cios

Results 201 - 225 of 438Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Tags : 
    
Group M_IBM Q418
Published By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
    
Intel
Published By: Micro Focus     Published Date: Aug 17, 2011
This white paper explores the different strategies available to CIOs - highlighting the cost-effective steps available to address core challenges.
Tags : 
micro, cobol, rumba, für arbeit, rumba, server express, server express, express server, rentenversicherung, handelsbanken, dwa, micro focus, terminal emulator, rumba mainframe, vax emulation, pc terminal emulator, windows terminal server software, ga run, gaload, cobol unix
    
Micro Focus
Published By: Oracle     Published Date: Sep 30, 2019
Company reputations are at stake— unless they’re sure of their data security and practices in the face of multiplying data volumes. There is now a need to understand the responsibilities and the need for the entire company to commit to a digital trust framework. In this episode of the Tomorrow Talks series, IDC and Oracle discuss how data security and practices are no longer the remit of CIOs and CISOs alone. To find out more, watch this webinar today.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 09, 2019
Company reputations are at stake— unless they’re sure of their data security and practices in the face of multiplying data volumes. There is now a need to understand the responsibilities and the need for the entire company to commit to a digital trust framework. In this episode of the Tomorrow Talks series, IDC and Oracle discuss how data security and practices are no longer the remit of CIOs and CISOs alone. To find out more, watch this webinar today.
Tags : 
    
Oracle
Published By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
    
Dynatrace
Published By: BMC ESM     Published Date: Sep 15, 2009
Many CIOs are looking to implement the power of Cloud computing, but they don't know where to begin. How do you take full advantage of this technology and implement the correct strategy for your environment? What services should you offer via the Cloud? Read the paper, "Cloud Computing In Perspective," by BMC Software Chief Technology Officer Kia Behnia.
Tags : 
bmc esm, cio, cloud computing in perspective, itil, cloud computing environments, public, private, hybrid, hipaa, payment card industry, pci, business service management
    
BMC ESM
Published By: Ariba     Published Date: Oct 06, 2010
The purpose of this research is to better understand the key investment drivers and evolving business objectives of C-Level executives (CEOs, CFOs, COOs, CIOs, CMOs) - and how these intersect and shape business/IT investment spending going forward.
Tags : 
ariba, recovery, c-level business, it investment spending, saugatuck technology
    
Ariba
Published By: Workday     Published Date: Jan 17, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs—one using on-premise software and one using Workday.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 14, 2018
Cloud implementation, integration and delivery once again topped the National State Chief Information Officer’s list of priorities facing state CIOs in 2018. The same is true on the local government side of the equation, with organizations pursuing infrastructure-as-a-service and platform-as-a-service models. However, now that those deployments are being realized, governments are looking for more opportunities to reap the cost-savings, flexibility and scalability of cloud environments.
Tags : 
    
Workday
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Companies today can’t just “bolt on” mobile capabilities. To succeed, you have to put mobile first. Read—Moving Beyond BYOD to Mobile First: A 3-Step Approach for CIOs—to learn how a making mobile a core part of your IT strategy increases revenue.
Tags : 
mobile collaboration, byod management, byod solutions, byod strategy, enterprise collaboration, enterprise mobility, mobile device management
    
Good Technology Corporation
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad, gestión de ti, next generation firewall
    
McAfee
Published By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
    
Imprivata
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Oferecido por um Tempo Limitado. Obtenha Sua Cópia Hoje. Tome uma decisão informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos críticos de negócios que seu próximo firewall precisa atender - Informações sobre como criar uma solicitação para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleção de firewall
Tags : 
firewalls, tecnologia, palo alto
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall
Tags : 
firewall, palo alto, tecnologia
    
Palo Alto Networks
Published By: Cisco     Published Date: Jan 14, 2014
This IDC white paper discusses some of the strategic benefits and advantages associated with a migration to a cloud-based collaboration offering as well as the challenges that CIOs and decision makers face when making such a move. It describes key decision criteria and the thought process behind a move to the cloud for collaboration and provides an example of Cisco Hosted Collaboration Solution (HCS) as a market-leading solution.
Tags : 
cisco, cloud, cloud collaboration, cloud-based collaboration, cisco hosted collaboration solution, hsc
    
