RSS feed Get our RSS feed

News by Topic

rad hat

Results 326 - 350 of 953Sort Results By: Published Date | Title | Company Name
By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
     Webroot
By: Infosys     Published Date: May 30, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : mainframes, speed, trading, system, modernize
     Infosys
By: Infosys     Published Date: Jun 12, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : mainframes, speed, trading, system, modernize
     Infosys
By: Aimia     Published Date: Jun 26, 2014
On any given day, you can ask every passenger on any given airliner what fare they’ve paid, and you’re likely to get as many different answers as the number of passengers willing (and able) to tell you. This plethora of fares is a product of complex revenue management systems evolved by airlines to optimize seat revenues. But is the current system of management the revenue endgame? Or is there an opportunity to look beyond traditional accept-or-reject decisions to build a more customer-centric revenue management system — one that builds on new customer insights to drive management decisions and uncover new sources of revenue?
Tags : aimia, marketing, customer loyalty, branding, brand recognition, cpg, customer relationships, crm solutions/software
     Aimia
By: SAP     Published Date: Dec 10, 2018
Asia’s business environment is characterised by rapidly changing trade dependencies, innovative competitors that disrupt markets with digital technology, and a macroeconomic climate closely tied to the health of the Chinese economy and the vigour of the American consumer. In Asia, three-quarters of CFOs say automation is improving their finance function’s efficiency, allowing it to focus on value-added tasks. 68% say their company is providing technology to boost collaboration between finance and other business units. What else can you learn from these leading CFOs?
Tags : 
     SAP
By: BlackLine     Published Date: Feb 26, 2018
If you’re in the middle of a finance transformation initiative, then you’re not alone. Leaders at enterprise and mid-size finance and accounting organizations alike are reviewing their current processes, technology, and talent, to build their blueprints for change. With the rise of broader digital transformation projects, finance organizations are first looking to upgrade their own operating models. The truth is that finance transformation is a journey, not a destination. Many finance organizations have already embarked on it, driving down costs, whether through enhancing shared services centers, or applying more centralization, standardization, and automation. Yet for many, the greater opportunities lie ahead: providing better insight to the broader organization, shedding low-value workloads that hold the team back, and revamping ingrained legacy accounting tasks that create risk. Wherever you are today, there are real opportunities to move the dial away from the status quo.
Tags : finance, accounting, technology, digital transformation
     BlackLine
By: Akamai Technologies     Published Date: Sep 03, 2019
The attacks and tools being used against financial services organizations are part of a complex ecosystem. This may seem like an obvious statement at first glance. When you read most industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks. To be honest, we’ve been just as guilty of having a myopic view of attack traffic as anyone else. We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.
Tags : 
     Akamai Technologies
By: Digital Realty     Published Date: Feb 25, 2015
When measuring competitive differentiation in milliseconds, connectivity is a key component for any financial services company’s data center strategy. In planning the move of its primary data center, a large international futures and commodities trading company needed to find a provider that could deliver the high capacity connectivity it required.
Tags : financial services, trade processing, data center, connectivity, data center
     Digital Realty
By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry has seen its share of disruption brought about by technology. Yet, technology also is serving as a catalyst to help financial institutions move beyond their traditional boundaries to provide expanded, more customer-centric services. For many institutions, embracing innovation from FinTech companies is part of that movement. A growing number of banks and institutions, therefore, are taking action. But rather than fighting against the tide of FinTech innovation, many now are embracing FinTech as a way to improve their operations, update their image and increase their customer satisfaction.
Tags : financial services, fintech, investment management, improve operations, customer satisfaction, consumer banking
     Comcast Business
By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : palo alto, enterprise network firewall, custom applications, traffic classification
     Palo Alto Networks
By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
     Dome9
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In today’s dynamic business environment where applications and data are accessed outside of traditional corporate boundaries, IT must embrace the needs of both the business and an ever present mobile workforce. From business agility to employee efficiency, the never-ending quest for improved productivity is found in organisations across industries. And throughout it all, IT is charged with maintaining an organisation’s infrastructure, and security and access, while working to support initiatives that keep the business agile and growing, and employees productive.
Tags : 
     Hewlett Packard Enterprise
By: HP     Published Date: Dec 05, 2014
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
     HP
By: HPE     Published Date: Feb 11, 2015
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
     HPE
By: Schneider Electric     Published Date: Sep 17, 2018
This on demand webinar contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
     Schneider Electric
By: Schneider Electric     Published Date: Feb 08, 2018
This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
     Schneider Electric
By: Motorola     Published Date: Feb 06, 2008
Flack + Kurtz wanted a centrally managed wireless communications solution, delivered over an integrated device that did not rely on the end user to login or synchronize to stay current. The new solution also had to function in Europe, Asia and other places employees traveled. Read this case study to learn how Good™ Mobile Messaging gave them exactly what they wanted.
Tags : motorola, motorola good, case study
     Motorola
By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center
     NetApp
By: DellEMC and Intel®     Published Date: Jul 05, 2017
Flash treibt Innovation und Business-Transformation voran, da es Unternehmen gänzlich neue Möglichkeiten erschließt. Innovatoren, die über den höchsten Grad der Flash-Integration verfügen, erzielen überragende Geschäftsergebnisse in den unterschiedlichsten Bereichen. Sie erreichen ein höheres Umsatzwachstum, höhere Rentabilität und Produktivität sowie eine schnellere Markteinführung von neuen Produkten. IDC hat jene Maßnahmen ermittelt, die Unternehmen in den anderen Kategorien ergreifen können, um ihren aktuellen Grad der Flash-Integration besser zu verstehen und die Flash-Migration zu beschleunigen und noch effektiver geschäftlichen Nutzen daraus zu ziehen. Intel® Xeon® Prozessor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi
Tags : ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
     DellEMC and  Intel®
By: Attunity     Published Date: Feb 12, 2019
How can enterprises overcome the issues that come with traditional data warehousing? Despite the business value that data warehouses can deliver, too often they fall short of expectations. They take too long to deliver, cost too much to build and maintain, and cannot keep pace with changing business requirements. If this all rings a bell, check out Attunity’s knowledge brief on data warehouse automation with Attunity Compose. The solution automates the design, build, and deployment of data warehouses, data marts and data hubs, enabling more agile and responsive operation. The automation reduces time-consuming manual coding, and error-prone repetitive tasks. Read the knowledge brief to learn more about your options.
Tags : dwa, data warehouse automation, etl development, extract transform load tools, etl tools, data warehouse, data marts, data hubs data warehouse lifecycle
     Attunity
By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security
     ForgeRock
By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
     IBM
By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team and how to align skill set
Tags : 
     Trifacta
By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your data—and your business.
Tags : ibm, b2b, commerce, b2bi, business to business integration, integration, forrester, data security
     IBM
By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : data security, sensitive data, secure information, control framework, security
     Intralinks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics