using

Results 1 - 25 of 2546Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper we’ll explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, digital streaming, video on demand, vod, video delivery, over the top content delivery
    
Limelight
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
oszczedzaj, czas, pieniadze, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Apr 11, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Whether you’re making plans with friends, ordering food, or setting the temperature on your thermostat, smartphone and tablet technology make everyday tasks faster and easier. New Intel® Xeon® Scalable processor-powered 14th generation Dell EMC PowerEdge™ servers powered by Intel® Xeon® Platinum processor with iDRAC Quick Sync 2 technology bring these automated advantages to the datacenter, too. IT datacenter administrators (ITDMs) can now connect to the new PowerEdge servers using the OpenManage™ Mobile app on their Android™ or iOS devices and perform a subset of routine, yet essential, server management tasks. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Limelight Networks     Published Date: Feb 21, 2018
Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). In some cases, using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But how do you know if a multi-CDN strategy is right for your business? This free Guide will help!
Tags : 
    
Limelight Networks
Published By: This program is brought to you by Oracle and Intel     Published Date: Mar 15, 2018
When application and database numbers increase, how does an organisation avoid overstretching its staff, multiplying costs, and complications? Many companies are using Oracle Exadata—a platform that’s powerful, optimised, and cloud-ready when you are. And they’re seeing, on average, a five-year ROI of 429 percent, 94 percent less unplanned downtime, and 103 percent improvement in transaction rates. See our infographic for more significant findings.
Tags : 
    
This program is brought to you by Oracle and Intel
Published By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely
Published By: NetApp     Published Date: Mar 05, 2018
To keep pace with an increasingly digital world, enterprises are transforming their data infrastructures using all flash storage. As a leading all flash storage provider, NetApp simplifies your infrastructure to improve economics, while accelerating performance and increasing availability to enhance your company’s competitiveness. NetApp future-proofs your IT investments, allowing you to grow with confidence. NetApp® all flash storage reduces your storage footprint, power, and cooling by up to 10x; doubles performance at half the latency of leading competitors; and lets you migrate confidently from your existing SAN with a pathway to the cloud. With NetApp, all flash arrays, your business is prepared to take on anything and everything the future can throw at it: rapid growth, new technology, or a shift in the industry. Cut fear out of the equation. Be data ready to bring on the future.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
This e-book addresses common misconceptions about enterprise flash storage, providing clarity for anyone using or considering flash in enterprise environments. Learn about old myths laid to rest and the reality of how enterprises can make full use of their flash storage investment.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: APC by Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
APC by Schneider Electric
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface area—and leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Enterprises understand that greater efficiency, improved time-to value, and new opportunities can be gained by using cloud platforms; automating and accelerating their IT delivery; and putting technology to work in new ways to digitally transform their business. The difficult question is how to create an organization that is able to deliver these innovations. Skilled resources do exist, but they command high salaries and are in short supply. In fact, 70% of respondents to a recent Computing survey stated that their companies face a shortage of cloud skills. While bringing in experienced staff who can guide and lead new initiatives is often a necessity, it’s vital to concurrently train your existing staff and adopt solutions that narrow the gap between the realities of the present and the hopes for the future.
Tags : 
netops, skills, automation, enterprises, cloud, delivery, resources
    
F5 Networks Inc
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Genesys     Published Date: Feb 21, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
forrester, artificial intelligence, consulting, customer experience
    
Genesys
Published By: Pindrop Security     Published Date: Mar 21, 2018
One of the largest retail banks in the U.S. sought to improve customer satisfaction in the call center by eliminating time-consuming processes. Limited by a nonspeech- enabled IVR, the bank was constrained to outdated authentication options, such as PIN numbers and knowledge-based authentication (KBA) questions. Long enrollment processes and authentication challenges were driving call handle times up, causing significant customer frustration. The bank turned to Pindrop for help. Using Pindrop’s multi-factor authentication solutions, the bank confidently moved authentication away from costly agent-based KBA questions to passively authenticating callers within the IVR. This not only reduced call handle times but also improved customer account protection, by assessing every caller for risk before enrollment and authentication.
Tags : 
    
Pindrop Security
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: First Advantage     Published Date: Apr 17, 2018
In the face of compressed margins, what avenues exist for multi-family providers to build revenue? The answer is found in taking full advantage of the benefits of lower vacancies and high demand by maximizing operational efficiency–and background screening can help! Below we outline best practices for three main routes to building stronger revenues. 1. Squeezing value out of lower vacancies 2. Taking technology to the next level 3. Maximizing revenue while protecting against risk
Tags : 
    
First Advantage
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.