RSS feed Get our RSS feed

News by Topic

transfer

Results 51 - 75 of 205Sort Results By: Published Date | Title | Company Name
By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
     Ciena
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Healthcare providers use Packet-Optical Networks to meet performance and bandwidth demands. Learn the advantages of Packet-Optical Networks.
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
     Veeam '18
By: BMC ASEAN     Published Date: Dec 18, 2018
Delivering innovative digital business services quickly and reliably requires the ability to integrate, orchestrate, and automate complex business application and ?le transfer work?ows across legacy and modern environments so that digital services can be implemented when needed and run as intended.
Tags : 
     BMC ASEAN
By: Ascentis     Published Date: Sep 29, 2010
Unleash the power of online enrollment with self-service and make your HR team more responsive and accurate. Learn how Web-based enrollment: . Preserves data accuracy . Increases employee satisfaction . Transfers benefits selections AUTOMATICALLY to insurance carriers
Tags : ascentis, open enrollment, automation, accuracy, self-service, human resources, errors, hris
     Ascentis
By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
     YouSendIt
By: BMC     Published Date: Sep 11, 2012
Industrializing IT Workload Automation," Forrester Consulting and BMC Software analyze the results of a comprehensive survey that addressed job scheduling on the ground today.
Tags : job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
     BMC
By: BMC     Published Date: Sep 11, 2012
Hear VPs from Forrester Research and BMC Software discuss the results of our 2012 job scheduling survey in "Workload Automation Survey Results: Peer Insights and Expert Analysis.
Tags : job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
     BMC
By: BMC     Published Date: Sep 11, 2012
Visit the IDC iView interactive library to get the analyst's take on how self service for workload automation can contain costs and improve service.
Tags : job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
     BMC
By: Riverbed     Published Date: Oct 16, 2012
Einstein Noah Restaurant Group wanted to find ways for its locations to effectively use its new SharePoint portal and WAN for general communications. Learn how Riverbed WAN optimization decreased their download time from 20 minutes to 16 seconds.
Tags : wan optimization, riverbed, sharepoint, data management, communications, data transfer
     Riverbed
By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
     McAfee
By: Teradata     Published Date: Apr 30, 2014
In the past decade, banks have applied a vast array of strategies to attract new customers—free checking, high interest savings, low interest mortgage, cash deposits, and product give-a-ways. Many offers were bundles with credit, either in the form of a new credit line or in the form of low interest on transferred credit balances. The purpose is to attract new customers who bring new account balances. Although successful in attracting new customers, those customers usually brought small balances. It didn’t matter if each account’s balance was small. The sum of these small account balances would be a very large amount. This new amount could be leveraged into loans and hence profits. – Download our whitepaper today!
Tags : teradata, marketing, data driven marketing, connecting to customers, higher revenue, customer experience, market research
     Teradata
By: IBM     Published Date: Mar 22, 2013
This whitepaper discovers how by implementing cloud computing across 6 fundamental workloads can transfer the way whole groups employees do their jobs, enabling them to speed new development and uncover new sources of revenue.
Tags : ibm, cloud computing, erp, bi tools, workload selection, analytics, lower cost of ownership, workforce
     IBM
By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
     Forcepoint
By: Ciena     Published Date: Jun 12, 2017
In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow.
Tags : sdn, nfv, packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud
     Ciena
By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : money, transfer, digital, technology, business
     Infosys
By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : real-time payment, p2p payment
     FICO EMEA
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
     Aberdeen - youSENDit
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.
Tags : yousendit, technology, greater business value, reliable file transfer, low-level protocols, security
     Aberdeen - youSENDit
By: Clearvale by BroadVision     Published Date: Dec 26, 2012
In the traditional business environment, business processes evolve over time. As companies grow, most do not have the time or ability to implement infrastructure that continually enables effective collaboration, innovation or knowledge transfer.
Tags : social media, social network, 8 key metrics, broadvision, enterprise, internet marketing, marketing research
     Clearvale by BroadVision
By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : certifiedmail technology, email security, message security, encryption, security
     DataMotion
By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
     Webroot UK
By: iKnowtion     Published Date: Nov 17, 2011
Learn how a financial services company can retain critical customer assets, and their method for predicting customers that will transfer assets in and out of accounts and the expected amounts.
Tags : customer intelligence, customer loyalty, crm solutions, customer profiling, probability choice models, trigger marketing, financial services, profitability
     iKnowtion
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics