RSS feed Get our RSS feed

News by Topic

net

Results 276 - 300 of 7467Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : technology, best practices, poweredge, hyper converged, networking, mobile computing
     Dell
By: Dell     Published Date: Jul 08, 2016
In a Hyper-Converged Infrastructure, compute, networking, and shared storage are delivered from Dell 13G PowerEdge servers powered by Intel Xeon processors, which enables a pay-as-you-go, aff?ordable model to cost-effectively operate at high performance.
Tags : best practices, technology, data, infrastructure, networking, poweredge, storage
     Dell
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
     Hewlett Packard Enterprise
By: Rosetta Stone     Published Date: Jan 23, 2018
Does your company foster a strong team dynamic? More than ever, effective businesses rely on employees to work internally across departments, and externally with increasingly global networks of clients. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.Results showed investing in employee language proficiency delivers five key benefits: Strengthens business operations Stimulates employee engagement Increases productivity Drives company loyalty Attracts globally-aware Millennials
Tags : 
     Rosetta Stone
By: GE Power     Published Date: Jan 30, 2017
Be the first to read the 2017 top digital trend predictions for the (remove second the) the power and utility industry, and gain a competitive edge by understanding what’s next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read the new Brief and learn how:
Tags : 2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids
     GE Power
By: Juniper Networks     Published Date: Mar 27, 2018
In our 40-criteria evaluation of data center hardware platforms for software-defined networking (SDN), we identified the nine most significant players — Alcatel-Lucent Enterprise, Arista Networks, Extreme Networks (which recently acquired Brocade Communications System’s data center networking business), Cisco Systems, Cumulus Networks, Dell, Huawei, Juniper Networks, and Pluribus Networks — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations professionals (I&O) make the right choice.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Mar 27, 2018
These guidelines explain how participating companies may use Forrester Wave™ research in their sales, marketing, and/or promotional materials. Please note that, in accordance with Forrester’s Citation Policy, a company must either be a current Forrester subscriber or have purchased reprint rights to the evaluation in order to cite from the evaluation or use the Forrester Wave findings in any of its material.
Tags : 
     Juniper Networks
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
     Carbonite
By: DataStax     Published Date: Mar 10, 2017
Netflix, Intuit and Clear Capital. These 3 innovative companies have one thing in common. They are altering their business landscape and transforming the way people live and work through highly personalized applications. And they're doing this with Apache Cassandra™ and DataStax. Download this white paper and learn why relational technologies failed to meet the demands of Netflix, Mint Bills and Clear Capital and how these enterprises modernize their Web and Mobile applications with DataStax to drive customer engagement, loyalty and lifetime value.
Tags : 
     DataStax
By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager Schützt und steuert privilegierte Anwender und die Anmeldeinformationen, die sie für die Nutzung und das Management Ihrer digitalen Infrastruktur verwenden. Die Lösung erzwingt proaktiv Security-Richtlinien und rollenbasierte Begrenzungen für Zugriffe privilegierter Anwender – und überwacht und zeichnet gleichzeitig die Aktivitäten privilegierter Anwender in virtuellen, physischen und Cloud-basierten Umgebungen auf.
Tags : 
     CA Technologies EMEA
By: Adobe     Published Date: Aug 30, 2017
According to a recent study, “76 percent of marketers said marketing had changed more in the last two years than in the previous fifty.”1 From apps like Uber and Airbnb that reengineer entire markets to mobile, omnichannel commerce, virtual reality, and the Internet of Things, marketing is being built anew.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
According to a recent study, “76 percent of marketers said marketing had changed more in the last two years than in the previous fifty.”1 From apps like Uber and Airbnb that reengineer entire markets to mobile, omnichannel commerce, virtual reality, and the Internet of Things, marketing is being built anew.
Tags : 
     Adobe
By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
     Oracle CX
By: Cognizant     Published Date: Oct 03, 2017
Impact that situation awareness can have on extended supply chain operations w/focus on logistics companies
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: Cognizant     Published Date: Sep 19, 2017
Focus on creating consistent terminology in order to generate insights from the digital data encircling employees, partners, processes and customers.
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics