RSS feed Get our RSS feed

News by Topic

ads

Results 151 - 175 of 1547Sort Results By: Published Date | Title | Company Name
By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
     VMTurbo
By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
     Datastax
By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
     Datastax
By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
     Dome9
By: Rackspace     Published Date: Apr 05, 2018
Before moving workloads to Google Cloud Platform, you need to consider your own unique set of business and IT needs
Tags : 
     Rackspace
By: IBM     Published Date: Jul 20, 2016
In this Webinar, you will learn: - How Today's Environments Push The Limits Of Current Infrastructure - Why Performance And Mixed Workloads Require A More Powerful Operating Ecosystem - Key Recommendations and insights to improve architecture infrastructure performance and flexibility
Tags : ibm, hardware, systems hardware, linux, linux on power
     IBM
By: PGi     Published Date: Mar 09, 2016
In the past, the role of a marketer was much easier. Marketers would hunker down in their own comfortable silos. They really didn’t have to be overly concerned about interacting with other departments, as long as they generated leads and successfully built brand awareness.
Tags : 
     PGi
By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content
     Oath
By: BrightRoll Exchange     Published Date: Apr 03, 2017
Take a peek at Yahoo’s proprietary data findings and the solutions available for QSR marketers.
Tags : qsr, qsr marketing, qsr customers, fast food, fast food marketing, casual dining marketing, customer, in-store traffic
     BrightRoll Exchange
By: Century Interactive     Published Date: Oct 20, 2010
Start Tracking Calls Take your first step toward measuring all your marketing efforts in one dashboard. If you like it, continue using our service on a month-to-month basis with no contracts or minimums.
Tags : century interactive
     Century Interactive
By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : capacity planning, vmturbo, resource allocation model, cpu, cloud era
     VMTurbo
By: Infosys     Published Date: Dec 12, 2017
Few topics garner more headlines today than artificial intelligence, and for good reason. Despite the fact tech luminaries can’t seem to agree if it’s the world’s greatest existential threat or saviour, there is little debate about its ability to fundamentally transform everyday life and the business models that support it. As Dr. Anastassia Lauterbach, Board member of Dun & Bradstreet, recently put it, “The internet disrupted 20% of all business models. Artificial intelligence will disrupt the remaining 80%.”
Tags : artificial intelligence
     Infosys
By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
     BlackBerry Cylance
By: AWS     Published Date: Feb 19, 2019
Microsoft Windows Server 2008 and SQL Server 2008 are nearing end of support, so now is the time to include these Microsoft workloads into your cloud migration strategy. Learn how this will set the stage to help you accelerate digital transformation, increase innovation and reduce the costs of your legacy and corporate applications.
Tags : 
     AWS
By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
By: Act-On     Published Date: Jan 08, 2015
It’s all about the leads. It’s true. B2B marketers spend their day focused on generating enough of them to fill their sales funnel. But that’s not always an easy task. So how do today’s marketers fill the funnel? They use content marketing. Learn essential ways to use content to generate top-of-funnel leads.
Tags : act-on, content marketing, social media marketing, email marketing, search marketing, generate leads, ebook, online marketing
     Act-On
By: NetApp     Published Date: Dec 15, 2014
Organizations expect their IT departments to deliver a SAN storage infrastructure that can support faster rollout of applications and services, continuous and fast access to data in key applications, and efficient scale to address corporate data growth without comparable growth in IT expenses. This IDC white paper reviews the key SAN storage features required to meet such challenges and the NetApp SAN storage portfolio offerings that best address your needs.
Tags : san storage, business workloads, access to data, data growth, it expenses, storage
     NetApp
By: Adobe     Published Date: Nov 07, 2013
Audi differentiates its brand experience using web content and digital asset management capabilities in Adobe Experience Manager.
Tags : adobe, audi, audi cars, adobe marketing cloud, audi website, latest innovation, brand experience, head of brand portal
     Adobe
By: Neustar     Published Date: Feb 27, 2013
This case study shows how On Demand Verification plays an important role in increasing business and improving efficiencies for Santander.
Tags : auto verification, loan verification, contact verification, consumer verification, real time verification, risk management, loan processing, loan optimization
     Neustar
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: Network Automation     Published Date: Dec 08, 2008
Often, the insurance underwriters stay late that last day of the month to enter new policies. This means that IT staff have a very small window to execute the applications critical to successful and error-free closing of the accounting books. IT staff had to run and baby sit the applications – one application requiring manual operation took over three hours to complete, another that uploads premium and claim information to the data warehouse took up to six hours.
Tags : network automation, application execution, process automation
     Network Automation
By: HotSchedules     Published Date: Mar 11, 2019
The restaurant industry is buzzing about automation. With labor costs expected to double and consumer demand for a seamless checkout experience, many restaurants are looking at technologies that can automate tasks in the front-of-house. But there are back-of-house processes that have yet to be fully automated. While auto-counting your inventory may be a thing someday, it’s not here yet. So if you can’t automate the inventory management process, you can at least use tools that automate its more cumbersome aspects. Maximum labor output, higher levels of accuracy, and better accountability are possible with a system that automates certain tasks and enable manager productivity for on-the-job success. After reading this eBook, you’ll know: • The many inefficiencies generated by manual, spreadsheet-based counting methods. • The innovations being made to inventory management technology. • How modern, mobile inventory management tools will help your managers reduce costs and increase product
Tags : 
     HotSchedules
By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
     DigiCert
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics