monitoring

Results 151 - 175 of 956Sort Results By: Published Date | Title | Company Name
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC
Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Marketing automation is quickly becoming a competitive necessity for most organizations. According to a recent Demand Gen Report, 42% of b2b marketers identified marketing automation as the tool they plan to test or deploy in 2016—beyond predictive analysis, account-based marketing, lead nurturing, and attribution modeling. Download this white paper to discover how to use marketing automation to attract, engage, and convert buyers across all marketing channels by streamlining workflow, monitoring social, and managing content.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and from Hewlett Packard Enterprise (HPE). The goal was to assemble the products of each vendor strictly according to their reccomended designs, and using their respectice software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI built a transaction monitoring cognitive data lake to facilitate AML transaction monitoring across post trade transactions for a leading global bank, which resulted in reduction of human errors by 30% and TAT improvement by 50%. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
The Scandinavian commercial vehicle manufacturer wanted better uptime and reduction of vehicle on road (VOR), and also provide real-time feedback and visibility to their customers. LTI helped streamline analytics to detect exceptions and create actionable and achievable high scalability with microservices and serverless architecture. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: athenahealth     Published Date: Apr 30, 2013
With the right EHR in place, participation in health care quality management programs not only helps you provide great care to your patients, but can also help increase your bottom line. However, the rewards are only worth seeking if the cost—in time and money—of collecting and reporting data to these quality programs doesn't outrun the potential gain. This is where your EHR and the services provided by your EHR vendor can make a significant difference.
Tags : 
quality management, ehr, collection, patient care, quality of care, data, monitoring, analytics
    
athenahealth
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen für Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe für Unternehmen aller Arten hohe Priorität hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Fluke Networks     Published Date: Nov 05, 2014
This guide is intended for companies,organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.
Tags : 
aanpm, best practices guide, fluke networks, software development
    
Fluke Networks
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Keeping sensitive data secure in the age of Cloud computing. Learn how IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
protecting data, ibm security, guardium, cloud enviornments, hybrid cloud enviornment
    
Group M_IBM Q1'18
Published By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
    
Intel
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Apr 20, 2018
This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
digital remote monitoring, big data, machine learning, data center
    
Schneider Electric
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure, data center
    
Avocent
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat Optimized Video Delivery utilizes a combination of stream-splitting and caching technologies to prevent "video floods" that are caused when Internet video saturates a company's WAN or Internet gateway and keeps other applications from performing properly.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Social and technological changes are transforming the nature of network traffic, raising network costs and performance issues. Learn how to proactively manage the WAN as new Web protocols, consumer and corporate video and cloud-delivered applications become mainstream.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
Blue Coat demonstrated bandwidth reduction of up to 95%, and up to 40 times faster response time across all the WAN conditions. Find out more about how the joint solution provides a tremendous improvement in the user experiences of SAP BusinessObjects Enterprise for all WAN conditions tested in this complimentary white paper.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making. You'll see how Blue Coat WAN Optimization leverages proven solutions to achieve dramatic reductions in latency and bandwidth consumption.
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver, business objects, soa, optimization
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
There's a reason why two leading analyst firms named us a leader in WAN Optimization Controllers. Wait, actually, there are a lot. Read the five most critical reasons now.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, midsize firms, sap, oracle, efficiency
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
Read this technology brief to learn about a solution to regain performance, minimize bandwidth usage, and reduce the time to complete all SharePoint Server 2007 operations.
Tags : 
blue coat, wan optimization, microsoft office sharepoint server, application delivery network, application performance monitoring, midsize firms, sap, oracle, efficiency
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers
    
Blue Coat Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.