RSS feed Get our RSS feed

News by Topic

scribe

Results 226 - 250 of 857Sort Results By: Published Date | Title | Company Name
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
By: Intel     Published Date: May 15, 2017
This white paper describes the technologies used to develop this groundbreaking solution, designed to support next-generation video transcoding models while offering significant CapEx and OpEx saving.
Tags : cost, flexibility, scalability, nfv, next-generation video, video transcoding
     Intel
By: Darktrace     Published Date: Aug 30, 2019
The Industrial Immune System is a fundamental AI platform for OT cyber defense. The self-learning technology passively learns what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber threats in real time. Martin Sloan, Group Head of Security, Drax: “I often describe Darktrace as life insurance. It catches anomalous behavior and deals with the incident immediately.” Find out how AI is being using to defend Drax power station, the largest coal-powered plant in the UK. Read this case study to find out how Darktrace’s Industrial Immune System can protect your entire digital infrastructure.
Tags : 
     Darktrace
By: IBM     Published Date: Apr 15, 2015
What if your organization could take advantage of emerging business opportunities by deploying new applications dramatically faster than you ever could before? What if you could increase the value of your existing application investments by leveraging them in the cloud—and easily move your apps across off-premises and on-premises cloud options? These capabilities are available today. With IBM® PureApplication® solutions, companies can build and use a cloud environment faster, easier and with less risk than traditional methods to better engage with their customers and partners in new ways. The result: increased competitiveness and improved profitability in a changing business landscape. This paper describes a simpler way forward to gain these advantages.
Tags : ibm, business intelligence, applications, cloud computing, migration
     IBM
By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control
     Winshuttle
By: Winshuttle     Published Date: Dec 04, 2006
This paper describes how to easily integrate Excel data with SAP solutions and the resulting benefits from such integration – reduction in financial closing time, reduction in data entry resources, and availability of timely data for reporting.
Tags : excel, sap, integration, spreadsheet, reporting, productivity, cost control, erp
     Winshuttle
By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de cualquier organización, obteniendo un conocimiento exhaustivo y en profundidad de cómo se utilizan los recursos de red
Tags : 
     Extreme Networks
By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de hospitales y centros sanitarios
Tags : 
     Extreme Networks
By: IBM     Published Date: Oct 09, 2009
In down economies, many organizations make short-term decisions like cutting costs and postponing projects. But the real opportunity lies in optimizing costs. This eBook describes how applying the IBM Smart SOATM approach can drive down operational costs through connectivity and reuse, while enhancing flexibility and productivity.
Tags : service oriented architecture, ibm, operational costs, productivity, business process management, bpm, smart soa, cost cutting strategies
     IBM
By: IBM     Published Date: Jan 27, 2017
The report argues top-down and bottom-up BI are flip sides of same coin that needs an harmony. This also describes the rise of data discovery tools as a bottom-up reaction to heavy handed BI and have crushed the top-down camp's monopoly of BI, that has unleashed a bevy of data silos.
Tags : ibm, analytics, business intelligence, data, data discovery
     IBM
By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
     Cisco Systems
By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration
     Cisco Systems
By: Polycom     Published Date: Mar 06, 2017
Education today is described as between paradigms from the traditional to the digital. Students expect a highly engaging interactive learning environment, not stagnant instructor-led designs. Learning technologies, and changing pedagogical methods, are not only changing the way we teach but also the physical environments we teach in. Download now to learn more.
Tags : polycom, education, education technology, students, public sector, global connectivity, education sector
     Polycom
By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
     Nemx Software Corporation
By: Dell EMC Storage     Published Date: Aug 20, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Sep 03, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital. Dell EMC Transformation powered by Intel®
Tags : 
     Dell EMC Storage
By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall
     Athena Security
By: Eaton     Published Date: Jan 26, 2016
This white paper explains why many data centers are ill-equipped to support today’s most important new technologies; discusses why packaged power and cooling solutions can be a flawed way to upgrade existing facilities; and describes the core components of a data center upgrade strategy capable of enhancing efficiency and power density more completely and cost-effectively.
Tags : eaton, modern data centers, data center solutions, virtualization, big data, converged infrastructures
     Eaton
By: IBM Corporation     Published Date: Sep 20, 2010
This chapter describes some of the scalability challenges that exist in today's dynamic business and IT environments and how WebSphere eXtreme Scale addresses these challenges. An introduction of WebSphere eXtreme Scale and the key features of the product is also provided.
Tags : ibm caching and cloud, webspher extreme scale v7, solution architecture, scalability
     IBM Corporation
By: IBM     Published Date: Jan 10, 2014
The testing of service-oriented architectures and other distributed systems, for more than a decade, has provided a wealth of expertise. Eight key lessons about avoiding some of the most common testing pitfalls are described, together with methods for mitigating certain issues.
Tags : ibm, testing, service-oriented, architecture, service oriented architecture, soa, soa applications, mitigation
     IBM
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Computhink     Published Date: Nov 30, 2007
The Auburn-Washburn School District provides public education to approximately 5,300 Kindergarten through 12th graders in Topeka, KS. It consists of 128 square miles of rural and suburban areas. Descriptive terms like academically challenging, progressive, small classes, high-achievement, modern and excellent are all used to describe the district.
Tags : frcp, search and retrieval, email management, email archiving, email archive, viewwise, computhink, school
     Computhink
By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
     Proofpoint
By: StrongMail     Published Date: Sep 28, 2010
Break through consumer consciousness with lessons from the Q3 2010 Email Breakthrough Report's featured best-in-class email campaigns. Read about the top five trends to watch and read expert commentary on each featured campaign, ranging from effective application of movement in email, to leveraging subscribers' word of mouth to promote your brand.
Tags : strongmail, email breakthrough, report, email campaigns, emarketing, email marketing services/software, list management
     StrongMail
By: AppSense     Published Date: May 02, 2008
Email marketing provides a lot more flexibility as the delivery schedule isn't dependent on outside factors. However, just because email gives you instant access to your subscribers doesn't mean you can email them impulsively or impetuously. Your emails must follow a plan that is as well thought-out and deliberate as all of your other marketing initiatives in order to remain effective.
Tags : marketing plan, email marketing, email marketing plan, email strategy, loyalty, email frequency, listrak, email marketing services/software
     AppSense
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics