el pro

Results 1 - 25 of 12748Sort Results By: Published Date | Title | Company Name
Published By: Gigaom     Published Date: Oct 02, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 01, 2019
BEGINS: OCT 1, 2019 - 12:00 PM CDT ENDS: OCT 1, 2019 - 1:00 PM CDT This free 1-hour webinar from GigaOm Research brings together experts in Kubernetes and microservices, featuring GigaOm analyst Jon Collins and a special guest from Weaveworks, Steve George. The discussion will focus on how to ensure that a Kubernetes-based target environment delivers the expected benefits, both initially and over time. Kubernetes has emerged as a de-facto platform for deploying container-based microservices. While this approach holds much promise, enterprises need to start on the right foot to not build up problems for later. So, how can you build a Kubernetes-based strategy that delivers both now and in the future? In this 1-hour webinar, you will discover: What is the opportunity and challenge presented by Kubernetes-based microservices delivery? How to ensure the right elements of strategy, to maximize effectiveness while minimizing risk? What might a staged approach look like, depending on w
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Sep 17, 2019
Today’s data volumes, combined with the credo of data-driven everything, make for an analytics landscape radically different from that of years past. Delays involved in moving and shaping operational data into separate data warehouses, data lakes and standalone BI platforms can thwart effective operational analytics. In fact, for some organizations, such segregation of infrastructure and process may not work at all. Just because OLTP (Online Transactional Processing) and OLAP (Online Analytical Processing) are distinct workloads doesn’t mean they should take place on separate platforms. Sure, dedicated server nodes may make sense to optimize the performance of operational and analytical tasks, but they need to operate on the same data, in a coordinated fashion. Modern databases – serving the needs of both business analysts and application developers – are great platforms for implementing such business-forward architectures. To learn more, join us for this free 1-hour webinar from Gig
Tags : 
    
Gigaom
Published By: Pure Storage     Published Date: Sep 13, 2019
"Purchasers of enterprise storage have historically dealt with an upgrade cycle that was expensive, disruptive, inherently risky, and time-consuming and occurred roughly every three to five years. In 2015, Pure Storage challenged customer preconceptions about the enterprise storage upgrade cycle with the announcement of its Evergreen Storage. And Pure has continued to enhance Evergreen Storage over the years with new features that have increased its already extremely high customer experience performance. This IDC white paper assesses the impact Evergreen Storage has had on the enterprise storage industry and discusses the technical, financial, and business implications of the program from a customer point of view."
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Sep 13, 2019
"By asking the right questions as you design your hybrid cloud, you maximize your chances for success. What do you want to achieve? Identifying your goals will help you zero in on the biggest pain points and attack those first. Description Learn how to increase the effectiveness of your hybrid cloud with a focus on data strategies for running hybrid applications. Use this guide to: Discover key Differences between enterprise IT environments and the public cloud. Learn if you can support enterprise applications in the public cloud. See if you can support cloud-native applications on-premises. Understand if you can protect data cross your hybrid cloud."
Tags : 
    
Pure Storage
Published By: MuleSoft     Published Date: Sep 12, 2019
Digital insurance platforms enable insurance companies to connect with their ecosystem of customers, partners, and vendors on a single, unified platform. Hear firsthand from CTO Ben Turner how Legal and General’s digital insurance platform helped the company diversify product offerings, and scale quickly to meet customer expectations. Key Takeaways: How industry leaders have digitally transformed insurance offerings with a platform business model. How to build an integrated insurance platform to connect your ecosystem of suppliers and exceed customer expectations. Best practices to increase customer retention and profitability with a single view of the customer. Presented by: Ben Turner, CTO, Legal and General Dan Snowdon, UK&I Financial Services Marketing Lead, MuleSoft Angie Lee Campos, Global Financial Services and Insurance Lead, MuleSoft
Tags : 
    
MuleSoft
Published By: Infosys     Published Date: Sep 12, 2019
Digital-born companies have challenged large long-established businesses across industries with newer data, AI-powered experiences, products/services. Sustained competitive advantage through customer ownership and seller power has since been significantly challenged and overturned. Customers are taking to newer AI and data-powered products/services in their pursuit of better experiences and exponentially higher value. This has triggered every company to challenge status-quo, unleash themselves from very structure of industry and embrace transformation in the new world. Data and AI have shaped themselves into a major economic force that is at the epicenter of transformation of every industry; through 3 horizons. Data, in the first horizon, was the key ingredient in driving more data-driven decisions. Data, in the second horizon, is playing a transformational role in the enterprises' pursuit of being Data Native Digital Native enterprise.
Tags : 
    
Infosys
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Today, a great deal of work happens through devices, apps, and digital experiences—and people increasingly pay attention to those experiences as they decide where to work. That means IT is more important than ever in helping the business attract and retain great talent. When IT builds employee experiences that are streamlined and simple at every point—from onboarding to day-to-day tasks—they help ensure a workforce that is engaged, motivated and productive.
Tags : 
    
