fti

Results 226 - 250 of 254Sort Results By: Published Date | Title | Company Name
Published By: Anthem Marketing Solutions     Published Date: Oct 28, 2010
The third installment of a bi-annual study produced by Anthem Marketing Solutions reveals that the competition between physical stores and online retailers is rapidly shifting across a range of prices and item categories. While common wisdom dictates that better deals will be found more frequently online, the analysis concludes that shopping in stores can yield much higher savings when shoppers are looking for the lowest price.
Tags : 
online vs. offline, in-store pricing, online pricing, pricing trends
    
Anthem Marketing Solutions
Published By: HP and Intel® Xeon® processors     Published Date: Feb 07, 2012
This book will help you understand why infrastructure convergence has been widely accepted as the optimal approach for simplifying your IT to deliver services at the speed of business while shifting significantly more IT resources to innovation.
Tags : 
cloud, utility storage, foundation, cloud, enviornment, 3par, virtual, virtualization, networking, storage, data center
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Oct 30, 2012
Shifting the balance of IT professional time from the tactical to the strategic has become much more attainable with the introduction of Hewlett-Packard ProLiant Gen8 servers. Learn how the ProLiant servers can ensure that IT delivers greater value.
Tags : 
it servers, proliant gen8, business value, it operations, it infrastructure, data center
    
HP and Intel® Xeon® processors
Published By: Private Aircrafts For Rent     Published Date: Apr 12, 2011
We are an aviation group shifting the paradigm in private air travel.Orlando Jet is based in Sanford, FL (Orlando, FL Metro). Our hangars are located at the Executive Terminal (Avion), in the Sanford International airport's n
Tags : 
private aircraft leasing, aviation group florida, personal aircraft services, privately owned aircrafts, aviationgroupflorida, personalaircraftservices, privatelyownedaircrafts, privateairtravelcharter, air aviation orlando, air aviation group, private aircraft leasing, personal aircraft services, privately owned aircrafts, aircraft leasing, private aircraft terminal, aviation group florida, aircraft charter companies, private aviation company, private aircraft travel, private aircraft charters
    
Private Aircrafts For Rent
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss, data interception, security management
    
nick.morgan
Published By: Citrix Systems     Published Date: Oct 08, 2012
New business requirements are transforming the demands placed on IT. To operate effectively in today's fast-paced global environment, organizations need to be able to get work done anywhere, anytime, by any type of worker to achieve the best results. This is the context for the rise of workshifting-the practice of moving work to the most optimal location, time and resources.
Tags : 
citrix, workshifting, optimal location, virtualization, resources, technology, cloud computing
    
Citrix Systems
Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence, intimacy, scale, speed, assess, measure, integrate, predictive capabilities, virtualization, analysis
    
IBM
Published By: Riverbed     Published Date: Nov 08, 2012
Many enterprises are shifting from desktop applications to web and mobile apps, they have started a tidal wave of dynamic content that will overwhelm traditional architectures. A tidal wave of dynamic web content is coming - how will you respond?
Tags : 
web content management, real time information, mobile apps, web content optimization
    
Riverbed
Published By: Workday     Published Date: Mar 01, 2018
Despite slower initial adoption, more finance leaders are now turning to public cloud SaaS for their applications. This joint video between Gartner Research and Workday explores why the financials market is shifting and what advantages await finance leaders in the cloud.
Tags : 
gartner, public cloud, saas, financial market
    
Workday
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security, access control, anti spam, anti spyware, anti virus, auditing, internet security, intrusion detection, intrusion prevention, vulnerability management
    
Arbor Networks
Published By: HP - Intel®     Published Date: Nov 13, 2012
Shifting the balance of IT professional time from the tactical to the strategic has become much more attainable with the introduction of Hewlett-Packard ProLiant Gen8 servers.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data center
    
HP - Intel®
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: Cisco     Published Date: Aug 18, 2014
Are you looking to maximize the productivity of the workforce by shifting to the cloud? Do you have a robust Collaboration platform in place to enable the new world of work? See for yourself all the reasons companies are shifting to the cloud and lowering total cost of ownership. Gain an edge by upgrading to Cisco Unified CM Version 9.0 or higher.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust, cloud computing
    
Cisco
Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage, infrastructure
    
Lumension
Published By: NetApp     Published Date: Mar 05, 2018
This independent report addresses some common GDPR myths. Learn the facts about the new obligations and liabilities faced by companies that manage data in the EU and how to assess your risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
Published By: Mitel     Published Date: Jun 29, 2016
In Unternehmen und Organisationen auf der ganzen Welt sind Räume, die einst gefüllt waren mit langen Kabeln, schwarzen Kisten und blinkenden Lichtern, heute wie leer gefegt. Übrig geblieben sind lediglich ein einsamer verstaubter Telefonkasten oder eine vergessene Klemmleiste, möglicherweise auch ein Kickertisch, an dem die IT-Mitarbeiter Dampf ablassen können. Der Grund für diese drastische Veränderung ist die Cloud – oder genauer gesagt die cloudbasierte Kommunikation – welche die IT-Landschaft vollkommen auf den Kopf gestellt hat. Einige ITVerantwortliche haben den Sprung in die Cloud bereits vollzogen. Andere arbeiten auf den künftigen Wechsel hin. Und wiederum andere halten weiterhin an einer lokalen Bereitstellung fest, sei es auf eigenen Wunsch oder aus Notwendigkeit.
Tags : 
best practices, business optimization, business management, productivity, cloud services, communications, cloud computing
    
Mitel
Published By: Oracle     Published Date: Oct 29, 2015
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
Published By: Oracle_Hospitality Hotels     Published Date: Sep 26, 2016
Enable valuable digital dialogues through a combination of marketing automation, interactive video, and personalized content. Intelligently crafting these elements of your campaign, while effectively integrating the tech stack tools that empower 1:1 conversations (OVP, MAP, and CRM), can create a remarkable video marketing strategy.
Tags : 
    
Oracle_Hospitality Hotels
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Inzwischen sollte jedem Entscheidungsträger bekannt sein, dass die DatenschutzGrundverordnung (DSGVO) der Europäischen Union im Mai 2018 in Kraft tritt und für alle Unternehmen sowie Organisationen gilt, die persönliche Daten von Bürgern der 28 EUMitgliedsstaaten erfassen, speichern oder verwenden. Diese neue Verordnung ändert die Auflagen zum Schutz personenbezogener Informationen von mehr als 500 Millionen Menschen und beschäftigt Datenschutzbeauftragte auf der ganzen Welt.
Tags : 
    
McAfee EMEA
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.