Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

compare

Results 101 - 125 of 526Sort Results By: Published Date | Title | Company Name
Published By: Trifacta     Published Date: Nov 02, 2018
In the latest report, Forrester evaluated 10 top data preparation solutions against 18 criteria, grouped into categories of Current Offering, Strategy and Market Presence. See how each data prep provider compares and who received the highest scores. Download your copy today to review: What are the key technical differentiators for data preparation solutions Which user personas do data preparation solutions focus on Why ownership of data preparation is transitioning from IT to business end users
Tags : 
    
Trifacta
Published By: Gigamon     Published Date: Dec 13, 2018
Despite increasing security budgets, companies find there is too much data for new tools to analyze, not enough skilled IT security professionals and little confidence in current technology investments. Read the “2018 Cyberthreat Defense Report” to learn how your peers are managing increased breaches, vulnerabilities and encrypted traffic. How does your cyberthreat approach compare to other security pros who are protecting their organizations? Learn now.
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: Feb 21, 2019
For some, having a Managed Service Provider (MSP) manage your workloads on cloud infrastructure requires strong justification internally and assistance around presenting an alternative view to a DIY approach. The physical costs are a bit easier to identify but what about the human costs - your 'hard to retain' IT talent that you want focused on evolving the business strategy rather than the heavy lifting a move to the cloud requires. To help you justify a MSP solution to your stakeholders and support your internal business case for the associated human cost of a move to the cloud, download our comparison tool that outlines: • Considerations - the motivations around a move to the cloud • Associated tasks/actions required to complete a move to the cloud - a comprehensive and direct comparative view of all tasks that IT are responsible for in a DIY v. MSP approach • Minimum Cost Savings - Re-platform and run costs compared as well as a comparison of the total IT department time required
Tags : 
    
Rackspace
Published By: CyberSource EMEA     Published Date: May 04, 2018
The digital economy is dramatically changing how consumers shop and interact with businesses. They expect a fast, convenient and highly secure digital experience. With the average company lifespan decreasing rapidly, merchants have to operate as a true digital enterprise to stay competitive and to stay in business. Payment and fraud management is no longer a back-office utility. It is a prime differentiator, critical to achieving competitive advantage, improving customer experience and reducing risk. Digital transformation is not simply a market buzz word. It is real. And those who don’t embrace it are in a position to lose. By 2020, eCommerce sales as a percentage of retail sales are forecast to be 12.4% compared to 8.0% in 2016, according to eMarketer. And engaging customers digitally across channels remains a top digital initiative. While there are several drivers of growth in the digital economy, none are more significant than the force of mobile and cloud technologies. Innovation
Tags : 
    
CyberSource EMEA
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA
Published By: HERE Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Oct 16, 2018
In this report, VSI applies HERE’s HD map data to a lane keeping application and examines performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach. VSI tested the lane keeping system with and without map data on a local road in 3 scenarios: Lane lines expanding into a turn or exit lane An intersection without lane lines A widening in the lane The results show that in all scenarios, the computer-vision-only lane keeping systems got confused and made errors in a vehicle’s trajectory when lane markings were out of the ordinary or invisible. Faced with the same road conditions, the map-based lane keeping system stayed within the desired trajectory outperforming the compute- vision-only systems. This report proves that using a lane model from an HD map can solve common issues involved in computer-vision-only lane keeping.
Tags : 
    
HERE Technologies
Published By: ABB     Published Date: Oct 31, 2018
In 2017, Europe produced more Of its electricity from solar, wind and biomass resources than from coal. Today's market is more volatile, with greater variability in energy sources due in large part to the desire to reduce environmental damage. The European Union (EU) is on track to achieve its 2020 goal of reducing greenhouse gas emissions by 20% compared to 1990 levels l by reducing its reliance on carbon-based power. This paper examines the five most critical variables that investors, developers, and others must recognise in the due diligence process before investing in a new power generation project in Europe.
Tags : 
energy industry, power market analysis, investor advice, digital technology, automation technology
    
ABB
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: RSM US     Published Date: Dec 18, 2017
Finance and accounting outsourcing is a growing trend among middle market and high-growth companies, providing a cost-effective way for organizations to improve the finance and accounting function. The key benefits of outsourcing include fractional use of finance and accounting professionals, enhanced processes and technologies, and stronger compliance measures. Outsourcing enables organizations to scale resources up and down as needed with no obligation to pay salaries or benefit costs. Additionally, it alleviates the burden of hiring, training and maintaining accounting staff.
Tags : 
finance outsourcing, accounting outsourcing, enhanced processes
    
RSM US
Published By: HERE Technologies     Published Date: Feb 26, 2019
In this report, VSI applies HERE’s HD map data to a lane keeping application and examines performance of lane keeping with a map-based approach compared to a camera and computer vision-based approach. VSI tested the lane keeping system with and without map data on a local road in 3 scenarios: 1. Lane lines expanding into a turn or exit lane 2. An intersection without lane lines 3. A widening in the lane The results show that in all scenarios, the computer-vision-only lane keeping systems got confused and made errors in a vehicle’s trajectory when lane markings were out of the ordinary or invisible. Faced with the same road conditions, the map-based lane keeping system stayed within the desired trajectory outperforming the compute- vision-only systems. This report proves that using a lane model from an HD map can solve common issues involved in computer-vision-only lane keeping.
Tags : 
location data, auto, mapping
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: Schneider Electric     Published Date: Apr 20, 2018
In this paper we describe effective data center pod frame containment systems and demonstrate how they can reduce time to deploy by 21% and reduce capital costs by 15% compared to traditional methods and containment systems.
Tags : 
data center, it racks, pod frame, air containment, it deployment
    
Schneider Electric
Published By: Workday     Published Date: May 09, 2018
Compare your professional services firm with more than 450 PSOs with this expansive benchmark study from Service Performance Insight. Get access to hundreds of pages of charts, graphs, and analyses that offer insight into the performance of your peers and where you can improve to make the greatest impact.
Tags : 
    
Workday
Published By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : 
flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center, enterprise applications
    
NetApp
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks, telecom, data center
    
Noction
Published By: Dell     Published Date: Sep 14, 2017
Read this executive brief from Quinn Street to learn how: • Advances in mobility and durability are allowing computing devices to leave the office and be used in field environments • Organizations that invest in rugged devices for field operations will see a better return on investment compared to non-rugged devices • Discover how Dell’s investment in real-world testing helps its rugged devices stand up to harsh environments
Tags : 
    
Dell
Published By: NetApp     Published Date: Sep 21, 2017
An overview of EMC's ExtremIO architecture as it compares to NetApp SolidFire. Provides an overview of each solution's differences and their overall impact suitability needs of a next generation data center
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire, emc
    
NetApp
Published By: FICO     Published Date: Nov 21, 2016
Prescriptive analytics enable you to estimate and compare the likely outcomes of any number of actions, and choose the very best action to advance business objectives. And getting there isn't as difficult as you think. Start your journey by downloading this eBook.
Tags : 
    
FICO
Published By: LifeLock     Published Date: Aug 23, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for employers to look for in selecting a partner. Compare now!
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Google Analytics 360 Suite     Published Date: Jul 28, 2017
Today’s marketing leaders need sophisticated tools to turn data into cross-channel insights that improve performance. In a new report, Gartner compares 11 digital marketing analytics solutions across five key areas: data integration, exploration, advanced models, platform integrations, and measurement. Selecting the best solution for your team requires thoughtful analysis. How will you determine the best fit? Gartner’s Magic Quadrant can help.
Tags : 
    
Google Analytics 360 Suite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.