scenario

Results 1 - 25 of 198Sort Results By: Published Date | Title | Company Name
Published By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : 
business, cloud solutions, data centre, smb, systems, technical
    
Cloud Direct
Published By: FICO     Published Date: Dec 04, 2017
In an era where Big Data decisions demand high-powered tools, organizations everywhere are still mired in complex spreadsheets that limit the speed and precision of their critical customer interactions. Read this fact sheet to learn how you can evolve beyond what spreadsheets alone can achieve: • Allow business users to easily create and compare “what if” scenarios, interact with compelling visualizations, and challenge, improve and build trust with stakeholders and collaborators • Rapidly deploy new optimization features and applications practically at the speed of thought – without leaning on IT – while leveraging existing investments in other analytic tools (such as R, SAS, MATLAB, and even Excel) Download Now
Tags : 
fico, optimization, modeler, industry, analytic, tool, business, solutions
    
FICO
Published By: SAP     Published Date: Nov 18, 2015
This whitepaper will help you discover the business and technical scenarios that will form your digital value chain and propel your organisation forward.
Tags : 
digital, sap, sap s/4hana, digital economy, digital value, digital business, sap platform, real-time business
    
SAP
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Fitbit     Published Date: Jan 23, 2018
Don’t look work get in the way of being your healthiest and happiest self! There are loads of ways to stay active at work, no matter what the scenario. Desk jobs, lunch breaks, marathon business trips—we’ve got you covered. Read on to discover how to fit more exercise into your work day.
Tags : 
    
Fitbit
Published By: SAP     Published Date: Nov 16, 2017
View the Journey to the Cloud: SAP Strategy and Roadmap for Cloud and Hybrid Analytics Scenario webinar to find out leading innovations and future opportunities for your organisation.
Tags : 
    
SAP
Published By: Oracle CX     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle CX
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines current and future potential for IoT in the consumer industry. In addition, this white paper examines a set of IoT scenarios that are either available today or possible in the future.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing. (IDC defines IoT as a network of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity.) These scenarios more tightly integrate “things” with other information, processes, and even value chains. Further, we demonstrate how companies in these industries leverage technology to create business value today and disruptive opportunities tomorrow.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
    
SAP EMEA Global
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the IoT imperative for companies in the ENR industry. We highlight IoT scenarios now and in the future, that illustrate how the integration of “things” with data and processes can generate value for ENR companies.
Tags : 
    
SAP EMEA Global
Published By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Red Hat     Published Date: Jan 01, 2013
Linux has already established a solid position in the industry and can be expected to expand its footprint within all workload types, according to IDC. Furthermore, the analyst firm says customers that are using Linux today should be looking at the potential for new deployment scenarios.
Tags : 
linux, enterprise, deployment, red hat, business
    
Red Hat
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think it’s about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence IT’s reputation as the “Department of No.”
Tags : 
security, business, cyber security, application security, email security, firewalls, internet security, network security appliance
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Box     Published Date: Nov 24, 2015
Breakthroughs in collaboration technology are helping companies of all sizes foster engagement with employees, customers, and partners. However, some organizations are still struggling to align all facets of their organization and as a result misalignment between teams is still a likely scenario. Download this whitepaper to learn how online collaboration can help push productivity in order to allow your organization a competitive edge as a result of increased productivity and a positive return-on-investment.
Tags : 
collaboration technology, customer engagement, productivity, competitive edge, return on investment, security
    
Box
Published By: Prophix     Published Date: May 31, 2016
With Prophix you can produce rolling forecasts, multi-year forecasts, daily forecasts and driver-based forecasts. With a centralized application, organizing fragmented data from multiple sources and change assumptions easily and create a multitude of scenarios.
Tags : 
prophix, forecasts, application, database management
    
Prophix
Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper compares the cost of both scenarios, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach.
Tags : 
    
Schneider Electric
Published By: Okta     Published Date: Mar 14, 2016
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: IBM     Published Date: Sep 22, 2011
This white paper highlights the performance and scalability potential of InfoSphere DataStage 8.1 based on a benchmark test simulating a data warehouse scenario. The benchmark is designed to use the profiled situation to provide insight about how InfoSphere DataStage addresses key questions customers frequently ask when designing their information integration architecture.
Tags : 
ibm, infosphere, data performance and scalability, customers, datastage
    
IBM
Published By: Dell Storage     Published Date: Apr 17, 2012
A scale-out storage architecture helps organizations deal with demands for growing data capacity and access. Dell engineers put DellT EqualLogicT scale-out storage through its paces to demonstrate its scalability in both file and block I/O scenarios.
Tags : 
storage
    
Dell Storage
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data
    
Aternity
Published By: JBoss Developer     Published Date: Feb 05, 2016
Many larger enterprises have a variety of different integration technologies based on deep integration requirements or simply because consolidation failed in past. Hybrid² integration capabilities improve the interoperability and coexistence of multiple integration tools in merged scenarios.
Tags : 
jboss, redhat, forrester, wave, hybrid, integration. cloud computing, technologies, infrastructure
    
JBoss Developer
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.