Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

experts

Results 1 - 25 of 601Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
In the Garage, you work side by side with IBM experts to create first-of-a-kind MVPs, experiment with emerging technologies and quickly learn from failures. In this webinar hear from Ed Forman, Partner of Cognitive Process Transformation at IBM. Ed has partnered with organizations across industries including automotive, life sciences, financial services and telecommunications. In his work with the IBM Garage he has helped shape an award-winning method for innovation that has transformed business models for Fortune 500 clients. Listen to this 30-minute presentation to find out more. "The mandate for procurement organizations is clear – cost reduction alone no longer ensures success; creating value is equally important. How was Horizon Blue Cross Blue Shield able to achieve their desired future state? In this webinar, we will discuss: • Why procurement needs a strategic makeover, the current adoption of emerging technologies by procurement, and the challenges faced by procurement exec
Tags : 
    
Group M_IBM Q4'19
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
The European Union’s new regulatory framework for data protection laws, the General Data Protection Regulation (GDPR), became enforceable on 25 May, 2018. Under GDPR, organisations have new obligations to improve the security and privacy practices for the personal data they collect and use. With these new obligations comes the potential for heavier fines and penalties. Fortunately, Amazon Web Services (AWS) can help guide your organisation toward compliance under the new requirements. Take advantage of our services, resources, and experts as you navigate these changes.
Tags : 
    
Amazon Web Services APAC
Published By: Gigaom     Published Date: Oct 17, 2019
This free 1-hour webinar from GigaOm Research brings together experts in cybersecurity and automated remediation, featuring GigaOm analyst Jon Collins and a special guest from Puppet, Jonathan Stewart. The discussion will focus on how enterprise security and operations teams can significantly enhance their response to security threats via a collaborative, automated approach to resolution. Cybersecurity often feels like an asymmetric battle — while on one side, cybercriminals appear to manage their efforts efficiently on the dark web, enterprises often deal with the consequences individually, reliant on manual processes and tools. So, what can we learn from the perpetrators about how to coordinate a response to security threats when, or before, they happen? In this 1-hour webinar, you will learn: How cybercriminals and hackers work together to create and disseminate security threats What current challenges are faced by enterprises as they look to respond What options exist to deal wi
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 16, 2019
This free 1-hour webinar from GigaOm Research brings together experts in IT infrastructure and cloud featuring GigaOm analyst Mark Thiele and special guest from Packet, Jacob Smith. The discussion will focus on what can be done if a business has a need or desire to run application environments outside public cloud; and, in the age of public cloud adoption, what can companies do to remain competitive from an IT perspective. Most companies aren’t professional data center or infrastructure builders, and they shouldn’t have to be. This is in fact a driver for cloud adoption. Price, Performance, Proximity, Pride and Politics are reasons why enterprises might need more control at times over their infrastructure. This 1-hour webinar will explore: The considerations an enterprise must make when looking for a private cloud solution Examples of what others have done with managed private cloud If Managed Private Cloud can be cost-competitive with Public Cloud or on-prem IT. The high-level defi
Tags : 
    
Gigaom
Published By: IT Launchpad, LLC     Published Date: Dec 05, 2011
IT experts walk you through the top 7 reasons software development projects fail and how you, the buyer of IT services, can overcome these obstacles.
Tags : 
    
IT Launchpad, LLC
Published By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : 
cantaloupe, online video, social media, search, communication, facebook, twitter, seo
    
Cantaloupe
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
How Fiber Powers Growth – An Expert Q&A Guide provided by Spectrum Enterprise. Businesses today need bandwidth capacity to handle complex applications and ever-increasing data. See how technology experts rely on fiber to increase productivity and provide stronger growth opportunities.
Tags : 
    
Spectrum Enterprise
Published By: Windstream     Published Date: Jan 12, 2016
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Cisco     Published Date: May 24, 2019
The Cisco Solution Support is part of the high-value services offering. Whether you have an issue with a Cisco product or one from a solution partner, just call us. We centralize support through our solution experts who own your case from first call to resolution. Your complex issues are solved on average 43% faster than with product support alone.
Tags : 
    
Cisco
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Automation Anywhere APAC     Published Date: Apr 18, 2019
Forbes recently referred to robotic process automation (RPA) as “a gateway drug to AI,” referencing its low barrier to entry compared to other technology choices within the AI realm. But while experts continue to tout the future of RPA, what can we expect of it in the short-term? Jump into this resource to get a peek at how experts are predicting RPA’s 2019 will pan out, including notable market shifts, major technology disruptions, and entirely new RPA use cases.
Tags : 
    
Automation Anywhere APAC
Published By: SAP     Published Date: Oct 22, 2018
The Future of Customer Experience: Five Essential Trends is part of a series examining life and business in the 21st Century. SAP Center for Business Insight worked with more than a dozen industry experts to answer these and other questions, uncovering five trends that will determine the customer experience over the next decade. This report examines each of these trends and offers recommendations for how brands should respond now to prepare.
Tags : 
customer experience & engagement, digital transformation, sap
    
SAP
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: SAP     Published Date: May 18, 2014
From its conception, this special edition has had a simple goal: to help SAP customers better understand SAP HANA and determine how they can best leverage this transformative technology in their organization. Accordingly, we reached out to a variety of experts and authorities across the SAP ecosystem to provide a true 360-degree perspective on SAP HANA.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Nov 19, 2018
Hear from Cisco's Head of Data Centre & Multicloud alongside two experts as they discuss some real life case studies on how Cisco customers have grown their business through adopting hyper- convergence. They look at some key features of hyper- convergence and Cisco Hyperflex as well as some basic definitions of what hyperconvergence is. To find out how Cisco can help your business, download this video today.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Feb 12, 2019
Hear from Cisco's Head of Data Centre & Multicloud alongside two experts as they discuss some real life case studies on how Cisco customers have grown their business through adopting hyper- convergence. They look at some key features of hyper- convergence and Cisco Hyperflex as well as some basic definitions of what hyperconvergence is. To find out how Cisco can help your business, download this video today.
Tags : 
    
Cisco EMEA
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
    
Windstream
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.