You've requested...

Share this with your colleagues:

Cloud : apprenez à choisir les projets avec le meilleur retour sur investissement

If a new window did not open, click here to view this asset.

Download this next:

Faire la lumière sur le cloud en France

Nous menons une enquête visant à acquérir de plus amples informations sur l’état du cloud en France. Avec votre participation à cette enquête anonyme et celle de vos pairs, nous serons en mesure d’établir un panorama du cloud en France.

 -          Participer à l’enquête –

 En remerciement pour votre contribution à notre enquête, vous recevrez deux PDFs dédiés à cette technologie : Cloud et DevOps pour doper les performances de votre IT et notre e-zine Storage n°14 : stockage primaire, les offres des grands du cloud.

These are also closely related to: "Cloud : apprenez à choisir les projets avec le meilleur retour sur investissement"

  • How to embed innovation in the corporate culture

    Innovation does not have to be innovative

     

    By Richard Eynon

     

    Innovation often features high on CIOs’ agendas because it is recognized as being an important means by which information systems and technology can contribute positively to the evolution and performance of the business.



    However, in practice the execution often falls short of the ambition. Reasons for this range from the mundane, such as there being insufficient time or capacity to devote to it, to the more fundamental, such as organizational or cultural barriers, or insufficiently defined processes and governance for capturing ideas and seeing them through to fruition.



    This paper explores what the common inhibitors to innovation are and how to overcome them, and sets out some important principles that can help organizations establish innovation more firmly within their normal operations.



    It presents a pragmatic approach to embedding innovation within the corporate culture, and highlights ways that CIOs can counter the risk of investments in innovation not delivering the anticipated returns.

     

    richard.eynon@kurtsalmon.com

     

    Kurt Salmon Logo

     

     

    Kurt Salmon is a global management consultancy of more than 1,600 consultants with offices throughout the world.

  • Is the mobile gambling market still a safe bet for business?

    This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.” It is not unreasonable to say that mobile gambling services are simultaneously the most intriguing and vexatious within mobile entertainment.

Find more content like what you just read:

  • E-Guide: Steps to securing your file transfers and meeting compliance requirements

    Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.

    Download

  • 10 steps to reimagine your digital experience

    Customer retention has quickly become one of the top priorities for every business today. Retaining existing customers, however, is a multi-channel effort that requires a comprehensive strategy that many haven’t put the resources or time into. Use this guide to discover the 10 steps to reimagine your digital experience with digital nudges.

    Download

  • Achieving continuous compliance: Garancy Recertification

    In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.

    Download

  • The IoT security lifecycle

    As unmanaged Internet of Things (IoT) devices continue to pop up, securing them becomes increasingly important. Watch this video to unlock a new methodology to secure IoT devices, which revolves around a 5-step lifecycle.

    Download

  • Cloud & Outsourcing - Why Partnering Strategies Matter

    Explore how outsourcing motivations have changed and why you should adapt your sourcing strategies to keep up.

    Download

  • This is what we die for

    This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.

    Download

  • CW+: Business opportunities in the North American mobile market

    In May, 2010, Verizon Wireless told investors at Barclays Capital media and technology conference in New York that it expected to offer customers who signed up for its 4G services monthly “buckets” of data.

    Download

  • Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts - updated

    This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.

    Download

  • How Nissan shifted to Agile

    In this case study, explore how Nissan focused on innovative modern vehicle design and development while implementing best-in-class engineering and IT business practices for digital transformation.

    Download

  • Data center buyer’s guide: Key questions and considerations

    Whether building a data center or strengthening existing facilities, it is important for IT teams to understand what’s needed to develop their data center facilities. Open this white paper to discover some questions to ask when looking at footprint size, power requirements and more.

    Download

  • All this from a spilled cup of coffee? Infographic explains

    Dive into this infographic to learn about the Shared Responsibility Model, an outline that articulates which party is responsible for data in various data loss scenarios—including rogue coffee spillage.

    Download

  • Identity management vs. authentication: Know the difference

    In order to secure and manage access to your critical data, it’s important to understand the differences between identity management and authentication. Read this e-guide to gain the insight you need to make an informed decision.

    Download

  • TRACE: Advantages, challenges and more

    The TRACE model for withholding taxes of dividends paid to nominee-registered shares was implemented at the beginning of this year. To learn more about the policy and its implications, SDS gathered a panel of professionals to give their thoughts on the advantages of TRACE, the particulars in Finland, and more. Download your copy here.

    Download

  • Expert interview: Discussing TRACE with a tax specialist

    The TRACE model for withholding taxes of dividends paid to nominee- registered shares has been implemented since the beginning of this year and the first reporting is due in January 2022. SDS recently asked Emma Pulkkinen, Tax Specialist at Vero Skatt for her opinion about TRACE. See what she had to say in this white paper.

    Download

  • E-Guide: Avoiding Application Security Pitfalls

    This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.

    Download

  • Nurturing 3rd-party leads with email marketing

    More than half of B2B buyers will end sales calls if reps don’t know enough about their companies. That’s why it’s so important to have a solid plan for nurturing third-party leads. Download this eBook for tips on how you can use email marketing to nurture third-party leads.

    Download

  • 5 critical factors for with hybrid and multi-cloud data management

    Access this white paper for 5 critical factors for taking reporting and insight capabilities to a higher level with hybrid and multi-cloud data management.

    Download

  • The path to data intelligence

    Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.

    Download

  • Mainframe threat detection for insurers

    Do insurers have blind spots when it comes to protecting their data and networks? Many actively ignore significant risk due to a lack of visibility, expertise and real-time tools. What can be done to compliantly get a better view of possible malicious activity? Download this guide to learn how mainframe threat detection can help.

    Download

  • Productivity is Dead. Here's how to fix it.

    Productivity as we know it no longer exists. Showing up to work early, sending emails at all hours, and an endless stream of face-to-face meetings were once viewed as signs of a model employee. Through embracing new digital tools and smarter ways of connecting, productivity is about working fast and being agile

    Download

  • 5 CEM tips from Walter White

    Access this expert e-guide to learn more about customer experience management through the experiences of fictional character Walter White from the popular television series "Breaking Bad." Read on to learn how Kimberly Samuelson of Laserfiche, draws parallels between marketing strategies and the illegal drug business.

    Download

  • Blockchain Enterprise Survey: deployments, benefits and attitudes

    Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.

    Download

  • Top 5 hidden costs of your business phone system

    Many organizations are keeping their phone systems on-premise. Generally, they cite that it would be cheaper to remain on-premise than it would be to go and purchase a cloud phone system… or would it? Study this white paper to learn the top 5 hidden costs of legacy phone systems and how they compare to cloud systems.

    Download

  • Top 5 hidden costs of your business phone system

    A unified, flexible and cost-effective cloud phone system can save organizations more money over time than remaining on a legacy system. Legacy systems are adding functionality, but they become increasingly more expensive as they do, not to mention the cost of adding locations. Read this white paper to learn why cloud phone systems could win out.

    Download

  • How to keep your mainframes secure and up to date

    The death of mainframes has been predicted for decades – yet here they still stand, fifty years later. Download this white paper to find out how to adapt RACF administration challenges to today’s security standards – and keep your mainframes running smoothly.

    Download

  • Understand the data behind your customer interactions

    The key to success is knowing your customer base as a whole, and knowing each individual customer on a personal level. But, how do you take action on that knowledge? Download this guide to find out, which offers tips on leveling up CX in consumer services.

    Download

  • UC market insights & decision guide

    The UC market has evolved to the point where there is now a near constant rate of disruption. However, it’s clear that the future of UC is in the cloud, and vendors are pushing to release the most competitive product. Download this UC market guide to understand what to take into consideration when making your decision.

    Download

  • The event mesh: A primer by Red Hat

    In this introductory guide by Red Hat, find the answers to all your event mesh questions, including: What are events? What is an event mesh? How can you deploy the event mesh in the real world? What makes an event-driven enterprise? Click here to download the guide for safekeeping.

    Download

  • Considering a BYOPC Strategy: A Q&A

    Discover the concerns, opportunities, and benefits of enabling a BYOPC initiative in your workplace, including why enforcing a strict policy beforehand is essential to its success.

    Download

  • How to manage vulnerability risk

    Unpatched vulnerabilities are the cause of 1 in 3 breaches around the world, costing organizations millions. The need to install the latest security patches to mitigate vulnerabilities is well-understood, but volume can be overwhelming. Access the Microsoft Vulnerabilities Report to learn how you can mitigate these vulnerabilities.

    Download

  • Considering a BYOPC Strategy

    Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.

    Download

  • How to prevent phishing attacks: User awareness and training

    This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.

    Download

  • 6 customer service channels you need to support

    Where should you allocate resources to most effectively engage with current and potential customers? In this expert e-guide, Scott Sachs of SJS Solutions weighs the pros and cons of the 6 main customer service channels: Chat/video chat, phone, email, social media, customer self-service, and mobile.

    Download

  • Top 5 strategies for IT tools consolidation

    If your organization has more than 20 tools for IT operations management and DevOps, you’re not alone. Nearly 40% of IT teams are using more than 10 monitoring tools—while 18% have more than 20 monitoring tools in their organization. Download this guide to explore the top 5 strategies for IT tools consolidation.

    Download

  • A day in the life of higher education with Avaya Cloud Office

    What many believed to be a temporary shift to remote education has become a permanent change to the way students, staff, and faculty communicate and collaborate. In this white paper, learn how Avaya Cloud Office by RingCentral can help enhance the way higher education institutions operate by providing enterprise-grade cloud communications.

    Download

  • DB performance: How to overcome performance deficits

    When database performance lags behind the rest of your technology, it can create poor experiences, cost overruns, and sub-optimal workloads across initiatives. Read on to learn how you can align your IT priorities with your database performance, and discover a solution that can help you see more success.

    Download

  • Financial applications automation – promise is real but needs business nous

    The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.

    Download

  • Financial applications automation – promise is real but needs business nous

    The automation of the financial software that lies at the heart of any business – accountancy, budget management, general ledger, payroll, and so on – is a prize many organisations are eyeing up, with machine learning and robotic process automation close to mind. Find out everything you need to know by downloading this PDF E-Guide.

    Download

  • Ad-hoc investigations vs. Insider threat management

    Read this visual guide to get a step-by-step look at how an insider threat investigation works – both with and without a dedicated insider threat management (ITM) platform. Dive in to get started.

    Download

  • Data security 101: Applying policy-driven protection

    Protecting essential data exchanges is an increasingly important business imperative. Read this white paper to learn about the importance of encryption, common challenges, how to apply policy-driven security to data exchanges, and more.

    Download

  • MDR: How law firms can modernize their security strategy

    Law firms are increasingly a target for cyberattacks and must take measures to disrupt threats. This is crucial today since 49% of attackers spend over 20 hours a week researching and bypassing security systems. With this infographic, learn how to modernize your cybersecurity strategy with MDR.

    Download

  • A CISO’s guide to protecting your company’s reputation

    The high-stakes nature of today’s cybersecurity landscape presents a unique and often-stressful challenge for CISOs. Read this white paper to learn about the new role of the CISO, including a look at the impacts of these new pressures and expectations.

    Download

  • How SoftIron’s HyperDrive transformed one global e-commerce platform

    Access this case study to learn how SoftIron HyperDrive, an enterprise-class, software-defined storage solution purpose-built to optimize Ceph, transformed THG’s e-commerce IaaS & hosting products.

    Download

  • Rationalization: A CFO Discussion

    For today’s CFO’s, cybersecurity expenditure is a tricky gambit – to avoid the devastatingly high (and rising) costs of a cyberattack, organization’s feel pressured to spend an unsustainable sum of money to protect their reputation and bottom line. Access this white paper to learn more about the evolving role of the CFO.

    Download

  • Engaging Customers: New Lessons around Customer Behavior

    This expert e-guide counts down five customer experience management (CEM) practices that drive success. Also inside, learn how one organization executed an effective mobile CEM strategy. Read on to learn more.

    Download

  • E-Guide: Expert insights to application security testing and performance

    Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.

    Download

  • E-Guide: Integrating security into the ALM lifecycle

    In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.

    Download