it landscape

Results 176 - 200 of 675Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 21, 2018
Our client is a very well-known, long-established bank with over 13 million customers across the globe. Over the years, they had built up a large and complex technological legacy. The landscape included over 1,000 different applications residing on a complex architecture and a hybrid mix of technology, which made testing the non-production environment an increasingly difficult task for quality assurance (QA) teams. Testing environments were fragmented, and this was compounded by a lack of ownership, governance processes, and communication regarding the status of environment readiness; causing delays, extending time to market, and increasing cost.
Tags : 
banking, technology, environment, governance, communication
    
Infosys
Published By: Zebra Technologies     Published Date: May 14, 2018
Surviving and thriving amid the global, digital shopping revolution, in which consumers fluidly browse and buy from their smartphones, computers and in store, calls for a supply-chain makeover. Pressed to offer consumers fast, flexible and even free product fulfillment and delivery in an omnichannel retail landscape, a crowdsourced, collaborative model is taking shape. Traditional roles are blurring as logistics companies, manufacturers and retailers work to meet the growing on-demand economy via the adoption of business intelligence supply chain technologies.
Tags : 
mobile, shipping, manufacturing, warehouse, global, shopping, fulfillment
    
Zebra Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hitachi Vantara     Published Date: May 10, 2018
The banking industry is being pressured by two new forces simultaneously: an increasingly stringent regulatory environment that requires new levels of data governance, and a shift to digital business processes that introduces new, nimble competitors and empowers customers in new ways. This E-Book is intended to provide information and insights on how banking executives involved in digital transformation can successfully navigate in this new and quickly evolving landscape.
Tags : 
    
Hitachi Vantara
Published By: IBM     Published Date: May 09, 2018
Does the future of digital trust lie in artificial intelligence (AI)? Join the conversation between Valerie Bradford, product marketing manager at IBM Security, and Andras Cser, vice president and principal analyst serving security and risk professionals at Forrester, to discover how AI is changing the landscape of digital identity. Key takeaways: Understand how AI is helping organizations respond to current changes in the threat landscape. Examine how companies are using AI to establish trust in digital identities. Hear how AI is changing the end-to-end customer journey by improving the digital experience.
Tags : 
digital trust, security, digital identity
    
IBM
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : 
guide, byod, mobility, landscape, organization, program, mobile
    
MobileIron
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: CyberSource EMEA     Published Date: May 04, 2018
Digital technology is creating change at a pace never seen before. Customers now expect speed, ease, choice and a personalised service. It makes customer experience key to success. And it sets merchants a challenge. To survive, and thrive, businesses need to stay agile in everything they do –including how they manage fraud. As the people who set the strategy that determines if an order is accepted or not, fraud teams have a pivotal role to play in improving customer experience and reducing risk. This makes fraud management more than a back-office utility. It’s a way to differentiate your business and achieve a competitive advantage. This is the question we put to three specialists from CyberSource – as well as Chris Monk from digital literacy agency Decoded. This report reflects their expert opinion, and explores: • The changing landscape for businesses. • The key challenges for fraud teams. • How to develop an agile fraud solution
Tags : 
    
CyberSource EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Google     Published Date: Apr 30, 2018
"Pressure on IT to deliver new functionality continues to drive faster software development cycles. While agility has always been important, today’s IT teams must operate in a hybrid environment where applications take various forms: legacy systems that remain on-prem, existing applications migrated to the cloud, and new applications built with cloud-native approaches. The combination makes for an increasingly complex IT landscape — one in which simply migrating to the cloud falls short. Read this Google Cloud guide and learn how IT leaders can better meet today’s challenges by capitalizing on the historic shift toward open, connected environments."
Tags : 
    
Google
Published By: Mitel     Published Date: Apr 25, 2018
In businesses and organizations across the world, rooms once humming with wires, black boxes and blinking lights now sit empty. In a lonely phone closet, there’s only dust, a single lonely terminal, or perhaps a foosball table where IT pros can let off steam. The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud, communications, organizations, landscape
    
Mitel
Published By: DocuSign     Published Date: Apr 24, 2018
"In order to succeed in this evolving digital landscape, financial services institutions must embrace trending technology to remain competitive or risk becoming obsolete. Today’s customers expect to be able to bank not just anywhere, any time, but also on any device. What’s more, they want to be able to open new accounts, apply for loans, and perform other tasks that in the past could only be done at a branch, securely and easily. Download this complimentary IDG report to learn about digital banking best practices to stay competitive by going paperless, attract and keep the next generation of customers who demand digital options, and thrive in the digital age. "
Tags : 
    
DocuSign
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
With high user expectations shifting faster than ever, the software landscape is evolving at a feverish pace to deliver higher–quality software—and testing must be able to keep up. CA has worked with Paul Gerrard, Principal, Gerrard Consulting, to identify some of the new challenges that the digital economy presents for testing, and the trends that have emerged to meet them. We cover some of these topics in this e–book.
Tags : 
    
CA Technologies EMEA
Published By: Optimizely     Published Date: Apr 06, 2018
Welcome to the conversion best practices toolkit from Optimizely! You’re already one step closer to delivering meaningful digital experiences and turning prospects into customers. In an increasingly competitive landscape where customers demand more from their digital interactions with companies across a growing number of communication channels, customer acquisition can be a big challenge. In this toolkit, you’ll find a variety of resources aimed at helping you identify conversion optimization opportunities and acquire new customers with greater efficiency.
Tags : 
    
Optimizely
Published By: Oracle     Published Date: Apr 05, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry.
Tags : 
    
Oracle
Published By: AppDynamics     Published Date: Apr 04, 2018
Application performance monitoring (APM) companies are quickly becoming some of the most important players in the IT landscape as enterprises strive to deliver best-in-class customer experiences. Download Gartner’s 2018 Magic Quadrant for APM to see: • Gartner's updated evaluation criteria • Evaluations of each recognized vendor • An analysis of current trends in the APM market
Tags : 
    
AppDynamics
Published By: Oracle     Published Date: Apr 03, 2018
Effective collaboration between marketing and IT continues to be crucially important. As we enter an era where our business agility will be defined by the flexibility of operation of our marketing tools, technology in marketing is a key focus. Read ‘The guide to building your marketing technology stack’ to learn more about how technology can enhance every area of marketing: • Rediscover the technology in marketing landscape • Explore the latest in marketing automation • See how content and social fit into your overall strategy
Tags : 
    
Oracle
Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
The Internet of Things (IoT) has paved the way for a number of innovations that rely on connectivity between devices and the internet. Now, this interconnectivity is impacting the beer brewing process, providing brewers with a consistent, reliable, data-driven experience — and serving customers with a tasty, better brew. This article discusses how the IoT and smart, connected brewing appliances are redefining the industry landscape one beer at a time.
Tags : 
beer, brewing, internet, things, iot, optimization
    
Dassault Systemes SolidWorks Corp.
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
Both are fueled by a drive for progress, for pushing boundaries and advancing the status quo. In these fields, new trends are like a currency. Keeping ahead of the next big trend means being aware of the next big seller and allocating all the right resources – fashion design, manufacturing, and marketing – for maximum impact. Miss the hype and the next fashion season is bound to hurt the bottom line. New trends are also important to marketers because owning a new trend is a way to differentiate in today’s fast-moving digital landscape. It’s a way to stand out from the pack by investing strategically in the right approaches and technologies at the right time, then reaping the benefits organically by leading where others follow. Naturally, making these decisions requires a bit of trial and error. Nobody has a magic crystal ball that guarantees success. But as a rule of thumb, the companies winning in digital marketing are the ones willing to adopt new technologies while keeping an sharp.
Tags : 
2018, marketing trends, omnichannel, multichannel, automation, loyalty, crm, marketing
    
Selligent Marketing Cloud
Published By: SAS     Published Date: Mar 06, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape
Tags : 
    
SAS
Published By: NetApp     Published Date: Mar 06, 2018
Gartner Report: Competitive Landscape for Hyperconverged Integrated Systems. Accelerate business outcomes and achieve growth with hyperconverged integrated systems (HCIS). Key findings: As the hyperconverged integrated system (HCIS) market has matured in the past two years, some smaller providers without sufficient bases, technical resources and cash to survive on their own have exited the market." • "HCIS-only providers that have a sustainable sales advantage based on effective communication of technical strengths that can deliver superior cost savings or performance advantages are most likely to remain viable as the market continues to grow." • "HCIS providers without compelling value propositions to differentiate their offerings against other HCIS solutions are unlikely to survive the increasing competitive pressure that is appearing in the market."
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
cloud-based system, data analytics, real time
    
Workday
Published By: Fiserv     Published Date: Mar 02, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations. In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: • Global payment initiatives • Open Banking standards • Artificial intelligence and machine learning • Consumer demand for real-time fraud prevention and detection
Tags : 
cyber crime, financial crime, financial security, customer experience, financial crime risk management, global payments, open banking standards, artificial intelligence
    
Fiserv
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library