cio

Results 301 - 325 of 1260Sort Results By: Published Date | Title | Company Name
By: Workday Netherlands     Published Date: Feb 04, 2019
Hoewel veel bedrijven nog steeds nadenken over wat digitale transformatie precies voor hen betekent, is het duidelijk dat CIO's een buitengewone kans hebben om innovatie voor hun organisatie aan te sturen. In dit rapport bekijken we digitale transformatie vanuit het perspectief van de CIO. We lichten toe wat dit inhoudt en bespreken de stappen die CIO's kunnen zetten om deze transformatie te bewerkstelligen. Lees dit rapport waarin huidige en voormalige CIO's, academici, branchedeskundigen, allen getuigen van de opkomst van digitale transformatie en met begrip van wat er nodig is om succesvol te zijn, hun ervaringen delen.
Tags : workforce-technologie, digitale strategie
     Workday Netherlands
By: Workday Netherlands     Published Date: Apr 30, 2019
"De technologie van vandaag verandert de manier waarop we werken. Om IT-executives te helpen het beste weg vooruit te vinden, hebben we een digitaal tijdschrift gemaakt: CIO Perspectives. U vindt er inzichten en advies van executives en visionairs over hoe u los kunt komen van de dagelijkse taken en een breder perspectief kunt krijgen. Lees het nu.
Tags : workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday     Published Date: May 16, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : workday, workforce technology, digital strategy
     Workday
By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
     Proofpoint
By: Cisco     Published Date: Oct 08, 2018
Detect attacks that get past perimeter defenses across the digital business. Detect malicious patterns in encrypted traffic. No decryption is needed with our Encrypted Traffic Analytics technology and multilayer machine learning. Extend your network visibility.
Tags : encrypted traffic, digital business, security, network, network visibility, next generation firewall, digital transformation, advanced malware protection
     Cisco
By: AppDynamics     Published Date: Sep 20, 2017
DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles.
Tags : cio, delivers software, business, metrics, automation, digital transformation, appdynamics
     AppDynamics
By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : mobile, cloud, applications, apps, mobile apps
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : united arab emirates, united arab emirates university, network security, security, network
     HP - Enterprise
By: Macquarie Telecom     Published Date: Jan 11, 2011
How hosted data center services eliminate the daily pain and frustration of managing your IT infrastructure.
Tags : macquarie telecom, hosted data center services, it infrastructure, chief information officer, cio, oursourcing, productivity
     Macquarie Telecom
By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central, strategic agility, user adoption, improved security, time to value, on-premise vs. cloud, evaluating software investments
     Success Factors
By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
     Viavi Solutions
By: BMC Software     Published Date: May 28, 2014
Learn how BMC Control-M for for Hadoop allows IT to extract value from big data, with clear visibility, predictability and increased productivity and efficiency.
Tags : 
     BMC Software
By: NetApp     Published Date: Aug 08, 2014
El siguiente caso técnico le proporciona más información en cuanto a cómo una organización de reputación global logró duplicar su productividad y eliminar a todos los problemas de almacenamiento de manera sencilla al implementar una solución inteligente con infraestructura hecha a la medida de sus necesidades. Infórmese acerca de cómo NetApp puede hacer lo mismo por su empresa al hacerla más rentable, sin necesidad de incrementar el espacio de su almacenamiento actual.
Tags : 
     NetApp
By: Oracle     Published Date: May 05, 2017
La innovación digital repercute en todos los aspectos del negocio moderno. El acceso a las opiniones y conocimientos de los compañeros y las prestaciones de autoservicio, desde prácticamente cualquier sitio y a través de cualquier dispositivo, han transformado enormemente la forma en la que gestionamos nuestros negocios y vivimos nuestra vida.
Tags : 
     Oracle
By: Oracle     Published Date: May 05, 2017
Los comerciales venden. Los clientes compran. Lo digital transforma. En el entorno actual de los negocios, cada persona debe saber gestionar el impacto de la “disrupción digital”.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 17, 2017
50% de los clientes no quieren ser atendidos por un robot, pero el 80% de los operadores dicen que los robots estarán limpiando restaurantes en 2027 50% de los clientes quieren ser reconocidos sin dar un nombre o tarjeta de fidelidad 54% de los operadores de restaurantes les gustaría introducir la inteligencia artificial en la gestión de la planificación de menús
Tags : predecir, las tendencias de, consumo y buscar, innovaciones que mejoren, las experiencias de los clientes
     Oracle
By: CA Technologies     Published Date: Jun 04, 2015
As empresas que dependem muito da TI para prestar serviços aos clientes são movidas constantemente pelas pressões do mercado para desenvolver e lançar novas funções de software que atendam às exigências cada vez maiores. Facilitar a colaboração entre o desenvolvimento e as operações de TI e colocar o aplicativo no mercado mais rapidamente e com maior qualidade são fundamentais para o sucesso dos negócios. Este resumo da solução apresenta informações sobre o movimento do DevOps, por que ele é importante e como é possível cruzar o abismo para melhorar a colaboração e gerar rapidamente valor para a empresa. Você aprenderá como as soluções da CA Technologies para DevOps otimizarão seu portfólio de tecnologias de TI em um ritmo de versões mais previsível e rápido, permitindo confirmar os resultados de cada fase do ciclo de vida do software que sejam positivos para a empresa.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
     CA Technologies
By: NetApp     Published Date: Nov 27, 2017
Join data protection experts from Forrester Research, NetApp and AWS and find out how to secure your Microsoft Office 365 business-critical data from accidental deletion, corruption, or malicious intent.
Tags : 
     NetApp
By: NetApp     Published Date: Nov 13, 2017
Read the ebook and learn how to guard your MS Office 365 data against malicious or accidental data loss with NetApp Cloud Control and AWS.
Tags : 
     NetApp
By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
     Mimecast
By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
     Mimecast
By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
     VMware AirWatch
By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
     Okta
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com