RSS feed Get our RSS feed

News by Topic

ads

Results 1201 - 1225 of 1593Sort Results By: Published Date | Title | Company Name
By: Alert Logic     Published Date: Jun 12, 2014
In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.
Tags : cloud security, public cloud, amazon web services, cloud pci, secure cloud, security
     Alert Logic
By: Optimizely     Published Date: Nov 05, 2015
Statistics are the underpinning of how Optimizely’s customers use data to make decisions. We use experiments to understand how changes we make affect the performance of our online experiences. To do this, we need a framework for evaluating how likely those changes are to have an impact, positive or negative, on a business over time. To run great experiments, investing in an understanding of statistics is one of the most important skills you can develop. Statistics provide inference on your results and help to determine whether you have a winning variation. Using statistical values to decide leads to stable, replicable results you can bet your business on. Lack of understanding can lead to errors and unreliable outcomes from your experiments.
Tags : statistics, experiments, data, customers, results, variation, crm & customer care, marketing research
     Optimizely
By: Optimizely     Published Date: Dec 01, 2015
Statistics are the underpinning of how Optimizely’s customers use data to make decisions. We use experiments to understand how changes we make affect the performance of our online experiences. To do this, we need a framework for evaluating how likely those changes are to have an impact, positive or negative, on a business over time. To run great experiments, investing in an understanding of statistics is one of the most important skills you can develop. Statistics provide inference on your results and help to determine whether you have a winning variation. Using statistical values to decide leads to stable, replicable results you can bet your business on. Lack of understanding can lead to errors and unreliable outcomes from your experiments.
Tags : statistics, experiments, data, customers, results, variation
     Optimizely
By: Planview - Innotas     Published Date: Jun 06, 2017
Let’s examine how Project Portfolio Management (PPM) and Collaborative Work Management can put you in the driver’s seat.
Tags : project portfolio management, ppm, roi, return on investment, work management
     Planview - Innotas
By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : ibm, malware detection, cybercrime prevention, it security solutions, security
     IBM
By: Empyr     Published Date: Jan 09, 2018
Get the impressions and clicks for free; you only pay when the sale happens. The Empyr CPR Network represents 175M+ consumers and 1,500+ websites and apps.
Tags : 
     Empyr
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : backdoor trojans, trojan protection, malware, malware protection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : backdoor trojans, trojan protection, malware, malware protection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : backdoor trojans, trojan protection, malware, malware protection
     McAfee
By: Exablox     Published Date: Jan 27, 2015
Infrastructure simplification is a concept popping up very often lately with IT managers across all kinds of organizations. But it’s nothing new for small, and budget constrained IT shops that have always looked at ways of keeping their infrastructure simple, very manageable and highly serviceable. Unalaska City School District (UCSD) is no exception; in fact, its needs are even more constrained due to its particular position on the map. Located on the Aleutian Chain, approximately 800 air miles southwest of Anchorage, Alaska, Unalaska is home to 4,000 permanent residents and boasts the U.S’s most productive commercial fishing port of Dutch Harbor, which is also well-known as the home of successful TV show “The Deadliest Catch”. Accessible only by airplane or boat, there are no roads to Unalaska. The deep water and ice-free International Port of Dutch Harbor serves cargo ships and large container vessels throughout the year, making this port one of the busiest transportation hubs in t
Tags : storage infrastructure, nas solution, legacy storage, storage management, exablox, onesystem, oneblox, storage capacity
     Exablox
By: Dell EMC     Published Date: May 15, 2015
Swiss analyst, Storage Switzerland, reports on the importance of customers assessing the right fit for a data center and workloads, specifically when evaluating an all-flash array solution.
Tags : emc, storage switzerland, all-flash, architectures, workload, data center, scale, storage
     Dell EMC
By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
     Forcepoint
By: NetApp     Published Date: Mar 05, 2018
In today’s evolving hybrid- and multicloud world, successful organizations need to make the best decisions about where to run their applications and workloads. But this demands sweeping visibility into data location, utilization, and performance.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Savvis     Published Date: Jul 07, 2010
The research surveyed CIOs, IT Directors and Heads of IT in the U.S., U.K., and Singapore from medium to large enterprises and the public sector. The findings reveal that respondents fully anticipate significant growth in outsourcing.
Tags : savvis, outsourcing, cloud computing, enterprise security
     Savvis
By: Oracle     Published Date: Feb 22, 2019
Migrate workloads to Oracle Cloud to simplify data center operations.
Tags : 
     Oracle
By: DocuSign UK     Published Date: Aug 08, 2018
HR is all about serving your people, whether they are shiny new recruits or lifetime employees. But all too often, outdated and cumbersome paper-based processes get in the way of those goals. Discover how HR departments are using electronic signatures to streamline the on-boarding experience, increase employee satisfaction, and focus staff away from mundane tasks. Watch this webinar and discover how eSignatures can help you: - Simplify the new hire process: NDAs, offer letters, background checks and on-boarding - Streamline compensation and benefits: comp plans, stock option grants, and benefit plan notices - Reduce admin overheads: holiday requests, contractor agreements, and internal approvals - Ensure compliance: ISO compliance, new hire check-offs and audit support
Tags : 
     DocuSign UK
By: Network Automation     Published Date: Dec 02, 2008
Every night for several years, the five Latin America offices of Michigan-based medical technology products manufacturer Stryker Corporation were forced to burn the midnight oil to turn their daily financials into a single consolidated report. Each office has its own independent ERP system, so the process required three hours to compile the data for each territory plus another 90 minutes for a financial analyst at division headquarters to merge the five spreadsheets into one document.
Tags : network automation, automate professional, erp
     Network Automation
By: IBM     Published Date: Nov 09, 2012
Applications represent three of the top four software concerns of IT executives. Organizations should consider the varying nature of their application workloads in order to make smarter choices. This Forrester paper looks into the impact of System Z.
Tags : ibm, system z, total economic impact, roi, benefits, agility
     IBM
By: IBM     Published Date: May 07, 2013
Knowing the potential benefits of cloud computing, IBM implemented this technology for six workloads—development and test, analytics, storage, collaboration, desktop and production application. And the results have yielded significant financial and operational improvements. IBM shares some key insights through this report, learned after a successful move to cloud, including different ways in which each workload benefited. It also reveals how adopting cloud enabled significant improvements in efficiency, innovation, service and support levels. Download: Success in the cloud: Why workload matters.
Tags : success, cloud, improvements, efficiency, innovation, service, support
     IBM
By: IBM     Published Date: Mar 22, 2013
This whitepaper discovers how by implementing cloud computing across 6 fundamental workloads can transfer the way whole groups employees do their jobs, enabling them to speed new development and uncover new sources of revenue.
Tags : ibm, cloud computing, erp, bi tools, workload selection, analytics, lower cost of ownership, workforce
     IBM
By: Rubrik EMEA     Published Date: Jan 04, 2019
Moving applications and workloads to the cloud has become a major goal for most IT decision-makers. But cloud migration can come with challenges and pitfalls for organizations that haven’t done their homework. This paper examines some real-world examples of organizations that successfully made the transition with the help of an experienced vendor with bold new ideas
Tags : cloud, data, archiving, backup, applications, infrastructure, recovery, workloads
     Rubrik EMEA
By: VMTurbo     Published Date: Feb 11, 2014
Explore the challenges and best practices of virtualizing business-­critical applications. Identifies major practical barriers that organizations face so you don't have to.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, managing spp
     VMTurbo
By: Fusion-io, Inc.     Published Date: May 27, 2014
Fusion---iodelivers the world's data faster. From e---commerce retailers to the world’s social media leaders and Fortune Global 500 companies, companies are improving the performance and efficiency of their data centers with Fusion---io technology. ioControl Hybrid Storage from Fusion---io is ideal for customers seeking to virtualize mission---critical workloads, deliver high performance VDI, and control efficient application acceleration across shared storage environments.
Tags : fusion-io, infrastructure, hybrid storage, i/o gap, flash storage, hybrid storage, hybrid san, hybrid flash array
     Fusion-io, Inc.
Start   Previous    42 43 44 45 46 47 48 49 50 51 52 53 54 55 56    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics