technologies

Results 1 - 25 of 3742Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jan 14, 2020
Learn about the HPE Intelligent Data Platform and the new IT realities it addresses. With digital transformation underway in many organizations, more dynamic business models are becoming the key to success. This means infrastructure modernization and the introduction of technologies such as solid state storage, artificial intelligence and machine learning, software-defined infrastructure, and the cloud. At the same time, it means IT infrastructure management becomes much more complex. Enter HPE’s Intelligent Data Platform. With comprehensive coverage and AI/ML-driven real-time optimization that enables intelligent management of the entire data life cycle, the HPE Intelligent Data Platform enables an organization to get the most out of its IT resources while also meeting its evolving needs over time.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Dec 18, 2019
https://www.akamai.com/us/en/multimedia/documents/white-paper/enforce-a-zero-trust-security-model-in-todays-hostile-environment.pdf
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to explore the five reasons enterprises urgently need a new application access model — one that supports a Zero Trust security framework. The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to learn the 5 reasons enterprises need a new application access model that supports a Zero Trust framework."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network. Read this white paper to learn how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers: • Simplified security • Lower latency and better performance • Fewer broken web pages and applications"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats. Read this white paper to learn how to progress your Zero Trust transformation, safeguarding users, applications — and the future of your business — with best practices including: • Isolating your network infrastructure from the public Internet • Enabling WAF to protect corporate applications • Monitoring Internet-bound traffic and activity"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of financial services customers at risk. Despite massive amounts of effort poured into awareness campaigns, phishing still remains a top threat to financial services organizations including: • 50% of all the unique organizations impersonated by tracked phishing domains were from the financial services sector. • 6% of global malicious login attempts targeted the financial • Financial services industry accounted for 14% of all unique targets between 2017 to April, 2019 Read the 2019 State of the Internet / Security Financial Services Attack Economy Report to learn about lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets"
Tags : 
    
Akamai Technologies
Published By: HERE Technologies     Published Date: Jan 22, 2020
Rich map data and high-quality location services enable developers of Advanced Driver Assistance Systems (ADAS) to provide new features that can transform the driving experience. Selecting the right location platform is vital for these organizations, as they need critical services and location intelligence to ensure their developments can improve safety, comfort and driver awareness. Strategy Analytics’ Location Platform Benchmark Report 2020 ranks location platforms Google, HERE, Mapbox and TomTom across eight categories – and for the sixth consecutive year, HERE secured the number one spot. Read the report to discover: • How HERE was recognized for its strong reputation as a provider of automotive grade maps and navigation software • How HERE was ranked as the leader in four of eight industry categories: map-making, automotive, industry vision and openness • How HERE scored highly on map freshness and was highlighted for its aggressive improvements in POI search, developer community
Tags : 
    
HERE Technologies
Published By: UL     Published Date: Dec 04, 2019
Risk of electromagnetic interference and immunity have long been important in the evaluation of the safety of medical devices by regulatory authorities. But the expanded scope of environments in which medical devices are being used today, along with the growing prevalence of all types of medical and non-medical systems and devices utilizing wireless communications technologies, new challenges have been created for medical devices and increased potential risks to patients.
Tags : 
    
UL
Published By: Algolia     Published Date: Jan 08, 2020
The de facto urgency of digital transformation is commanding action by e-commerce businesses. Yet, in terms of both technological innovation and consumer expectations, software that powers e-commerce is lagging behind. Long buying cycles combined with pressures of the competitive landscape and Amazon’s market muscle keeps the focus of e-commerce businesses on today. As a result, there is a viable danger of not keeping up with emerging technologies, and, more importantly, visionary ones. How can e-commerce stay ahead in today’s digital landscape, while creating and keeping a digital vision alive? In this eBook, we’ll present you with a practical application of a digital maturity model, as well as showcase how software you rely on should be envisioning the future.
Tags : 
    
Algolia
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
Computing devices are rising to the challenge. They are more flexible and offer increasingly expanding functionality. That’s good news — CIOs can be assured that the newest devices can handle the demands of technologies such as VDI (virtual desktop infrastructure), AR/VR, and high-resolution imaging. However, new devices must also meet increasing regulatory compliance and requirements for secure, hack-resistant patient data access.
Tags : 
    
Lenovo - StudioNorth
Published By: ttec     Published Date: Jan 16, 2020
We’re at a tipping point in the customer experience. Advances in automation, AI, and other technologies are influencing the quality of engagement and support that customers receive while also improving cost efficiencies. But this doesn’t mean business leaders can relax. As customers continue to seek easy, effective, and personalised interactions with brands, it’s critical that companies stay ahead of expectations. So, here are the 5 top trends that are shaping customer experiences next year and beyond.
Tags : 
    
ttec
Published By: Masergy     Published Date: Jan 22, 2020
The self-driving, self-managing network is closer than you might think. So, how do you pave the way for virtual network engineers and augmented operations? AIOps tools offer a new generation of technologies with the potential to automate new swathes of network operations. Nemertes Research offers this guide to AIOps. Explore how virtual assistants have evolved, using AI to advance toward the self-driving network Discover AIOps requirements, the market, and what to look for in a solution Get five recommendations for paving the way to autonomous networking
Tags : 
    
