RSS feed Get our RSS feed

News by Topic

scribe

Results 176 - 200 of 813Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security
     EMC Corporation
By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
     Fortinet, Inc.
By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
     Fortinet, Inc.
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: HP-Intel®     Published Date: Jul 22, 2013
The Virtual Server Environment Reference Architecture described in this white paper centers around the HP-UX 11i v2 operating environments
Tags : intel, ost, linux, operation systems, internal architecture, architecture, epic software, unix/risc architectures
     HP-Intel®
By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
     Teradata
By: NetApp     Published Date: Sep 22, 2014
Flash Storage for Dummies, NetApp 2nd Special Edition, describes the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures. The book examines various elements of flash storage: how it evolved, and why you should consider it for your storage infrastructure.  The book explores key differences in NetApp’s flash storage solutions: NetApp Flash Cache, Flash Pool, all-flash FAS, and the EF-Series. You’ll also learn five strategies for using Flash in your next storage project. In that classic For Dummies style, you’ll get some useful tips on how to best incorporate flash in your IT environment.
Tags : flash storage, flash-accelerated storage, all-flash arrays, storage infrastructures, it environment
     NetApp
By: K2     Published Date: Apr 27, 2015
This paper describes how a business-app platform from K2® can help you provide simpler, more cost-effective ways to empower people by connecting them with data that is dispersed across different systems.
Tags : erp and legacy systems, data volume, business processes, cloud crm system, system complexity, business apps
     K2
By: ArborNetworks     Published Date: Nov 30, 2015
This paper outlines the challenges of DDoS attacks and describes the features you need in a DDoS prevention solution to more effectively protect your network from these threats.
Tags : arbor, ddos, protection, enterprise, data security, security
     ArborNetworks
By: IBM     Published Date: Aug 01, 2016
As digital transformation accelerates, the opportunity to engage customers digitally has never been greater — but so has the threat of not delivering great customer experiences. In order for customer insights professionals to compete, the use of customer understanding to optimize experiences at scale must be at the heart of all digital transformation initiatives. Digital intelligence provides a vision and approach that captures a holistic view of the customer in order to optimize digital interactions, engagements, and experiences. During his talk James McCormick will describe the vision and need for digital intelligence; the approach needed to make it a strategic initiative, and ultimately, how it will provide a competitive advantage.
Tags : ibm, commerce, customer experience, analytics, customer engagement, customer insight, crm & customer care
     IBM
By: IBM     Published Date: Jan 27, 2017
The report argues top-down and bottom-up BI are flip sides of same coin that needs an harmony. This also describes the rise of data discovery tools as a bottom-up reaction to heavy handed BI and have crushed the top-down camp's monopoly of BI, that has unleashed a bevy of data silos.
Tags : ibm, analytics, business intelligence, data, data discovery
     IBM
By: IBM     Published Date: Mar 20, 2017
"Your video business is poised for dramatic growth. Can your provider keep up? SVOD revenues are rising more than 30$ annually. Learn how to avoid common pitfalls and identify a video provider that can grow with you. Download the first entry in IBM Cloud Video’s OTT Success Series to discover: -Important distinctions that can mean the difference between scalable success and an embarrassing false start -How to anticipate and avoid common pitfalls in the OTT 2.0 environment -The right questions to ask when taking your video business to the next level -How the right provider can help you master multiscreen delivery, drive subscriber growth and reduce churn"
Tags : ott. ibm, svod, scalable success, video, video provider, multi screen delivery, subscriber growtth
     IBM
By: IBM     Published Date: Apr 10, 2017
"Your video business is poised for dramatic growth. Can your provider keep up? SVOD revenues are rising more than 30$ annually. Learn how to avoid common pitfalls and identify a video provider that can grow with you. Download the first entry in IBM Cloud Video’s OTT Success Series to discover: -Important distinctions that can mean the difference between scalable success and an embarrassing false start -How to anticipate and avoid common pitfalls in the OTT 2.0 environment -The right questions to ask when taking your video business to the next level -How the right provider can help you master multiscreen delivery, drive subscriber growth and reduce churn"
Tags : ibm cloud video, video business, scalable success, multiscreen delivery, subscription growth
     IBM
By: Datastax     Published Date: May 14, 2018
The data management practices of old will no longer work. If you’re still trying to use a centralized approach, you are probably finding it difficult to keep up with the real-time demands of the Right-Now Economy. This special Gartner report describes the main drivers for modernizing data management — operational efficiency and analytics — and explains why balancing connecting data with collecting data will be a fundamental requirement for modern data management moving forward.
Tags : 
     Datastax
By: Oracle + Dyn     Published Date: Jun 29, 2017
DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: Common types of DDoS attacks and which layers of your infrastructure are most at risk How to geographically isolate attacks and mitigate latency when you have multiple endpoints How to get the best before, during and after attack protection Get the guide!
Tags : 
     Oracle + Dyn
By: Vindicia     Published Date: Oct 04, 2017
The number of services available via online subscription is exploding—and the big bang of subscription is only gaining momentum. Companies want to turn one-time purchases into regularly recurring subscriptions or memberships. The siren song of subscription success is calling to executives in virtually every industry. Business leaders want ongoing revenue streams from an army of subscribers. But, as companies that plunged into recurring business models are realizing, subscriptions are more than just transactions that recur. Subscription success can be illusive. Too often, subscription models don’t generate the expected high, ongoing revenue streams.
Tags : 
     Vindicia
By: Vindicia     Published Date: Oct 04, 2017
Consumers and businesses can subscribe to a virtually infinite array of products and services. From meal delivery and financial advice to legal services and weight-loss coaching, people try to keep using services that fit their needs. The subscription business model is having an equally dramatic impact on businesses like yours. Instead of investing in customer acquisition in hopes that customers will simply make a one-time purchase, you entice people into making a recurring commitment to your offering.
Tags : 
     Vindicia
By: OneLogin     Published Date: Oct 24, 2017
For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access across a variety of populations — from employees to partners to customers — without affecting experience. And they must protect corporate resources across a hybrid environment while providing users secure access to these resources from a variety of devices. This report describes the trends shaping the IAM landscape in 2017 and how S&R pros should adapt.
Tags : 
     OneLogin
By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
In our previous eBook, “Part 1: Enabling Financial Transformation through Technology,” we examined the “why” of Record to Report transformation and briefly described ‘how” you can achieve this through the implementation of Record to Report technology. Now that you understand the “why” and the “how” it’s time to put it into action to ensure a successful Record to Report transformation delivery. But first we need to lay the framework, as the majority of you have probably never embarked on a financial transformation journey before or have experience with a technology purchase or implementation of this calibre.
Tags : account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software
     Trintech EMEA ABM Pilot
By: SundaySky     Published Date: Mar 06, 2018
The world is mobile. People communicate with each other on their mobile phones, they stay on schedule with the help of their smartwatches, and, perhaps most importantly, they interact with brands via mobile apps. Therefore, it’s important for brands to focus on their mobile experiences. To investigate the preferences and behaviors of consumers when using mobile applications within the U.S., SundaySky conducted an online survey with 226 total respondents.
Tags : 
     SundaySky
By: Group M_IBM Q119     Published Date: Mar 11, 2019
In this paper, we focus on the DWA and how it has evolved over the years since its introduction. The XDW architecture is then described, in which the need to maintain the data warehouse is documented while adding new components and capabilities to extend the analytical capabilities. This section also discusses the appropriate usage of appliances within the XDW. The rest of the paper covers the benefits from implementing the DWA, the selection considerations for them and what the future holds for them.
Tags : 
     Group M_IBM Q119
By: Oracle + Dyn     Published Date: Jun 27, 2017
"DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency when you have multiple endpoints • How to get the best before, during and after attack protection Get the guide! "
Tags : 
     Oracle + Dyn
By: K2     Published Date: Apr 01, 2016
This paper describes how a business-app platform from K2® can help you provide simpler, more cost-effective ways to empower people by connecting them with data that is dispersed across different systems.
Tags : sap, business app, sap software
     K2
By: OC Tanner     Published Date: Oct 24, 2016
This paper explains the large benefits in store for companies able to improve their employees’ wellbeing. This paper describes, in detail, what companies can do to improve that portion of life spent at work.
Tags : rewards and recogntion, employee engagement, employee recognition, oc tanner, global engagement, global recognition
     OC Tanner
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics