cio

Results 126 - 150 of 1307Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Feb 15, 2018
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : guida, approccio, integrato, odierne, informatica, oracle
     Oracle
By: Oracle     Published Date: Feb 28, 2018
Per avere successo nella realtà competitiva di oggi, le aziende devono svincolarsi dai limiti imposti dall’infrastruttura IT legacy. L’acquisto di hardware e la manutenzione di enormi data center per l’esecuzione dei sistemi informatici appartengono al passato: la gestione e la manutenzione dell’infrastruttura sono semplicemente troppo costose. Un recente sondaggio di Gartner ha rivelato che oltre l’80% dei CIO ritiene che l’Infrastructure-as-a-Service (IaaS) sia un’opzione perseguibile e il 10% degli stessi già la considera la scelta predefinita per l’infrastruttura. L’utilizzo di un’infrastruttura con un modello di servizio elastico e con pagamento in base al consumo non solo riduce i costi e le preoccupazioni, ma consente inoltre alle organizzazioni IT di dedicarsi all’innovazione per favorire la crescita aziendale.
Tags : ampio, accesso, risorse, misurabile, pubblico, privato, ibrido
     Oracle
By: Oracle     Published Date: Feb 16, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : iaas, business, legacy, infrastructure, oracle, organisations
     Oracle
By: Oracle     Published Date: Feb 28, 2018
So, while the advertising industry is in the midst of profound change, it’s hard to be certain about the form that it will take in future. There’s good reason to be optimistic, rather than pessimistic. Firstly, as we saw earlier, the proliferation of digital platforms means that there are now more canvases for creativity than ever before. And secondly, recent discoveries in psychology and behavioural science have highlighted how human decision making – in any context – is often unconscious or non-rational. As a result, the range of problems where creative communication can offer a solution is wider than ever previously realised.
Tags : 
     Oracle
By: Oracle     Published Date: Mar 01, 2018
Per avere successo nella realtà competitiva di oggi, le aziende devono svincolarsi dai limiti imposti dall’infrastruttura IT legacy. L’acquisto di hardware e la manutenzione di enormi data center per l’esecuzione dei sistemi informatici appartengono al passato: la gestione e la manutenzione dell’infrastruttura sono semplicemente troppo costose. Un recente sondaggio di Gartner ha rivelato che oltre l’80% dei CIO ritiene che l’Infrastructure-as-a-Service (IaaS) sia un’opzione perseguibile e il 10% degli stessi già la considera la scelta predefinita per l’infrastruttura. L’utilizzo di un’infrastruttura con un modello di servizio elastico e con pagamento in base al consumo non solo riduce i costi e le preoccupazioni, ma consente inoltre alle organizzazioni IT di dedicarsi all’innovazione per favorire la crescita aziendale.
Tags : ampio, accesso, risorse, misurabile, pubblico, privato, ibrido
     Oracle
By: Oracle     Published Date: Mar 01, 2018
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : guida, approccio, integrato, odierne, informatica, oracle
     Oracle
By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
     Workday APAC
By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
     Workday APAC
By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
     Avanade  DACH
By: ServiceNow     Published Date: Nov 05, 2012
Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.
Tags : servicenow, it management, it visibility, it value, service catalog
     ServiceNow
By: ServiceNow     Published Date: Nov 05, 2012
Top IT leaders and CIOs from around the globe gathered to discuss technology advances and increased business demands. This white paper discusses the method of selecting new technologies for today's needs, CIOs strategic role and more.
Tags : servicenow, cio, strategic management, technology
     ServiceNow
By: ServiceNow     Published Date: Mar 11, 2013
In this white paper, you will find out how to: Consolidate to drive enterprise visibility and standardization Enable intuitive, approachable and business friendly IT Automate to accelerate IT responsiveness and innovation
Tags : it management, cio, operations, business, change management
     ServiceNow
By: Oracle     Published Date: Nov 08, 2017
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
     Oracle
By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
     Oracle
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : secure web gateway, web-based threats, web, solution, technology, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, web threats, physical appliance, virtual appliance, saas, security, technology
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : mobile, malware, security, scams, bluecoat, data loss
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : gateway, web, security
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : web security, appliance, virtual, physical, saas, hybrid
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : data, non-malicious, malicious, ponemon, solera network
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : security, technology, business technology, cio
     Blue Coat Systems
By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : fireeye, spear phishing attacks, cybercriminals, malware, malicious activities, security
     FireEye
By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : secutiry, certificates, keys, security attacks, business
     Venafi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com