Masergy
Published By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : 
akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
    
Akamai Technologies
Published By: Digital Realty     Published Date: Jan 15, 2020
Gaming-as-a-service (GaaS) has a new frontier: cloud gaming. According to a report released by Statista, the cloud gaming market is expected to grow to $450M by 2023.1 Between Microsoft’s xCloud, Apple Arcade, Google Stadia and Amazon’s Twitch, cloud gaming is poised to grow at unprecedented rates. The race to perfect the 5G gaming experience on smart devices has prompted tech giants to invest in next-gen connectivity and cloud-based solutions. The gaming as a service market has experienced a shift from traditional consoles to cloud-based streaming via data centers. Augmented reality (AR), virtual reality (VR) and multiplayer gaming has transformed the user experience and presented new revenue streams for game developers. With 2.4 billion gamers worldwide,2 the market opportunity in the gaming industry is massive. Consumer expectations have changed, and new technologies such as 5G, edge computing and the cloud have unearthed new challenges around user data, connectivity and cost. Thi
Tags : 
    
Digital Realty
Published By: Kinaxis     Published Date: Dec 04, 2019
What is the future of transportation? What will new transportation technologies mean for the future of business? An excellent question that demands an excellent answer. To get that answer, the Michigan Economic Development Corporation (MEDC) surveyed 513 executives whose core roles focus on the development and use of new transportation and mobility capabilities. The results of this survey, supplemented by interviews with industry and academic experts, are at the heart of MEDC’s eBook, Paving The Way: How Leading Businesses Are Shaping the Future of Transportation and Mobility. The report offers a snapshot of the current transportation landscape while highlighting the steps businesses must take as they prepare for this fast-arriving future. This future will be built on a foundation of new technologies including artificial intelligence (AI), 5G-enabled vehicle-to-vehicle and vehicle-to-infrastructure communications, lightweight materials, and electric vehicles. These advances are p
Tags : 
    
Kinaxis
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc
    
NEC
Published By: NEC     Published Date: Sep 14, 2009
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Tags : 
nec, virtualization, soa, service oriented architecture, cloud computing, unified communications, sla, slas
    
NEC
Published By: Genesys     Published Date: Jan 13, 2020
Centers are no longer “call centers.” They are “contact centers” operating in an omnichannel world. They must handle a growing array of contacts that go well beyond phone calls to include email, chat, text/SMS, social media and more. They need robust performance management capabilities that ensure a great customer experience and employee engagement. And they must move fast — with agility at the micro level for handling each contact and at the macro level to respond to new business needs and market trends. Contact centers must look at different customer service technologies that enable them to go far — fast — building applications that leverage APIs or extending solutions in a variety of ways through integrations and application marketplaces. Download this white paper to learn: How to overcome the legacy of “build vs. buy” Advantages and disadvantages of each approach Specific use cases for each option
Tags : 
    
Genesys
Published By: B Channels     Published Date: Dec 12, 2019
Security leaders employ a variety of tools and technologies to identify risks and test the effectiveness of their security controls. As a result, security teams are left with point-intime assessments that require them to cobble together data from disparate systems to truly understand the organization’s security posture. This approach is reactive, labor-intensive, and insufficient in scale. In May 2019, Panaseer commissioned Forrester Consulting to evaluate the benefits of automated continuous controls monitoring, a category of solution that provides real-time visibility of assets (e.g., devices, applications, people, data), security controls, and the effectiveness of those controls. Our research found that currently employed technologies don’t provide a complete, real-time view of cybersecurity risk
Tags : 
    
B Channels
Published By: ASG Software Solutions     Published Date: Jun 24, 2008
As IT evolves towards a more business-aligned position, it must seek out new ways of working that support more effective operations, service creation, and service delivery. These include technologies, processes, and a culture that supports higher levels of accountability, as well as more dynamic responsiveness to business needs.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata
    
ASG Software Solutions
Published By: Upsite Technologies     Published Date: Sep 18, 2013
The average computer room today has cooling capacity that is nearly four times the IT heat load. Using data from 45 sites reviewed by Upsite Technologies, this white paper will show how you can calculate, benchmark, interpret, and benefit from a simple and practical metric called the Cooling Capacity Factor (CCF). Calculating the CCF is the quickest and easiest way to determine cooling infrastructure utilization and potential gains to be realized by AFM improvements.
Tags : 
ccf, upsite technologies, cooling capacity factor, energy costs, cooling, metrics, practical, benchmark
    
Upsite Technologies
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : 
web analytics, tagging, real time attribution, web page acceleration, tagman
    
Tagman
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.