RSS feed Get our RSS feed

News by Topic


Results 351 - 375 of 1132Sort Results By: Published Date | Title | Company Name
By: Druva     Published Date: Sep 27, 2017
Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to increasingly meet their wider corporate needs. Learn how unifying data availability and governance is bringing increased utility to organizations.
Tags : archiving, modern data, business cloud
By: DellEMC and Intel     Published Date: Sep 26, 2017
Mit der richtigen Kombination von Optionen für Performance, Preis und Dichte, bringt unser breites Portfolio Flash in die Reichweite von Unternehmen jeder Größe und macht 2016 zum Jahr der All-Flash Rechenzentren. Verringern Sie Speicherkosten und Komplexität mit zuverlässiger Performance bei geringer Latenz, entdecken Sie wie Dell EMC All-Flash Speicherlösungen mit Intel® Ihr Rechenzentrum heute modernisieren. Erfahren Sie mehr über Dell EMC Enterprise-Lösungen in Zusammenarbeit mit Intel®.
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
     DellEMC and  Intel
By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
HPE technology experts talk about two new storage products from HPE that bring flash performance and other enterprise storage capabilities down to price and simplicity levels that can benefit nearly any organization in the market for shared storage.
Tags : 
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Sep 25, 2017
Regardless of the industry, there are several common trends that are reshaping the business landscape. Each one has had a profound effect on the ways companies develop products, bring them to market and compete against their rivals.
Tags : portfolio initiatives, vendor, implementation, frameworks, dashboards, metrics
     CA Technologies
By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
     Schneider Electric
By: Cisco     Published Date: Sep 14, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive.
Tags : 
By: Adobe     Published Date: Sep 12, 2017
"Read the guide to learn five ways to overcome challenges to programmatic ads, including how to: · Bring marketers, creatives, IT, and data analysts together to ensure success · Save money and time while improving engagement and conversion · Customize multiple versions of one campaign and serve ads with strong creative in real time"
Tags : 
By: Logrhythm     Published Date: Sep 11, 2017
Threat Lifecycle Management ist die entscheidende Voraussetzung, um Angriffe in einer möglichst frühen Phase ihres Lebenszyklus zu erkennen und zu stoppen. TLM vereint zahlreiche Fähigkeiten und Funktionen, die es ermöglichen, neue Bedrohungen und Angriffe auf die Unternehmenssysteme zu erkennen; festzustellen, welche Risiken sie mit sich bringen; die Risiken zu minimieren; und die nötigen Maßnahmen zu ergreifen, um den Normalbetrieb wieder aufnehmen zu können. TLM hat das Ziel, schädliche Cybervorfälle, die durch erfolgreiche Angriffe auf Systeme, Netzwerke und Daten verursacht werden können, umfassend zu bewältigen beziehungsweise zu verhindern.
Tags : einleitung, menschen, prozesse, technologien, eine strategie entwickeln
By: IBM     Published Date: Sep 11, 2017
There's a new wave of work automation now starting to impact businesses. Yes, partly this is enabled by Machine Learning technologies and techniques: but there's more to it. The new wave of automation brings advances in interaction, insights and integration. This report lays out the landscape.
Tags : work automation, machine learning, integration, interaction, automation
By: Red Hat     Published Date: Sep 08, 2017
Although many organizations still use traditional storage appliances, they don’t offer the agility needed by containerized environments. Containers are highly flexible and bring incredible scale to how apps and storage are delivered; traditional storage can be the bottleneck that stops this progress. The underlying storage should be highly elastic, easily provisioned by developers and admins, and, ideally, managed using the same orchestration framework (like Kubernetes).
Tags : 
     Red Hat
By: Q2 eBanking     Published Date: Sep 06, 2017
The Q2 Platform and our other solutions bring these benefits to the back offices of banks and credit unions, and allow institutions to take digital banking to its full potential.
Tags : 
     Q2 eBanking
By: Dassault Systèmes     Published Date: Sep 01, 2017
Der Entwicklungsprozess wird mit zunehmender Komplexität mehr und mehr zum Schlüsselfaktor für Erfolg oder Misserfolg neuer Produkte. Wie aber bringt man Mechanik, Elektronik und Software optimal zusammen?
Tags : systems engineering, digitale durchgängigkeit, komplexität, digitale fertigung, systemintegration, virtuelle tests, modelbasierter ansatz
     Dassault Systèmes
By: Dassault Systèmes     Published Date: Aug 31, 2017
Der Entwicklungsprozess wird mit zunehmender Komplexität mehr und mehr zum Schlüsselfaktor für Erfolg oder Misserfolg neuer Produkte. Wie aber bringt man Mechanik, Elektronik und Software optimal zusammen?
Tags : entwicklung ganzheitlich denken, entwickeln mit system, dassault
     Dassault Systèmes
By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : byod, malware threats mobile security, data protection, mobile security solutions
By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : ibm, unified governance strategy, data management, data governance
By: Zendesk     Published Date: Aug 22, 2017
Zendesk helps its customers increase agency efficiency and CSAT ratings, improve ROI, and more. Use our Forrester estimator to calculate the economic benefits Zendesk can bring.
Tags : customer support software, customer service tool, customer relationship, multichannel support tool, customer support vendor evaluation, knowledge base management, help desk software, help desk portal
By: CA Technologies     Published Date: Aug 21, 2017
Effektive Messdaten und Messungen sind für ein leistungsstarkes Unternehmen unerlässlich. Wenn sie richtig genutzt werden, ermöglichen sie bessere Einblicke, bessere Entscheidungen und bessere Unternehmensergebnisse. Sie bieten Feedback als Grundlage für Verbesserungen und neue Kenntnisse. Sie helfen Ihnen, die richtigen Ergebnisse zu identifizieren, die Sie Ihren Unternehmenszielen näherbringen. Viele Unternehmen verwenden diese leistungsstarken Werkzeuge jedoch falsch und zerstören so aktiv die Agilität, die sie erreichen möchten. In diesem Artikel zeigen wir neun Fehler auf, die bei Agile-Messungen auf Unternehmensebene unterlaufen – und wie sie vermieden werden können.
Tags : 
     CA Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Dem sprunghaften Anstieg von Mobilgeräten in den letzten Jahren ist es zu verdanken, dass Apps für Unternehmen zu einem der wichtigsten Kanäle geworden sind, über den sie mit ihren treuesten und wertvollsten Kunden kommunizieren. Wenn Konsumenten mobile Geräte nutzen, verbringen sie 85% der Zeit mit Apps1, und mittlerweile ziehen moderne Nutzer Apps sogar dem Fernsehen vor.2 Obwohl die Verwendung von Apps in den vergangenen zwei Jahren um über 60% zugenommen hat, ist die Anzahl der Apps, mit denen jeder Nutzer interagiert, mit ungefähr 27 pro Monat vergleichsweise stabil geblieben.3 Nutzer wünschen sich also kaum neue Apps, interagieren aber stark mit den bereits genutzten. Das mobile Internet vergrößert also die Reichweite von Unternehmen, und Apps sind eine leistungsstarke Verbindung zu ihren besten Kunden.4 Nutzer, denen das Unternehmen wichtig genug ist, um dessen App herunterzuladen und zu installieren, sind die motivierteste Zielgruppe und die treuesten Fans.
Tags : 
     Akamai Technologies
By: Polycom     Published Date: Aug 16, 2017
"Download this guide to learn how other SMBs are leveraging Office 365 with Polycom to bring together Office tools and communications to enable employees to connect with colleagues, customers, suppliers and business partners through every form of communication. With 3 new Skype for Business features, Microsoft and Polycom helping businesses improve productivity, efficiency, and collaboration. New features include: • Modern Voice with Cloud PBX, which will enable users to make and receive enterprise-grade calls from within Skype for Business Online. • PSTN conferencing which supports dial-in or dial-out to any device • Skype Meeting Broadcast for presentations to audiences of up to 10,000 "
Tags : polycom, office 365, skype for business, microsoft
By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : ugc, user generated content, revenue, curalate, social media, millenials
By: ThousandEyes     Published Date: Aug 04, 2017
Technology trends like telecommuting, BYOD, VoIP and SaaS adoption bring new challenges to the underlying network infrastructure that connects branch offices and datacenters. This guide explains how to tackle the challenges faced by the internet-centric enterprise by intelligently monitoring your WAN, LAN, Wi-Fi and SaaS applications through a combination of Enterprise and Endpoint Agents.
Tags : telecommuting, datacenter, network infrastructure, lan monitoring
By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : data security, regulation, legal system, data protection
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
IT is undergoing a significant transformation as businesses look to streamline costs and roll out a new class of cloud-based applications driven by a changing digital economy. The IT infrastructure as we know it today is not well equipped to improve on the cost structure for traditional workloads nor handle the velocity demands of a new generation of workloads where IT is a focal point for competitive differentiation. As one approach to address these changing demands of IT, vendors are bringing to market new solutions under a new category called “composable infrastructure”.
Tags : it transformation, cost structure, composable infrastructure, modern management, cost reduction
     Hewlett Packard Enterprise
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics