RSS feed Get our RSS feed

News by Topic

ip technology

Results 251 - 275 of 438Sort Results By: Published Date | Title | Company Name
By: Skillsoft     Published Date: Mar 27, 2015
Leadership development is a journey, not a destination Fueled by the relentless evolution of technology and global competition, the business environment is changing more rapidly than ever before. To tackle upcoming crises, rebuild organizations and create new business models, multiple skill and character sets will be required. And because new circumstances will continue to arise, leadership development is never finished. The need for the right leader at the right time remains constant. Read peer insight by CEOs from Avaya, Kaon Interactive, OtterBox, Jupiter Medical Center and Wayfair to help you on your leadership development journey.
Tags : leadership, leadership development, succession planning, skills gap, talent gap, leaders, managers
     Skillsoft
By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
     F5 Networks Inc
By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
     Jamf
By: Oracle     Published Date: Apr 27, 2015
The report explores the new finance best practices CFOs are adopting in the Digital Age to create modern finance organizations better equipped to support more agile, technology-enabled business models and stronger C-suite collaboration.
Tags : finance, best practices, erp, agile, business models, collaboration
     Oracle
By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
     AWS
By: StoryDesk     Published Date: May 02, 2012
For sales teams using iPads - or those thinking about it - this is a must read primer on how to leverage the iPad's technology to drive sales. Hint: it's not by using PowerPoint for a mobile slide show.
Tags : mobile marketing
     StoryDesk
By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking
     Provenir
By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security
     Internet Security Systems
By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology
     NEC
By: Cisco     Published Date: Jul 11, 2016
Though IP telephony has been available commercially since the mid ‘90s, it remains an emerging technology for many organizations. Only about 28% of companies have moved all endpoints (handsets, softphones, audio bridges) to IP, according to Nemertes’ research data. The rest of organizations are either in the process of migrating fully to IP, stuck in a hybrid rollout requiring them to manage typically multiple TDM and IP providers, or firmly planted in TDM. This report reviews the issues and benefits associated with moving to an all-IP environment, based on interviews with IT professionals who have moved to all IP or are in the process of doing so.
Tags : 
     Cisco
By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
     LogRhythm
By: Juniper Networks     Published Date: Oct 19, 2015
Over the years and across industries, it has been proven that increased automation leads to greater efficiency, enhanced productivity and a more agile way of doing business. The same is true for IT: as budgets dwindle, or become stretched to cover a greater range of responsibilities, the need for automation becomes more pronounced.
Tags : juniper, network, automation, efficiency, productivity, information technology
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
In both legacy IT data centers and emerging private and public clouds, virtualization is becoming the norm. Through virtualization, organizations are realizing the benefits of scalability, agility and efficiency.
Tags : juniper, network, scalability, information technology, private cloud, public cloud, virtualization
     Juniper Networks
By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
     Cisco
By: Cisco Systems     Published Date: Oct 01, 2013
Annual global IP traffic has increased fourfold in the past five years, and it will surpass the zettabyte threshold by 2017. In this Cisco® Visual Networking Index (VNI) paper, discover the details and methodology of this forecast. Read report.
Tags : ip traffic, technology, cisco visual networking index, vni, best practices, telecommunication
     Cisco Systems
By: Insight     Published Date: Nov 07, 2017
Modernize your mobile management with more choice and less complexity. Discover the benefits of offering Mac as a technology choice for employees — and how to easily integrate and manage multiple technology platforms within your enterprise.
Tags : choice of mac or pc, mobile device management, outsource it, integrating mac, mac in the workplace, apple vs pc
     Insight
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want. Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn: - Key trends in consumer online shopping behavior - How to develop a successful digital experience technology strategy and roadmap - The essential components of a modern digital experience platform - How to achieve quick-wins and long term investments simultaneously You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Tags : 
     Oracle Commerce Cloud
By: Netviewer     Published Date: Jul 10, 2009
Business travel is coming under closer scrutiny: In Germany alone, companies spend approximately 50 billion euros on business travel every year. To partially offset this expense, many companies are replacing business trips with online meetings. With this technology, customers and partners are able to communicate with images and audio over the Internet, while special presentation functions reinforce the personal aspects of a meeting. Software licenses, Webcams, and headsets are worth the investments. Companies that use Web meetings discover new methods of collaboration and reduce their own output of greenhouse gases.
Tags : netviewer, vdr, german travel management, online meetings, roi, business travel, greener, webcams
     Netviewer
By: Dell PC Lifecycle     Published Date: Mar 08, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC can help you refresh your entire PC and technological ecosystem with latest hardware, software, peripherals and lifecycle services, including deployment, support and asset recovery. Our services and technology can reduce costs of PC lifecycle management by up to 25%. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell PC Lifecycle
By: Zilliant     Published Date: Apr 09, 2010
Read this paper to understand the opportunity for optimizing shipping fees and freight charges in B2B and learn how one $5.0B distributor used advanced pricing science and technology to generate 34% more margin-dollars on its shipping fees.
Tags : zilliant, optimized shipping fee, b2b manufacturers and distributors, freight charges, pricing science, market-aligned prices
     Zilliant
By: HP and AMD     Published Date: Nov 08, 2011
This Technology Spotlight discusses the changing nature of IT and how blade server technology combined with virtualization is becoming the foundation of the distributed IT environment.
Tags : amd, data center, tco, total cost of ownership, it organization, data center, technology decision
     HP and AMD
By: IBM     Published Date: May 04, 2009
The latest servers from IBM have one thing in common - the new Intel Xeon 5500 series processors. This white paper will explain the benefits of the new processors, including speed and performance.
Tags : ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter
     IBM
By: F5 Networks Inc     Published Date: Jul 08, 2009
New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.
Tags : big-ip, big-ipv10, resource, functionality, domain, administrative, application, function
     F5 Networks Inc
By: Oracle     Published Date: Jan 28, 2019
This report provides an overview of the Oracle Cloud at Customer portfolio (this includes Oracle Exadata Cloud at Customer, Oracle Big Data Cloud at Customer, Oracle SaaS at Customer and Oracle Cloud at Customer) and analyzes its capabilities to satisfy the need of enterprises for a next-generation computing platform. A next-generation computing platform allows enterprises to deploy workloads across the premises and the public cloud. For enterprises running their next-generation applications on a next-generation computing platform, Oracle Cloud at Customer does very well because of Oracle’s vision of the “chip-to-click” integrated technology stack (i.e., from the CPU silicon, across all OSI layers and all the way to the end-user mouse click). With Oracle using the same technology stack and machines both in its cloud and on premises, it has the highest degree of identicality across these offerings from all vendors that are part of Constellation Research’s Market Overview on next-genera
Tags : 
     Oracle
By: IBM     Published Date: May 16, 2016
Across industries, customers today wield more power and greater choice than ever before – a power that they exercise by shifting their attention and spending (across multiple channels/devices in near-real time) from provider to provider. In this environment of hyper-connectedness and diminishing customer loyalty and fleeting human attention spans, the battle for holding customer interest and engaging him/her meaningfully requires, first and foremost, an everlasting commitment to "relevance. "Being relevant and demand-driven is of paramount importance to the media industry, but it is no less important to any industry that operates in a B2C world. However, adapting to the ever-rising expectations and changing buying behaviors of customers is becoming a Herculean task, requiring both business and technology transformation.
Tags : ibm, ovum, customer veiwership, customer behavior, cross-plaform, cloud, analytic architecture
     IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics