands. To get their tasks done, workers are circumventing security policies to get what they want, in their moment of need. Organizations have to understand the different behaviors across
Tags : 
    
Dell
Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® Platinum processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
    
Dell Server
Published By: Quantum Corporation     Published Date: Sep 11, 2018
Virtualization is rapidly changing the way business IT operates, from small local businesses to multinational corporations. If you are reading this, chances are good that your company is already taking advantage of virtualization’s benefits. Virtualization means that a single underlying piece of hardware, such as a server, runs multiple guest operating systems to create virtual machines, or VMs, with each of them being oblivious to the others. An administrative application, such as VMware, manages the sharing process, allocating hardware resources, memory, and CPU time to each VM as needed. And all applications look at this software construct exactly as if it were a real, physical server — even the VM thinks it’s a real server! Virtualization makes good financial sense. It enables a single server to offer multiple capabilities that otherwise would require separate servers. It includes native high availability features, so you don’t have to use any more complex clustering tools. This ab
Tags : 
    
Quantum Corporation
Published By: Workday Nordics     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
workday, workday technology, digital strategy, saas
    
Workday Nordics
Published By: Pure Storage     Published Date: Oct 09, 2018
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation. Agility has emerged as an organizational superpower as businesses grapple with change and uncertainty in their own customer bases and in the global political and economic landscape. IT has been thrust into the spotlight as the unwitting hero of the story – tasked with delivering on the digital vision, implementing all manner of applications and building firm infrastructure foundations to support the latest digital initiatives. In an increasingly on-demand world, it is this final point that often gets overlooked in the rush for the next shiny new technologies. E
Tags : 
    
Pure Storage
Published By: Workday UK     Published Date: Sep 18, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday UK
Published By: Workday     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Whilst businesses of all kinds are utilizing data analytics, many are still only using it to make simple changes that lead to a set of rigid processes. Whereas the more customer-focused organizations are realizing that to deliver exceptional experiences, they need to be able to react to customer data in real-time and predict what might happen next. And that means going beyond simple analytics. Read our whitepaper to discover what analyst firm Forrester has identified as the Enterprise Insight Platform, technology designed to enable companies to transform into truly data-driven businesses.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
With data and analytics the new competitive battleground, businesses that take advantage will be the leaders; those that do not will fall behind. But with data so distributed, gaining this advantage is a huge challenge. Unless you have data virtualization, a better, faster way to meet your analytic data needs. Read this white paper to learn who needs data virtualization and what kinds of benefits others have achieved.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
    
TIBCO Software APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.