RSS feed Get our RSS feed

News by Topic

ip technology

Results 251 - 275 of 401Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 04, 2009
The latest servers from IBM have one thing in common - the new Intel Xeon 5500 series processors. This white paper will explain the benefits of the new processors, including speed and performance.
Tags : ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter
     IBM
By: F5 Networks Inc     Published Date: Jul 08, 2009
New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.
Tags : big-ip, big-ipv10, resource, functionality, domain, administrative, application, function
     F5 Networks Inc
By: Oracle     Published Date: Jan 28, 2019
This report provides an overview of the Oracle Cloud at Customer portfolio (this includes Oracle Exadata Cloud at Customer, Oracle Big Data Cloud at Customer, Oracle SaaS at Customer and Oracle Cloud at Customer) and analyzes its capabilities to satisfy the need of enterprises for a next-generation computing platform. A next-generation computing platform allows enterprises to deploy workloads across the premises and the public cloud. For enterprises running their next-generation applications on a next-generation computing platform, Oracle Cloud at Customer does very well because of Oracle’s vision of the “chip-to-click” integrated technology stack (i.e., from the CPU silicon, across all OSI layers and all the way to the end-user mouse click). With Oracle using the same technology stack and machines both in its cloud and on premises, it has the highest degree of identicality across these offerings from all vendors that are part of Constellation Research’s Market Overview on next-genera
Tags : 
     Oracle
By: IBM     Published Date: May 16, 2016
Across industries, customers today wield more power and greater choice than ever before – a power that they exercise by shifting their attention and spending (across multiple channels/devices in near-real time) from provider to provider. In this environment of hyper-connectedness and diminishing customer loyalty and fleeting human attention spans, the battle for holding customer interest and engaging him/her meaningfully requires, first and foremost, an everlasting commitment to "relevance. "Being relevant and demand-driven is of paramount importance to the media industry, but it is no less important to any industry that operates in a B2C world. However, adapting to the ever-rising expectations and changing buying behaviors of customers is becoming a Herculean task, requiring both business and technology transformation.
Tags : ibm, ovum, customer veiwership, customer behavior, cross-plaform, cloud, analytic architecture
     IBM
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: Deluxe     Published Date: Jun 10, 2019
Small business lending continues to be a growth industry, with multiple approaches and diverse players offering solutions to help small businesses manage their demand for financing. The industry continues to evolve, with lenders bringing new technology, innovation, and products to the market. Yet despite intense competition, small businesses are still underserved for financing. There is still tremendous upside growth for lenders and marketers who want to compete in this space.
Tags : 
     Deluxe
By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : phishing, campaigns, antiphishing, security, social media, malware, block, network
     Webroot Inc
By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product
     Pivotal CRM
By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
     3D Systems
By: Polycom     Published Date: Nov 12, 2015
The hallmark of a great conference call is audio quality that sounds just like being in the same room with the other participants. Polycom HD Voice technology delivers more than twice the clarity of ordinary phone calls for life-like, vibrant conversations.
Tags : polycom, audio conferencing, video conferencing, conference call, acoustic clarity, e-commerce, sales
     Polycom
By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : ponemon, tco, software, hardware, full disk, encryption, total, cost
     WinMagic Inc.
By: Lenovo and Intel®     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: • Mobile devices, tablets, and interactive technology improve the patient experience • Healthcare facilities can remotely monitor patient progress and health post-discharge • Providers can leverage patient portals and other tools to promote population health • Ensuring patient engagement success requires effective measurement • And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care
     Lenovo and Intel®
By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : powering, transformation, cloud, investments, integration, access data, performance, revolution
     ServiceNow
By: IBM     Published Date: Jul 24, 2012
Faced with a downturn in funding due to the global economic recession, nonprofit organizations need to improve their donor management capabilities so they can compensate for the reduction of government funding and diminishing level of donor contributions. Predictive analytics provides an effective way to understand and anticipate donor needs in order to increase the success of fundraising and marketing campaigns. Using this technology, nonprofits can gain a significant return on investment by increasing donor contributions, reducing costs and building stronger donor relationships over time. In this white paper, you'll learn how predictive analytics can help nonprofits achieve their funding goals by significantly improving the way they identify, manage and build relationships with donors.
Tags : ibm, technology, marketing, predictive analytics, donor management, non-profit, business analytics
     IBM
By: Genesys     Published Date: Jun 10, 2013
SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs.
Tags : session initiation protocol, sip, acd automatic call distribution, contact centers, voice, technology, customer service, solution
     Genesys
By: Longi Engineering     Published Date: Jan 23, 2018
Longi Engineering was engaged to assist a Private Equity Firm in implementing a SharePoint deal management system as an additional component to their existing on premise SharePoint server solution. The organization faced multiple challenges in that they did not possess an efficient technology solution that allowed them to manage their deals and associated history. One of the organization’s goals was to create a centralized, easily accessible dashboard interface from which they could rapidly determine the status of a deal as well as manage their deals. Their deal lifecycle had multiple stages depending on whether a deal was New, in a diligence phase, on Hold or Dead.
Tags : software development, it consulting services, net software solutions, microsoft sharepoint
     Longi Engineering
By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
     CrowdStrike
By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
     Cisco Systems
By: JBoss Developer     Published Date: Oct 21, 2016
Rather than simply enhancing and supporting traditional methods, the use of digital technologies should enable brand new types of innovation and creativity. However, most of us have grown up with rigid, legacy technology-based business systems—process-oriented and mostly built around predictable, repeatable steps. If this sounds familiar, your business model may now be under threat from “digital Darwinism”—a tipping point caused by digital technologies and downstream market effects. Or perhaps nimbler, lower cost-base competitors are about to overtake you with a more innovative approach, better use of data or smarter use of technology. In this climate, “business as usual” is certainly no longer good enough.
Tags : digital transformation, api, security, ebusiness, cloud
     JBoss Developer
By: SAS     Published Date: Oct 18, 2017
Quality 4.0 isn't really a story about technology. It's about how that technology improves culture, collaboration, competency and leadership. The last decade has seen rapid advances in connectivity, mo­bility, analytics, scalability and data, creating what some call the fourth industrial revolution, or Industry 4.0. With the help of the Industrial Internet of Things (IIoT), manufacturers have digitized operations, transforming efficiency, supply-chain performance and in­novation. This revolution has even created entirely new business models. This e-book gives manufacturers the tools to lead the Qual­ity 4.0 transformation – a transformation that raises traditional manufacturing to the next level. It teaches readers to use advanced technology, analytics and IIoT to strengthen the manufacturing process and bring it forward into a powerful digital age.
Tags : 
     SAS
By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware
     Dell Software
By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : lan, voip, business communication, wan, pbx
     RCN Business
By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : customer, trust, banking, retail
     IBM
By: IBM     Published Date: Jan 06, 2016
Your recruiting strategy should be an integrated partnership between strategy and tools. There is no secret sauce. However, if you broaden your approach and your definition of recruiting, attraction and connection, the goal of finding the right talent becomes increasingly attainable. Try creating a multi-faceted approach to talent attraction using target audiences and ads. Create a robust strategy to connect with talent in your lead management tool, social network, and career site or recruitment technology system. Be willing to change and try new tactics, even if it means starting small. There are countless ways to approach a truly social strategy for recruitment – when done right; they yield great results that can actually prove ROI. Embrace that recruiting is marketing and change how your team finds, attracts and connects with the next great employee for your company.
Tags : recruitment, marketing, talent acquisition, recruiting strategy, talent search, social strategy, lead management tool
     IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics