RSS feed Get our RSS feed

News by Topic

media

Results 76 - 100 of 2162Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Aug 30, 2017
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
For everyone who grew up with Disney movies, the song “When You Wish Upon A Star” triggers an immediate emotional response. The strings, brass, woodwinds, and percussion come together and stir memories and longings. Today, the multibillion-dollar Disney brand harnesses a new kind of orchestration to win customers’ hearts—and it’s something that all of us as marketers can learn from.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones — The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
In our 36-criteria evaluation of omnichannel demand-side platform (DSP) providers, we identified the 11 most significant ones — Adform, Adobe, AOL, AppNexus, DataXu, Google, MediaMath, Rocket Fuel, The Trade Desk, Turn, and Viant — and researched, analyzed, and scored them. This report shows how each provider measures up and helps marketing professionals make the right choice.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 26, 2018
Just off the coast of Grenada, West Indies, in the depths of Molinere Bay, marine life thrives amid an eerie art installation of lifelike mixed-media figures. Sculptor and conservationist Jason deCaires Taylor is the visionary behind this first-ever underwater sculpture gallery. Created as more than a unique place to showcase his talents, his art allows people, marine life, and fragile underwater habitats to coexist in harmony.
Tags : 
     Adobe
By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
     Adobe
By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
     Oracle CX
By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
     Gigamon
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
     Limelight Networks
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
     Dell EMC & Intel
By: TrendKite     Published Date: Jun 15, 2018
How can you plan more certainty into your PR practice? Break down silos, hone processes, and measure bottom-line business value. Public relations is entering an era of unprecedented challenge — and unprecedented opportunity. Digital technologies are rocking every boat, from consumer behaviors, to B2B decision-making, to the nature and reputation of media itself. Today, every discipline is being buffeted by continual change and performance pressure. But the convergence of key trends poses a particular set of challenges for public relations.
Tags : 
     TrendKite
By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
     Oracle
By: MediaRadar     Published Date: Nov 21, 2018
How doing a little homework can lead to a lot of sales
Tags : 
     MediaRadar
By: MediaRadar     Published Date: Nov 21, 2018
Learn how the biggest brands are leveraging TV advertising to reach their target audiences. Find out what’s happening in the TV advertising landscape in our most up-to-date trend report. Download the report to learn about: the latest TV ad trends, including the types of ads Volvo and Burger King ran that creatively pushed the limits of what’s possible in TV advertising what brands are spending the most on tv advertising and which categories spend the most overall which new ad formats brands are using to build the biggest buzz how the World Cup affected brands’ ad spend and placement
Tags : 
     MediaRadar
By: MediaRadar     Published Date: Nov 21, 2018
What are the latest native trends, which are the product categories spending the most? How can you successfully implement native advertising and fully leverage this high-cpm ad format? Find out in our latest trend report. You’ll Learn: Which product categories are spending the most on native The major challenges with and benefits of native advertising Ways in which you can successfully implement native advertising What’s next for native advertising
Tags : 
     MediaRadar
By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and PGi CTO David Guthrie discusses how the cloud computing platform helped his company scale up immediately by getting his applications running efficiently in a matter of days, rather than months.
Tags : ca technologies, cloud computing, applications, computing platform, technology
     CA Technologies
By: Digital Realty     Published Date: Feb 25, 2015
ARM had an immediate need for a flexible provider that was willing to collaborate on a “build-to-suit” energy efficient data center, but also want a long-term partner to consider for future projects in other parts of the world. Find out why they chose Digital Realty.
Tags : data center, digital realty, energy efficient, build-to-suit
     Digital Realty
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
     Akamai Technologies
By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at: • Super-fast deployment and scalability • Take on enterprise workloads and deliver a smooth yet powerful user experience • Keep peace of mind with accessibility and immediate issue alerts This report shows how you can streamline IT infrastructure, achieve new levels of speed and performance to improve end-user experiences, and allow extra time for innovation. Learn more, read this brief but interesting infographic.
Tags : it infrastructure, hyper-convergence, next-gen, storage, virtual machines, scale-out
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : servers, flash storage, modular platforms, software-defined, networking, infrastructure
     Dell EMC
By: Dell EMC     Published Date: Nov 10, 2015
From your most critical workloads to your cold data, a scale-out or scale-up storage solution — one that can automatically tier volumes or data to the most appropriate arrays or media (flash SSDs or HDDs) and offers advanced software features to help ensure availability and reliability — can help you efficiently manage your data center.
Tags : 
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics