RecruitingBlogscom

Follow Us:

 

it trends

Results 751 - 775 of 1016Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Dec 03, 2015
IBM's white paper looks at the trends driving the move to SDN, the implications for the enterprise and the actions you can take to optimize the outcome for your business.
Tags : 
ibm, software defined networking, sdn, enterprise, networking, software development, business technology
    
IBM
Published By: IBM     Published Date: Jan 12, 2016
With the holiday season right around the corner, it's time for retailers to take a closer look at the strategies that can ensure success to uncover any potenital roadblocks on the horizon. Read the report to get the latest online shopping trends and best practices to maximize holiday returns.
Tags : 
mobile traffic, trends, best practices, retail
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
IBM's white paper looks at the trends driving the move to SDN, the implications for the enterprise and the actions you can take to optimize the outcome for your business
Tags : 
ibm, software, networking, sdn, software development, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, cybersecurity, ibm emergency response services, cyber crime trends, security, knowledge management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant, siem, networking, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
ODM is the evolution of business rules management. It provides a complete, easy-to-use system for automating day-today operational decisions and allows businesspeople and IT to collaborate on business rules by using an interface and a language that are comfortable and intuitive for both. ODM not only allows you to automate your business rules, but also it enables you to apply insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. It ensures that you’re making the right decisions at the right time, when it can make a difference. What can this mean for your business? Adopting operational decision management can: • Improve customer centricity (acquisition and retention) by engaging individuals at the right time with the right offers
Tags : 
    
Group M_IBM Q2'19
Published By: CollabNet     Published Date: Dec 20, 2011
In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Tags : 
agile, software development, continuous integration, alm, dev teams, accelerate delivery, developers, app dev
    
CollabNet
Published By: Intel     Published Date: Apr 16, 2012
Read how blades are the best infrastructure choice for an extremely wide range of enterprise applications and use cases.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Intel
Published By: Cisco     Published Date: Jul 11, 2016
As the corporate landscape becomes increasingly mobile, and workers collaborate across a growing range of devices, organizations are implementing an agile and secure unified communications infrastructure. Active deployment of UC technology solutions has been on the rise among enterprises; however, adoption among midsize businesses has been notably slower. Yet in seeking ways to do more with less, midsize organizations are increasingly turning to the cloud and converged networks to provide UC solutions. In October 2013, Cisco commissioned Forrester Consulting to dive deeper into the current usage trends and perceptions of unified communications among midsize organizations (100 to 999 employees) across North America, Asia, and Europe.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Digitization is reshaping the business landscape at an unprecedented rate. The disruption of established businesses used to take decades, but natively digital organizations such as Uber, Google and Amazon have disrupted their respective markets in fewer than 10 years. Digital transformation is creating new winners and losers faster than ever before. Exhibit 1 shows that in 1960, on average, businesses remained on the S&P 500 Index for 50 to 60 years; by 1980, the rate of change was cut in half. Based on these trends, by 2025, businesses are forecast to stay on the index for an average of only 12 years. Leveraging this economic data, ZK Research predicts that 75% of the index will turn over in the next 10 years. New market leaders will emerge, and established organizations will struggle to survive.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 03, 2017
Businesses today certainly do not suffer from a lack of data. Every day, they capture and consume massive amounts of information that they use to make strategic and tactical decisions. Yet organizations often lack two critical capabilities when it comes to making the right decisions for the business: the ability to make accurate predictions about the future, and to then use those predicted insights in conjunction with organizational goals to identify the best possible actions they should take. The combination of predictive analytics and decision optimization provides organizations with the ability to turn insight into action. Predictive analytics offers insights into likely scenarios by analyzing trends, patterns and relationships in data. Decision optimization prescribes best-action recommendations given an organization’s business goals and business dynamics, taking into account any tradeoffs or consequences associated with those actions.
Tags : 
predictive analytics, analytics, data analytics, financial marketing, market analytics, data resources, data optimization
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
IBM Security and Ponemon Institute are pleased to release the 2017 Cost of Data Breach Study: Global Overview. According to our research, the average total cost of data breach for the 419 companies participating in this research decreased from $4.00 to $3.62 million The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased from $158 in 2016 to $141 in this year’s study. However, despite the decline in the overall cost, companies in this year’s study are having larger breaches. The average size of the data breaches in this research increased 1.8 percent
Tags : 
data breach, security, research study, data trends
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security incidents have been on the rise for the past few years, and most experts in cybersecurity believe the trend will only continue to intensify. Here, though, our subject is not the high-profile, headline-grabbing attacks we all know about but the everyday struggle of organizations everywhere, in every industry, to protect their data in a world of thieves.
Tags : 
security, cyber crime, trends, cyber security, data protection
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance is an incredibly dynamic industry that continues to grow at an exponential rate. According to IHS, the industry experienced 12 percent growth last year, and is projected to expand even more this year. Are you keeping up with the trends that are fueling this momentum? More importantly, are you capitalizing on the trends that can give you a profitable competitive advantage? This article will show you what to watch out for and provide some insight you can implement that will help you and your customers do just that.
Tags : 
video surveillance, ip network cameras, city surveillance, utilities, panoramic network cameras
    
