shift

Results 826 - 850 of 850Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: Pure Storage     Published Date: Oct 09, 2017
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation.
Tags : 
workload, data management, digital transformation, cloud, organization optimization, pure storage
    
Pure Storage
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• As the needs of organizations grow more complex, delivering enterprise content that addresses the shift to mobility, usability and flexibility are key. Enterprise SaaS applications are creating demand for a new "inside-out" view of content management, extending capabilities to organizations and users who never had access. Until now. • Download the latest AIIM Tip Sheet, 5 Reasons Why the SaaS Revolution Needs a Unified Content Strategy to learn: o Why you should reexamine traditional ECM-defined processes o How to optimize your SaaS processes o Why SaaS should be part of your content management strategy
Tags : 
    
Box
Published By: Workday Italy     Published Date: Aug 07, 2018
The role of the CIO is currently experiencing vast change and increased attention from the executive team as a leader who can guide a strategic path for how technology can improve business growth. The CIO’s responsibilities once focused almost entirely on selecting and managing technology solutions, but over the past several years the role of IT has shifted to broadly supporting enterprise strategy through technology, including the creation of new digital businesses. CIOs must now be immersed in both business and technology, and ensure that the organisation overall has the right platforms in place to thrive and grow
Tags : 
    
Workday Italy
Published By: BetterUp     Published Date: Mar 06, 2019
Looking to transform your organization to offer employees the meaningful, inspiring workplace they deserve? Learn how from industry experts in our exclusive Digital Conference Experience. Your registration includes instant access to videos, slides and other materials including: - Data that predicts what the future of work will look like - Toolkit elements your employees need to thrive in a new world of work - Steps for taking your emerging leaders and making them great
Tags : 
human resource technology
    
BetterUp
Published By: Zscaler     Published Date: Jun 19, 2019
Zscaler enables you to shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service. Take the first step in your transformation journey with Zscaler.
Tags : 
    
Zscaler
Published By: Workday APAC     Published Date: Dec 11, 2018
While not a new concept, most companies are still grappling with what the digital transformation means for them. What is clear is that it offers an extraordinary opportunity for CIOs to step forward and take a leadership role in helping their organisations leverage technology to disrupt competition, break into new markets, and stay relevant for the long term. No wonder 45 percent of CIOs will shift their primary focus from physical to digital by 2018 to deliver scale, predictability, and speed, according to IDC.1
Tags : 
    
Workday APAC
Published By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
    
Group M_IBM Q119
Published By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Intel     Published Date: Apr 09, 2019
Retailers, along with many other vertical industries, seek to take advantage of the benefits of the Internet of Things (IoT) to improve customer experience management. However, quickly analyzing relevant data to inform decision-making and respond e?ectively to rapidly changing customer behaviors is challenging. The CEMOSoft* platform is designed to create opportunities, while addressing shifting demographics and an evolving IoT landscape. It o?ers a mobile customer engagement experience that can be dynamically modified on the ?y, along with the increased security and intelligence of an Intel® architecture based IoT gateway and Windows® 10 IoT Core. The result is an a?ordable, ?exible, scalable platform that brings ongoing customer insight to many aspects of daily operations
Tags : 
    
Intel
Published By: Rackspace     Published Date: May 28, 2019
IT transformation is more than a one-time migration of applications to the cloud, because the cloud isn’t a destination in itself. Successful migration is the start of an ongoing process of evolving your applications to take advantage of new native capabilities, as they become available on your chosen cloud platform. This e-book illustrates the iterative process of cloud adoption by following the IT transformation journey of a fictitious company, Mercurial Footwear, in its adoption of Microsoft Azure Infrastructure-as-a-Service (IaaS). The various stages of this transformation — from a simple lift-and-shift to the cloud to leveraging cutting-edge technologies like containers and serverless computing — are typical of the process that Rackspace helps its customers to navigate through. With step-by-step explanations, the e-book will provide you with insights into the way cloud architecture evolves, to help you to better take advantage of the Platform-as-a-Service (PaaS) features most re
Tags : 
    
Rackspace
Published By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Alert Logic
Published By: ExpertVoice     Published Date: Jun 17, 2019
I’m not sure if you’ve heard, but people keep talking about how we’re in the midst of a retail apocalypse. It’s this thing where lots of brick-and-mortar locations close down, and even entire companies go out of business. There’s quite a bit of blame to go around: The Great Recession, and Amazon, and private equity, and shifting consumer spending behaviors. In spite of the doomsday headlines, some brands continue to succeed, and a lot of those brands seem to be focusing on one thing: the customer experience. A good retail experience for a customer can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, according to this recent panel surveying retail employees, only 35% of retail employees feel as though training is effective. That’s a scary number for both retailers and brands, because without a well train
Tags : 
    
ExpertVoice
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.