internet

Results 51 - 75 of 1637Sort Results By: Published Date | Title | Company Name
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Published By: SAP     Published Date: Nov 18, 2015
This infographic illustrates how SAP S/4HANA is the next generation business suite that helps enterprises reimagine business.
Tags : 
reimagine your business, digital, internet of things, real time, acess to real time information, sap, sap s/4 hana
    
SAP
Published By: SAP     Published Date: Nov 18, 2015
This whitepaper shows how SAP S/4HANA helps enterprises to run simple in a digital economy.
Tags : 
digital, internet of things, complexity, cimplicity, digital economy, enterprises, sap, sap s/4hana, digital business
    
SAP
Published By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : 
akamai, akamai gaming, infrastructure, distribution channel, technological advancements
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
If your business is like most, you are grappling with data storage. In an annual Frost & Sullivan survey of IT decision-makers, storage growth has been listed among top data center challenges for the past five years.2 With businesses collecting, replicating, and storing exponentially more data than ever before, simply acquiring sufficient storage capacity is a problem. Even more challenging is that businesses expect more from their stored data. Data is now recognized as a precious corporate asset and competitive differentiator: spawning new business models, new revenue streams, greater intelligence, streamlined operations, and lower costs. Booming market trends such as Internet of Things and Big Data analytics are generating new opportunities faster than IT organizations can prepare for them.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Wie die meisten Unternehmen werden auch Sie vermutlich mit der Datenspeicherung zu kämpfen haben. In einer jährlichen Umfrage von Frost & Sullivan unter IT-Entscheidungsträgern wurde das Speicherwachstum als eine der größten Herausforderungen der letzten fünf Jahre für das Rechenzentrum genannt.2Da Unternehmen exponentiell mehr Daten als je zuvor sammeln, replizieren und speichern, ist schon der einfache Erwerb ausreichender Speicherkapazitäten ein Problem. Hinzu kommt nicht zuletzt, dass Unternehmen von ihren gespeicherten Daten mehr erwarten. Daten werden mittlerweile als kostbares Firmenkapital und Möglichkeit gesehen, sich von den Wettbewerbern zu differenzieren: Sie sollen neue Geschäftsmodelle, neue Umsatzchancen, bessere Informationen, optimierte Betriebsabläufe und niedrigere Kosten bringen. Angesagte Trends wie das Internet der Dinge und Big Data-Analysen generieren so schnell neue Marktchancen, dass IT-Organisationen kaum noch Schritt halten können.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
Big data and personal data are converging to shape the internet’s most surprising consumer products. they’ll predict your needs and store your memories—if you let them. Download this report to learn more.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Cisco Meraki offers a comprehensive portfolio of cloud-managed IT solutions designed to work together to help deliver a modern network that is powerful, reliable, and easy to manage. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: Sep 12, 2017
The ways in which the Internet supports our everyday lives have become richer, more engaging, and more mobile. This innovation is driven by the visionaries, designers, developers, and managers of the web experiences that users consume every day. By exploring new ways to solve challenges and improve products and services that enrich our lives, developers and business owners have stretched the Internet to support use cases for which it was never designed. In order to succeed, modern web experiences must seem simple to end-users, even though most ultimately require complex design and technology to deliver.
Tags : 
web experience, web design, mobile, internet supporters
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively.
Tags : 
    
Spectrum Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
WebRTC, web real-time communications, is one of the hottest topics in the video communications industry, and for good reason. In a nutshell, WebRTC enables a user to connect over video without having to download a software client or plugin, and no username or password is required. Basically, all you need is a webcam, an Internet connection and the right browser (for example, the latest versions of Mozilla® or Chrome™), and you can connect over video with colleagues, partners, vendors and customers.
Tags : 
web browser, video conferencing, communication, web apps
    
LifeSize, a division of Logitech
Published By: Cisco     Published Date: Jul 30, 2015
Enhance real-time situational awareness.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Transformation by securely extending the network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Leverage the full potential of IoE.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Enabling the Internet of Everything.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
ucs, unified computing system, infrastructure, enterprise, it barriers, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
IoT describes a system where items in the physical world, and sensors within or attached to these items, are connected to the Internet via wireless and wired Internet connections. These sensors can use various types of local area connections such as RFID, NFC, Wi-Fi, Bluetooth, and Zigbee. Sensors can also have wide area connectivity such as GSM, GPRS, 3G, and LTE.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation, networking, security
    
Cisco
Published By: Samsung     Published Date: Feb 03, 2016
When Smart Displays Meet Smart Things, The Result Is Smart Content
Tags : 
samsung, displays, brand, tech, digital, data, devices
    
Samsung
Published By: Samsung     Published Date: Dec 18, 2015
This paper will outline the value of the Internet of Things, highlight several key use cases, address the issues of privacy and security, and offer best practices for achieving success.
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jun 21, 2016
The Internet of Things may be a hot topic in the industry but it’s not a new concept. In the early 2000’s, Kevin Ashton was laying the groundwork for what would become the Internet of Things (IoT) at MIT’s AutoID lab. Ashton was one of the pioneers who conceived this notion as he searched for ways that Proctor & Gamble could improve its business by linking RFID information to the Internet. The concept was simple but powerful. If all objects in daily life were equipped with identifiers and wireless connectivity, these objects could be communicate with each other and be managed by computers.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 22, 2016
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic, data center, network, equinix, equinix solutions
    
Equinix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.