RSS feed Get our RSS feed

News by Topic

ads

Results 1076 - 1100 of 1614Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jun 13, 2018
The cloud offers elasticity and flexibility to meet a range of demands
Tags : 
     IBM
By: IBM     Published Date: Aug 08, 2018
An IBM Cloud configuration completed a big data analytics workload in less time and with greater throughput than an AWS solution
Tags : 
     IBM
By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
There's a good reason athletes in contact sports wear protective pads. History of the game has proven where injuries are most likely to occur, hence the placement of the pads.
Tags : product management, product development, product lifecycle management, zigzag
     ZIGZAG Marketing, Inc.
By: Dun & Bradstreet     Published Date: Feb 03, 2016
According to eMarketer, digital marketers have a “love affair with data,” and are planning to increase spending and usage in data-driven marketing strategies. Data helps marketers make more informed decisions about their most receptive audiences, so it should come as no surprise that 75% of B2B marketers currently leverage data to inform their digital advertising strategy, according to a new study.
Tags : 
     Dun & Bradstreet
By: Dun & Bradstreet     Published Date: Jun 08, 2016
THE B2B MARKETERS GUIDE TO THE WORLD OF PROGRAMMATIC ADVERTISING While some in the B2B world are quickly jumping on the programmatic advertising bandwagon, many more don’t know the first thing about it or what the benefits are. That’s probably why you’re checking out this nifty little guide right now. Whether you’re a beginner with a basic curiosity about programmatic, or you have already executed a programmatic ad buy but want to learn more, you’ve come to the right place. After skimming through the pages of this book, you’ll learn exactly what programmatic is, why you need it, how it works, and why there’s no looking back when planning you’re next great ad campaign. You’ll discover exactly why Programmatic Matters.
Tags : 
     Dun & Bradstreet
By: Dun & Bradstreet     Published Date: Oct 26, 2016
After skimming through the pages of this book, you’ll learn exactly what programmatic is, why you need it, how it works, and why there’s no looking back when planning you’re next great ad campaign.
Tags : programmatic, digital advertising, audience data, adtech buying, interactive/pr agencies, web analytics, customer experience/engagement, social media marketing
     Dun & Bradstreet
By: Oracle APAC     Published Date: May 24, 2018
Linux has become an important component of the organization's infrastructure since initial deployment around six years ago. The Linux infrastructure was first used for classic edge-of-network workloads but has evolved over time to take on increasingly sophisticated and critical workloads. Today, it is considered a primary workhorse for the company. As in many organizations, Windows, with about 5,000
Tags : 
     Oracle APAC
By: Cohesity     Published Date: Aug 09, 2019
IT organizations everywhere are undergoing significant transformation to keep pace with the needs of their businesses. They’re tasked with consolidating data centers and migrating both workloads and data to the cloud. The transition has been easier for some than others. As hybrid architectures increasingly become the norm, how are enterprises gaining complete visibility, simplifying management, and making use of all of their data—both on-premises and in the cloud? Five enterprises explain how they’ve replaced multiple products that created legacy data silos with Cohesity – a single, hyperconverged softwaredefined platform with native Microsoft Azure integration for simplified secondary data and applications. For them, Cohesity and Azure together boost IT agility while lowering costs, solving critical secondary data challenges from long-term retention, storage tiering, test/dev, disaster recovery and cloud-native backup in a proven hybrid cloud architecture.
Tags : 
     Cohesity
By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods – manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems – are not keeping pace. Whatever tools and processes are in place now, there’s always the opportunity to evolve to a higher level for more accurate detection – more high-value alerts and fewer false positives.
Tags : 
     SAS
By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : security, malware, code signing, software, downloads
     Symantec Corporation
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
     Cisco Umbrella EMEA
By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : cloud, security, data protection, data loss, information security
     Symantec
By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : security, data security, file share security, sharepoint, file servers, netapp
     Quest Software
By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
     Globalsign Inc.
By: Oracle     Published Date: Mar 01, 2019
Railroads Roll Ahead with Cloud-Based Crew Management
Tags : 
     Oracle
By: HERE Technologies     Published Date: Aug 29, 2018
With urbanization set to increase rapidly – the UN predicts that by 2050, 68% of the world’s population will live in urban areas – discover how, with HERE, you can keep your city moving. And make it more safe, efficient, and green. HERE is already working with governments around the world to keep traffic flowing and pollution down. In this guide, discover how, with our growing network of sensors and over 30 years’ experience, we can deliver the real-time insights to keep you abreast of what’s actually happening on your roads, so you can better meet government safety and mobility targets.
Tags : public sector, urbanization
     HERE Technologies
By: Bluekai     Published Date: Aug 10, 2012
Publishers today live in a data-driven world. It is no longer enough to simply create content, build audiences, and sell ads.
Tags : data management platform, bluekai, supply-side platforms, audience engagement, audience extension, audience analytics, emerging marketing, internet marketing
     Bluekai
By: Magnetrol     Published Date: Nov 05, 2018
Tank overfill is a crucial safety concern in the petroleum industry. Failure to put adequate prevention measures in place has resulted in injuries, loss of life, and billions of dollars worth of damages worldwide. These resources were developed by the level control experts at Magnetrol to help you implement and maintain an effective Overfill Protection Plan for your terminals. Simply click on the downloads below at the Resources section to access this important information.
Tags : 
     Magnetrol
By: ScanLife     Published Date: Feb 25, 2012
Good use of QR codes can catapult a campaign into the realm of the innovative, however, true innovation requires the effective use of new technology. And since the technology is new, literature and knowledge regarding its effective usage is scarce, resulting in the failure of many QR Code campaigns. Read to find out more.
Tags : scanbuy, marketing, emerging marketing, qr codes, mobile marketing, mobile apps, mobile uploads, interactive marketing
     ScanLife
By: Dell and Nutanix     Published Date: Jan 16, 2018
Organizations increasingly require IT infrastructures that support the speed at which their businesses must operate through simplicity, efficiencies, agility, and strong performance. Hyperconverged infrastructure solutions, which enable organizations to minimize or nearly eliminate inefficiencies and complexity associated with maintaining storage and compute silos, have emerged as a strong potential solution for such organizations. IDC’s research demonstrates that organizations running workloads on Nutanix solutions such as Dell XC are benefiting are benefiting from cost and staff efficiencies, the ability to scale their infrastructure incrementally, very high resiliency, and strong application performance. This is helping interviewed Nutanix solutions customers better meet business challenges and has led many of them to establish plans for expanding their hyperconverged workload environment with Nutanix solutions.
Tags : technologies, infrastructure, data, social, mobile, cloud, nutanix
     Dell and Nutanix
By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
     Akamai Technologies
By: Rackspace     Published Date: Mar 28, 2018
Following Google’s recent Managed Services Partner Program Launch,Rackspace® announced that it is migrating, managing and optimizing business-critical workloads for several customers, from enterprises to educational institutions to emerging start-ups, on Google Cloud Platform.
Tags : 
     Rackspace
By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : rackspace, private cloud, enterprise, application, data
     Rackspace
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The relational database has been the foundation of enterprise data management for over thirty years. But the way we build and run applications today, coupled with unrelenting growth in new data sources and growing user loads are pushing relational databases beyond their limits. This can inhibit business agility, limit scalability and strain budgets, compelling more and more organizations to migrate to alternatives like MongoDB or NoSQL databases.
Tags : rdbms, mongodb, migration, data, enterprise, management
     AstuteIT_ABM_EMEA
By: Neustar     Published Date: Aug 20, 2012
TARGUSinfo introduces you to the buying behaviors and patterns of today's insurance consumer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization
     Neustar
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics