RSS feed Get our RSS feed

News by Topic

technologies

Results 1 - 25 of 3554Sort Results By: Published Date | Title | Company Name
By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
     Silver Peak
By: Upside Travel     Published Date: Sep 20, 2019
Utilizing the right technologies and strategies can make business travel more efficient and ensure employees can focus on what matters while on the road: Moving your business forward. Grab the guide to learn how these 5 tips could increase the work performance of your team.
Tags : business travel/travel expenses, group travel, incentive travel, travel management, operational efficiency
     Upside Travel
By: Intel     Published Date: Sep 20, 2019
Skilled IT teams understand that one cloud does not fit all. Compliance issues may demand that some data be held internally. Budget-imposed total cost of ownership (TCO) limits may push other data out to public clouds. Hence, a scalable multi-cloud infrastructure becomes imperative. This whitepaper addresses key questions commonly raised by CIOs considering the move to multi-cloud. Further, it sheds light on how Intel® technologies such as the 2nd Generation Intel® Xeon® Scalable processors and Intel® Optane™ DC Persistent Memory can help boost your cloud credentials.
Tags : 
     Intel
By: BlackBerry Cylance     Published Date: Sep 18, 2019
There is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over time remains unclear for respondents to a new SANS Institute research study sponsored by BlackBerry Cylance. Opinions varied about the maturity of AI, its benefits and risks, and the baseline requirements for an AI-enabled security solution. Download the report today for the complete survey results and learn: 1) How perceptions of AI vary across industry sectors and organizational roles and responsibilities; 2) How AI technologies compare and contrast with human intelligence; 3) How machine learning is driving advances in the field; 4) What respondents believe to be the greatest risks and benefits of AI; and, 5) The most significant barriers to broader AI adoption.
Tags : 
     BlackBerry Cylance
By: Ricoh     Published Date: Sep 18, 2019
Depending on the region, only 7% to 18% of organizations currently possess the digital dexterity to succeed with software and services requiring digitally enlightened workers - Gartner Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration. • Stay ahead of your competitors • Reduce operating costs • Leverage your print hardware investment to do more GET THE GUIDE NOW
Tags : 
     Ricoh
By: Ricoh     Published Date: Sep 18, 2019
Depending on the region, only 7% to 18% of organizations currently possess the digital dexterity to succeed with software and services requiring digitally enlightened workers - Gartner Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration. • Stay ahead of your competitors • Reduce operating costs • Leverage your print hardware investment to do more GET THE GUIDE NOW
Tags : 
     Ricoh
By: Ricoh     Published Date: Sep 17, 2019
Depending on the region, only 7% to 18% of organizations currently possess the digital dexterity to succeed with software and services requiring digitally enlightened workers - Gartner Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration. • Stay ahead of your competitors • Reduce operating costs • Leverage your print hardware investment to do more GET THE GUIDE NOW
Tags : 
     Ricoh
By: Ricoh     Published Date: Sep 17, 2019
Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration.
Tags : 
     Ricoh
By: Ricoh     Published Date: Sep 17, 2019
" Leaders can transform their organization, while reducing their risks and boosting their chances of success. Understand 3 Technologies that Improve Productivity, Communication and Collaboration."
Tags : 
     Ricoh
By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 16, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
     SailPoint Technologies
By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
     VMware
By: VMware     Published Date: Sep 12, 2019
Digital transformation, through innovative customer experiences, is shaping the way organizations compete. Yet beyond introducing new technologies, winning businesses are vying for the best talent, leading to a rise in improving the digital employee experience, according to a new global survey.
Tags : 
     VMware
By: MuleSoft     Published Date: Sep 11, 2019
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald’s, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security. Download this ebook to learn: How to unlock AI customer insights with an API strategy. How to make APIs the bedrock of IoT development. Why zero trust is key to API security in the new API economy.
Tags : 
     MuleSoft
By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
     Akamai Technologies
By: MuleSoft     Published Date: Sep 09, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Sep 09, 2019
La capacité de votre entreprise à changer rapidement, à innover facilement et à égaler la concurrence dans tous les domaines sur lesquels elle prend de l'avance est aujourd'hui une nécessité stratégique. Elle vous permettra de prospérer sur un marché en constante évolution et de créer de nouvelles expériences clients dans de nouveaux contextes, en utilisant de nouvelles technologies. Pour façonner des expériences clients innovantes, votre entreprise a besoin que son équipe IT lui fournisse des ressources digitales sous la forme de fonctionnalités métiers clés capables de lui apporter une réelle valeur dans des contextes multiples. C'est ainsi que l'IT peut devenir l'allié des objectifs stratégiques de votre entreprise. Les organisations qui ont réussi à jeter les bases d'une innovation continue et d'une approche agile ont adopté des architectures microservices pour répondre rapidement aux innombrables exigences de leur activité.
Tags : 
     MuleSoft
By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
     Cisco and NVIDIA Corporation
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
     CloudHealth by VMware
By: HERE Technologies     Published Date: Sep 05, 2019
Connected embedded navigation has suffered in recent years with the proliferation of smartphone integration combined with lengthy design cycles and a fragmented ecosystem. HERE’s Navigation On Demand service provides OEMs with the ability to offer consumers an always-fresh navigation and a compelling connected service. Download the whitepaper now to learn how you can benefit from: • the architecture of HERE Navigation On Demand and how it enables OEMs to deliver a different, more joined up, experience • the Navigation as a Service Approach, which allows an always-fresh experience without unnecessary recreation of effort • developing more impactful service
Tags : navigation, oem, software, consumer, cloud, demand
     HERE Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
If you’re not controlling access to documents, spreadsheets, presentations and reports stored in the cloud, your organization is significantly more vulnerable to security breaches and data privacy compliance penalties. Download this white paper to find out why. .
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Every day, employees upload vast numbers of presentations, PDFs, emails and reports to cloud storage providers like Box and Dropbox. Did you know this exposes your organization to serious risk of security breaches and compliance violations? Download this brief to find out the most effective way to close your security gaps.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
     SailPoint Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics