monitoring

Results 1 - 25 of 900Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Vom Start-up-Unternehmen bis zum etablierten Unternehmen helfen Container, den Anforderungen des modernen digitalen Markts gerecht zu werden. Im Vordergrund steht dabei die Unterstützung hoch skalierbarer, portierbarer und schnell bereitzustellender Anwendungen. Die wichtigsten Fakten zum modernen Container-Monitoring: -Umfassende Transparenz -Änderungsanalyse -Entscheidungsrelevante Informationen -Flexibles Monitoring
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Die Anwendungscontainerisierung wird bei Unternehmen immer beliebter, da sie damit ihre Entwicklungsgeschwindigkeit und -effizienz steigern können. Entwickler können jede Anwendung leicht als schlanken, eigenständigen Container verpacken, ausliefern und ausführen, der so gut wie überall eingesetzt werden kann. Dies führt zu einer sofortigen Portierbarkeit der Anwendung. Um den aktuellen Stand des Container-Monitorings besser zu verstehen, haben wir 100 Führungskräfte befragt und die wichtigsten Trends für Container identifiziert. In diesem eBook beschreiben wir jeden einzelnen Trend und bieten handlungsrelevante Anleitungen und nächste Schritte, mit denen Sie das Monitoring Ihrer Container-Umgebung beherrschen können.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
This infographic looks at Software Engineers who do awesome ops, ensuring millions of users having super-fast and reliable service from today’s massively complex systems! We look at the key skills and tools required in Modern monitoring and analytics: -Full Stack Visibility -Noise Reduction -Anomaly Detection -Modern Instrumentation -Data- Driven Insights Put your SRE Teams in the Driver's Seat with a new model for application monitoring.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
SD-WAN ist aktuell die wichtigste Technologie für softwaredefiniertes Networking (SDN). Sie ermöglicht eine höhere Anwendungsperformance, besseren Zugriff auf Cloud-Services und geringere Betriebskosten. Werden diese Ziele mit Ihrer aktuellen Netzwerk-Monitoring-Strategie wirklich erreicht?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
Plötzlich ist das Netzwerk wieder angesagt. Technische Trends wie das Internet of Things, softwaredefiniertes Networking und wachsende End User-Erwartungen führen zu einer Nachfrage nach ungestörter Performance und Zuverlässigkeit des Netzwerks. Die Datenmengen werden zunehmend größer, und Unternehmen können ihre geschäftlichen Ziele nur noch mit mehreren Clouds erreichen. Wie kann das Netzwerk in dieser Situation Schritt halten und auch noch die künftigen Anforderungen erfüllen? In diesem eBook werden die Trends analysiert, die das Unternehmensnetzwerk beeinflussen – das moderne Netzwerk. Zudem werden die damit für NetOps-Experten verbundenen Probleme und Maßnahmen von Unternehmen zur Vorbereitung auf die Zukunft behandelt.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: Aug 15, 2018
World leader in design and manufacture of innovative sensing solutions that enhance safety, security, and energy efficiency. For this manufacturers of high-tech imaging systems, monitoring accuracy and product quality are critical. Any quality problem could mean a part fails sooner than expected, or triggers a false alarm at a customer site that causes unnecessary panic. By setting up automated manufacturing analytic workflows with the TIBCO StatisticaTM platform, the company can complete complicated processes in just a few minutes and improve product quality by decreasing the variability of everything they produce.
Tags : 
    
TIBCO Software APAC
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
    
Spredfast
Published By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Spredfast     Published Date: Aug 27, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring
    
Astaro
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: HP AppPulse Mobile     Published Date: Oct 12, 2015
Improve website monitoring, performance, capacity and security.
Tags : 
online, capacity, security, website monitoring, performance
    
HP AppPulse Mobile
Published By: Freshdesk     Published Date: Aug 15, 2016
Every helpdesk agent at every customer support team, anywhere in the world, dreams about Inbox Zero. However as most businesses grows from just a handful of support queries to hundreds of customers chocking the support hotline, they make the mistake of going on a hiring binge to reach that elusive promised land. The only problem? Hiring more support staff may not be the best way to scale up your customer support. This whitepaper talks about how you can scale your customer support without blindly scaling the team, with tips, ideas and insights like: - How to puncture the customer support hot-air balloon - Proactively identifying red flags and overloads - Top 4 things to know before you hire - Monitoring, understanding and reporting support trends - Tips to streamline your support process
Tags : 
    
Freshdesk
Published By: Lenovo and Intel     Published Date: Apr 28, 2017
Involved, informed patients are better able to manage their own care. Today’s technology plays a big role in helping patients to take ownership of their health and collaborate more closely with providers to achieve better outcomes. Here are 10 tips from Lenovo Health for putting technology to work to reach your patient engagement goals: • Mobile devices, tablets, and interactive technology improve the patient experience • Healthcare facilities can remotely monitor patient progress and health post-discharge • Providers can leverage patient portals and other tools to promote population health • Ensuring patient engagement success requires effective measurement • And more... Lenovo Health provides the solutions and expertise to help healthcare organizations engage patients and achieve the vision of customized care anywhere, from hospital to home. Are you meeting your patient engagement goals? Download this checklist now.
Tags : 
lenovo, lenovo health, healthcare, healthcare technology, improving patient experience, remote monitoring, lenovo health solutions, customized care, hospital to home, digital healthcare, power patient engagement
    
Lenovo and Intel
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.