Cisco
Published By: Epicor     Published Date: Nov 14, 2017
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, you’re likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in today’s manufacturing market. Technology leaders can help drive the company’s digital ambition by: • Considering whether the business can support full digital transformation or more moderate optimization • Observing digital trends across the industry and adjacent industries • Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
    
Epicor
Published By: Epicor     Published Date: Feb 23, 2018
Whether your company wants to grow by optimizing your current business model or transforming to introduce new revenue sources, you’re likely exploring a variety of digital tools designed to enhance and expand the organization. Leaders rely on CIOs and IT directors to recommend digital strategies and outline the benefits and challenges they can expect from new digital tools. For many businesses, the first step toward growth is deciding how ambitious their digital strategy should be in order to compete and succeed in today’s manufacturing market. Technology leaders can help drive the company’s digital ambition by: • Considering whether the business can support full digital transformation or more moderate optimization • Observing digital trends across the industry and adjacent industries • Evaluating your competitive position as it relates to your digital strategies Learn more about how your company can determine its digital business ambition by downloading this research report from Gart
Tags : 
erp software, enterprise resource planning software, cloud, saas, digital
    
Epicor
Published By: CA Technologies     Published Date: Feb 13, 2015
Today’s challenging and hyper-competitive business environment offers CIOs a unique opportunity to assume an expanded role as a strategic technology expert collaborating with the business toward greater success, more revenue and happier customers. It’s in IT’s hands at the moment, but the window of opportunity is closing as lines of business get tech-savvy, spending more of their budgets on IT projects and re-examining the role that IT plays in advising them. IT can either define a new role for itself which embraces this change, or ignore it and risk becoming increasingly irrelevant to the business.
Tags : 
business environment, strategic environment, collaboration, customer service, it roles
    
CA Technologies
Published By: Oracle     Published Date: Jan 28, 2015
Yesterday the main expectations for the retail CIO were to keep the servers running, desktops patched, and store-based POS systems taking money. Today, the CIO fulfills a more strategic role, one that impacts the organization’s ability to adapt to changing consumer preferences, preserve margins and serve customers. This quick read features 8 strategies CIOs are employing to meet the demands of modern retail, plus tips from leaders at Zenni Optical, C. Wonder and Shop Direct on how to bring them to life.
Tags : 
    
Oracle
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: SAP SME     Published Date: Aug 13, 2015
En los últimos años, las reglas de comercio han cambiado radicalmente y se ha producido una rápida transición hacia un mercado de compradores. Los clientes no solo compran, llevan a cabo una investigación exhaustiva donde comparan precios y condiciones a través de una variedad de puntos de contacto digitales. Los clientes de hoy están educados e informados, y por esto, esperan más de cada compañía con la que hacen negocios, incluso de las de servicios financieros. El nuevo imperativo es el compromiso del cliente – una interacción directa y personal con cada cliente individual, que brinde contenido relevante y oportunidades personalizadas, utilizando datos y tecnología para ganar y retener negocios.
Tags : 
banca digital, servicios financieros en línea, omnicomercio, plataforma, sistema de comercio, e-commerce, comercio electrónico, ventas en línea, tienda online, ventas móviles, plataforma digital, sistema de comercio electrónico, hybris, experiencia del cliente, plataforma de servicios financieros, sistema de retención de clientes
    
SAP SME
Published By: VMware AirWatch     Published Date: Sep 21, 2016
This Event Proceedings document captures key takeaways from discussions at a recent executive dinner in London hosted by VMware. Focused on Digital Workspace emergence in the Financial Services sector, the invitation only event attracted a largely IT executive audience. The event was by invitation only and attracted an audience consisting largely of IT executives from the Financial Services in the United Kingdom. The session saw an open, spirited exchange of views on the state of end user computing initiatives amongst the present banks and insurance organizations. Attendees also discussed the impact of digital transformation initiatives on end user computing, and what this means for CIOs and IT departments in this sector.
Tags : 
    
VMware AirWatch
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library