technologies

Results 1 - 25 of 3669Sort Results By: Published Date | Title | Company Name
Published By: Interactions     Published Date: Oct 29, 2019
We all know that the customer experience is a big deal. By 2020, customer experience will overtake price and product as the key differentiator. But due to the complicated nature of integrating a large-scale, customer-facing technology like an IVA, many companies don’t know where to start or how to ensure they are creating the best possible virtual assistant. We’ve compiled some key technologies and features that should be top of mind when assessing internal expertise or selecting an external vendor.
Tags : 
    
Interactions
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian
Published By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
The alternative investment industry is increasingly feeling the impact of digital technologies, but are hedge funds and private equity firms moving quickly enough to adapt to the digital world? Read now KPMG's report Alternative investments 3.0 and understand how the alternative investment industry can embrace disruption and accelerate digital innovation.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system – linking those with money to invest with enterprises and activities that require funding – is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of “external” voices – demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms’ mindset and investment offerings is required.
Tags : 
    
KPMG
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 31, 2019
From intelligent automation to advanced analytics, disruptive technology will enable the finance function to provide all of its services more effectively and efficiently. Find out how technology will change the way finance delivers transactional services, expert services and business partnering, Read this report to discover: • how automation in finance can deliver expert services more reliably and with smaller workforces • how to design an agile workforce of humans and technologies • how the finance function will shift to be part of a cross-functional analytics model that provides key insights to the business
Tags : 
    
KPMG
Published By: Dell EMC     Published Date: Oct 30, 2019
Digital transformation is a strategic imperative to modernize technology in response to new business realities. Businesses increasingly view hybrid cloud as a critical component of this transformation to enable greater agility, efficiency, and productivity. IT organizations need the right technology approaches and partnerships to make their cloud transition as effective and successful as possible. Download this white paper sponsored by Dell Technologies and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 30, 2019
As data volumes grow larger every year, businesses that adopt more sophisticated approaches to storing and deriving value from that data benefit in terms of performance, scalability, and cost. How do you migrate effectively to the latest storage and infrastructure technologies, while also mitigating the associated disruption and risk? Download this overview from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 30, 2019
This white paper from Dell Technologies and Intel® takes a deep dive into overall security preparedness, exploring the top concerns IT pros have about infrastructure security and how they are addressing those concerns. It also takes a closer look at infrastructure security solutions and how partnering with Dell Technologies can help organizations turn comprehensive security into a competitive advantage.
Tags : 
    
Dell EMC
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Google     Published Date: Nov 04, 2019
"As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential."
Tags : 
database servers, cloud database, application infrastructure, cloud database, data integration
    
Google
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more. "The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement exec
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Organizations in the global industrial products industry face significant challenges: cost pressures, increased regulations, disruptive technologies and the increasingly costly delivery of raw resources. High volatility in commodity prices has put severe pressure on company margins and can quickly expose inefficient operations.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence (AI), automation, Internet of Things (IoT), blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Nov 12, 2019
'Expedite your journey to innovation and modernization by joining us for an introduction to the IBM Garage. IBM Garage brings designers, developers and solution architects together with your business and IT stakeholders to quickly create and scale new ideas that can dramatically affect your business. By focusing on outcomes first, IBM Garage’s new way of working guides your solutions from idea to delivery fast, applies advanced technologies with a purpose and de-risks innovation to achieve real business value. In this webinar, we will describe the IBM Garage co-creation approach and share perspectives from leaders in design, development and building to scale. We will conclude with Q&A.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Les données sont l’ADN de la médecine moderne. Avec l’évolution rapide des technologies de santé, mais aussi des solutions de gestion des données des patients et de sécurité, il convient de trouver de nouvelles approches de traitement et de prévention des maladies, comme la médecine de précision et la gestion des contenus de santé. La médecine de précision consiste à passer d’une approche générique à des modes de diagnostic et de traitement plus précis centrés sur la population en factorisant les données des gènes des patients, de l’environnement et du mode de vie, ainsi que les antécédents familiaux, dans une solution décisionnelle clinique pour établir au plus tôt des diagnostics plus précis et parvenir à des modes de traitement et de prévention plus effi caces. Les données sont centrales dans la réussite de la mission des médecins et scientifi ques.
Tags : 
    
Infinidat EMEA
Published By: Resolver     Published Date: Nov 01, 2019
Together with ASIS International, Resolver polled corporate security professionals in the ASIS community about the state of security management in 2019. Based on the results, Resolver examined current practices and trends in the systems and technologies involved with managing incidents and assessing threats. Watch this webinar for access to the survey results where Resolver identified the top incidents organizations face, where security teams are planning technology improvements or upgrades, and how they use incident management to assess future threats. You’ll walk away with the information you need to benchmark your team, as well as practical tactics to collect relevant data to help allocate and maximize your security budget for 2020.
Tags : 
    
Resolver
Published By: Rackspace - Google Cloud     Published Date: Jul 26, 2019
In today’s digital world, technologies such as cloud have become commonplace to take digital transformation projects to the next level. But while cloud is critical to business transformation success, Australian IT decision-makers (ITDMs) still feel that the C-suite does not understand the time and complexity of the journey. This paper explores: • Insights on challenges faced by Australian ITDMs when rolling out cloud projects • The role of the ITDM today • Key blockages IT stakeholders encounter when driving digital change, and; • What they need from the business and wider technology ecosystem to navigate the risks associated with starting a cloud project or moving to a full cloud-first model.
Tags : 
    
Rackspace - Google Cloud
Published By: Cherwell Software     Published Date: Oct 28, 2019
: Today’s learning environments would be unrecognizable to past generations. Professors distribute and issue syllabi and assignments online. Students collaborate on group projects using Google Docs, Doodle and other technologies. Password reset requests alone could keep an entire IT team busy. To face this onslaught of technological demands without breaking the budget, campuses need a powerful, flexible and affordable ITSM platform. Read this eBook to learn how eight different colleges and universities are using Cherwell ITSM to achieve: • A higher level of productivity (for example, implementing a self-service portal for password resets that slashed service requests by 65 percent) • Faster service delivery (for example, cutting the global computer refresh cycle from three years to seven months) • Less configuration time (for example, one school reduced configuration time by 74 percent). To learn more about how leading campuses have easily and affordably improved their operational
Tags : 
    
Cherwell Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.