VMware
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, particularly Graham, Leach, Bliley (GLBA), the Payment Card Industry Data Security Standards (PCI-DSS) and the Sarbanes Oxley Act (SOX). Today, the General Data Protection Regulation (GDPR) is also top-of-mind, as it regulates not only the processing of personal data, including PII, relating to individuals in the European Union, for also any organization that processes personal data of EU residents. For United States banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer prot
Tags : 
    
CheckMarx
Published By: FICO EMEA     Published Date: Sep 12, 2019
La implantación de sistemas de pago en tiempo real ha supuesto ventajas tanto para las personas y las empresas como para los delincuentes. Los países que ya han adoptado sistemas de transacciones en tiempo real han experimentado un aumento del fraude, incluido el fraude APP -Authorised Push Payment- y el fraude por apropiación indebida -Account Takeover-, así como un aumento del blanqueo de dinero, en particular el uso de cuentas de mula. Este whitepaper analiza el impacto que las transacciones en tiempo real tienen sobre el fraude y examina los cambios en las estrategias Antifraude aportando soluciones para mantenerlo bajo control, incluyendo: - La necesidad de evaluar las transacciones en tiempo real para detectar fraude - Cómo proteger a los clientes de los fraudes en las transacciones push -El papel del Machine Learning en las estrategias Antifraude.
Tags : 
transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
    
FICO EMEA
Published By: Corrigo     Published Date: Sep 12, 2019
We’re living in a new era defined by data, analytics, and intelligence. It can sound overwhelming, but once you understand how to make all this information work for you, it becomes really exciting. The Intelligence Economy has already changed our day-to-day lives, and it’s revolutionizing the world of facilities management. The best FMs don’t just understand this change – they embrace it. With a better handle on intelligence, you will see immediate results. From warranty enforcement to asset repair vs. replacement decisions, Corrigo’s collective intelligence can improve your bottom line and make you better at your job. Read on to learn how Corrigo makes the Intelligence Economy work for you.
Tags : 
    
Corrigo
Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Stratasys     Published Date: Sep 11, 2019
Reliable 3D Printing is Easier to Achieve Than You Think You’re ready to buy a 3D printer to enhance your business. You’ve done your homework and the benefits are clear: freedom of design, faster prototyping and reduced time-to-market, to name a few. The question is, what printer is best for your organization’s needs? Like so many things, you truly do get what you pay for. To get the most value from 3D printing, professionals need a printer that comes in not only at a good price point but can deliver quality results. Again and again. In this paper you will learn: The truth about 3D Desktop Printers Features and Benefits to look for in 3D Desktop Printers How to avoid the “Low Price” Trap
Tags : 
    
Stratasys
Published By: Stratasys     Published Date: Sep 11, 2019
FDM (Fused Deposition Modeling) provides a fast and accurate method of producing jigs and fixtures. FDM is an additive manufacturing process that builds plastic parts layer-by-layer using data from computer-aided design (CAD) files. By using FDM, the traditional fabrication process is substantially simplified; tool-making becomes less expensive and time consuming. As a result, manufacturers realize immediate improvements in productivity, efficiency and quality. Find out how the Oreck Corporation, a well-respected manufacturer of vacuum cleaners and other cleaning appliances, realized immediate savings in cost, production time and inspection time by implementing FDM for its fixtures.
Tags : 
    
Stratasys
Published By: MuleSoft     Published Date: Sep 11, 2019
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald’s, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security. Download this ebook to learn: How to unlock AI customer insights with an API strategy. How to make APIs the bedrock of IoT development. Why zero trust is key to API security in the new API economy.
Tags : 
    
MuleSoft
Published By: Anaplan     Published Date: Sep 11, 2019
Prior to implementing the Anaplan platform, RSA Group had a tedious spreadsheet-based, nine-month planning cycle riddled with data quality issues, which was compounded by siloed, functional fragmentation across the company. As a result, the finance team was spending a significant amount of time cleaning data rather than analyzing it to provide insight to key stakeholders throughout the business. Using the Anaplan platform, RSA Group reduced their financial planning process from nine months to five months. The workforce planning team experienced a 50% improvement in productivity. The business can now own their connected plans, resulting in improved decision support to business users, as well as improved customer service and financial results.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 11, 2019
A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: The three crucial stages of the annual sales planning process How to ensure that all relevant stakeholders participate in the sales planning process How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 11, 2019
Tata Steel Group, an integrated steel company and one of the world’s most geographically diversified steel suppliers, used to have planning data spread across the company in hundreds of spreadsheets. With Anaplan, sales and operations data are connected on one platform, and as a result, the company now has more accurate pricing, procurement, and delivery forecasts.
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.