Seagate Technology
Published By: Seagate Technology     Published Date: Apr 14, 2015
Surveillance systems are evolving from being used primarily for security purposes to being used for analytics and improved ROI. With that in mind, it's important to consider many factors and how they affect the architecture of your surveillance system. This webinar will provide some of the top trends that may affect the outcome of your storage architecture.
Tags : 
surveillance, seagate, surveillance hdd, surveillance solutions
    
Seagate Technology
Published By: Kinetic Data     Published Date: Oct 15, 2007
Properly implemented, service catalogs can help IT run as a business - not just "like" a business. They improve communication, provide users with easier access to IT services, and enable measurement-driven continuous process improvement. This white paper shows you how to achieve a successful service catalog implementation on BMC Remedy and extend the benefits of service catalogs across functional areas.
Tags : 
itsm, service management, service, service catalog, service catalogs, bsdm, delivery management, service level agreement, sla, slas, service level agreements, catalog trends, kinetic, kinetic data, it management
    
Kinetic Data
Published By: Safari Books Online     Published Date: Jun 08, 2009
This white paper outlines some of the most salient challenges and demonstrates how technology managers can enable their development teams to streamline application development and troubleshooting, while keeping them current on emerging technology, new product versions, and changing market trends-allowing them to move right past the gotchas.
Tags : 
safari books, technology, development, streamline, product, branding, market trends, design, needs, developer, challenges, target, critical data, ruby, software development, it management
    
Safari Books Online
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Yearly Talent Evaluations are a Mix of Three Elements: 1) HR chasing down managers and employees to submit their reviews 2) managers rifling through months of hastily-written sticky notes, and 3) nervous employees sweating over how to reduce the last 12 months to a quick meeting. This strategy is ineffective and doesn’t reflect the needs of the modern worker. Check out five new trends that deliver more meaningful, engaging performance evaluations that lead to tangible workforce growth.
Tags : 
human resources, performance reviews, talent evaluation, efficiency
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Changing demographics, labor shortages, and skill deficits are making it tough for recruiters in 2017. But all is not lost. Here are three big challenges—and three big solutions—to conquer talent acquisition in 2017.
Tags : 
recruiting, human resources, talent acquisition, demographic trends
    
Cornerstone OnDemand
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: IBM     Published Date: Aug 16, 2013
The 2012 IBM Global CEO study found today’s business leaders rank technology as the most important external force that will impact their organizations. A new IBV software development study supports this, with IT and business leaders identifying five top technology trends critical to competitiveness. However, the same survey reveals that most organizations are not prepared to take advantage of these trends. While management recognizes that software is crucial to capitalizing on technology for competitiveness, they are not successfully executing. Join this webcast to learn how organizations that leverage effective software development can help close the execution gap and gain competitive advantage.
Tags : 
software, ibv software development
    
IBM
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top