it strategies

Results 126 - 150 of 1121Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
     VMware
By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Oracle     Published Date: Nov 27, 2017
The need for closer collaboration between finance and HR has never been more important. Finance has become the co-pilot to the business, providing the forward-looking guidance management needs to capitalize on the next market opportunity. HR plays an essential role in ensuring that the business has the talent it needs to execute on digital strategies, and create a change-ready culture. Oracle commissioned new research by MIT Technology Review Custom, called Finance and HR: the Cloud’s New Power Partnership, to understand how closer collaboration between Finance and HR could support digital transformation and unlock new benefits.
Tags : it cooperation, cloud, provider, finance, partnership, collaboration, internal team, integration specialist
     Oracle
By: Thomson Reuters     Published Date: Jul 30, 2012
Thomson Reuters QA Studio, powered by Palantir, provides easy and rapid financial time series analysis, multi-asset class portfolio simulation, factor testing, and other portfolio analytics.
Tags : starmine, equity, trading, strategy, financial, tool, long, portfolio
     Thomson Reuters
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Oracle     Published Date: Aug 08, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : oracle, global customer experience, cx benchmarking
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Oracle’s Global Customer Experience report surveyed more than 1,300 executives across 18 countries on the state of customer experience. This study, one of the largest of its type ever undertaken, yields crucial new insights on the challenges, strategies and lessons learned for succeeding in the customer experience era. Visit the Global Customer Experience Survey Microsite to read the complete research results or to use the CX Benchmarking tool to see where your organization stands.
Tags : customer experiences, customer service, oracle, rightnow cloud, cloud, crm
     Oracle
By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : api, security, interface, businesses, data, mobile, adoption
     Akamai Technologies
By: Pega     Published Date: May 24, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
     Pega
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity
Tags : 
     Hewlett Packard Enterprise
By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
     CyberSource
By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
     Oracle Linux
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
     Adobe
By: Adobe     Published Date: Feb 10, 2016
This whitepaper reveals the strategies can help you channel digital marketing creativity into business revenue. Use it as a guide for building your brand’s creative dividends, and discover new ways to win your customers’ hearts, minds and wallets.
Tags : digital marketing, marketing creativity, creativity and innovation
     Adobe
By: Adobe     Published Date: Feb 10, 2016
This whitepaper reveals the strategies can help you channel digital marketing creativity into business revenue. Use it as a guide for building your brand’s creative dividends, and discover new ways to win your customers’ hearts, minds and wallets.
Tags : digital marketing, marketing creativity, creativity and innovation
     Adobe
By: Adobe     Published Date: Feb 10, 2016
This whitepaper reveals the strategies can help you channel digital marketing creativity into business revenue. Use it as a guide for building your brand’s creative dividends, and discover new ways to win your customers’ hearts, minds and wallets.
Tags : digital marketing, marketing creativity, creativity and innovation
     Adobe
By: Adobe     Published Date: Feb 10, 2016
This white paper reveals how business are using mobile today.
Tags : mobility, mobile, mobile device, mobile security, mobile strategies, mobile experiences
     Adobe
By: Socialbakers     Published Date: Feb 11, 2015
In this exclusive Socialbakers report, we look at how media companies can use competitive analytics and better content optimization strategies to drive interactions and site visits - crucial metrics for anyone involved in audience growth and development in the industry.
Tags : social media for media companies, reach and engagement, media performance
     Socialbakers
By: Socialbakers     Published Date: Jul 22, 2015
In this exclusive Socialbakers report, we look at how National Geographic uses competitive analytics and content optimization strategies to keep up with audiences and remain one of the most engaging social brands in the world.
Tags : social media, social media best practices, content optimization, engagement, social media engagement, social, social brands, social metrics
     Socialbakers
By: Socialbakers     Published Date: Aug 05, 2015
The benefits of running a truly social business are many - driving shorter sales cycles, improving customer care, innovating your talent recruitment strategies, and improving how you coordinate your organization from top to bottom in pursuing unified goals.
Tags : social media, social business, customer care, recruitment, recruitment strategies, marketing tools, social techniques, social media strategy
     Socialbakers
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com