design

Results 226 - 250 of 1910Sort Results By: Published Date | Title | Company Name

5 Ways PowerEdge MX Meets Changing IT Demands

Published By: Dell EMC     Published Date: Feb 14, 2019
Today’s organizations must have IT solutions that can handle both current and emerging workloads. The modular design of PowerEdge MX—powered by Intel® Xeon® scabable processors—meet that demand. Access this Dell brief to learn the five ways PowerEdge MX can help you scale, secure and simplify your IT. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC

Cisco 2017 Midyear Cybersecurity Report

Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco

Cisco 2017 Midyear Cybersecurity Report

Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco

Service Provider's Perspective: Designing the Next Generation Data Center

Published By: NetApp     Published Date: Dec 05, 2016
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
    
NetApp

MAKING DIGITAL BUSINESS A REALITY WITH ORACLE CLOUD APPLICATIONS (SAAS)

Published By: Oracle     Published Date: Oct 17, 2016
This new digibook is specifically designed to help you make digital business a reality in your enterprise.
Tags : 
    
Oracle

Cloud Agility and Scalability

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology conglomerate had to renew the current data center agreement, also it was no longer strategic to maintain their own hardware. LTI partnered with Oracle and helped in designing and executing the migration plan that would ensure Zero business disruption without stringent timeline. LTI leveraged a toolkit built by its in-house, dedicated Oracle Innovation and Solution Center (OISC) to help ensure an error-free migration. Benefits i. $1 M Overall Cost saving ii. 40% reduced TAT Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

SSL/TLS Best Practices Guide v3

Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard

Apple Premium Resellers Use Intelligence Dashboards on iPad

Published By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : 
microstategy, apple, dashboards, ipad, business technology
    
MicroStrategy

Secure Web Gateway Buyers Guide

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology, networking, security, business technology, data center
    
Blue Coat Systems

Secure Web Gateway Buyers Guide

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security, application security, email security, internet security, security management, vulnerability management, mobile device management
    
Blue Coat Systems

Seven Qualities of Wildly Desirable Software: Forrester Report

Published By: VMWare - vFabric     Published Date: May 15, 2012
Is your business demanding more innovation? You must respond by rising above mediocrity to deliver great software - to achieve this, you must balance your design to provide 7 key qualities. Boost your commitment to design for all 7 qualities today!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, enterprise applications, storage
    
VMWare - vFabric

National Instruments Use Oracle Fusion HCM to Align Business

Published By: Oracle     Published Date: Aug 09, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm
    
Oracle

National Instruments Use Oracle Fusion HCM to Align Business

Published By: Oracle     Published Date: Aug 15, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm, enterprise applications, human resource technology, business technology
    
Oracle

Health Plan Operations and Population Health Services: The Elements for Care Delivery Excellence

Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi

Three Steps to Securing Software Patches: Vulnerability Intelligence Matters

Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Time to Reconsider Your Data Center Design

Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks

5 Reasons To Run Your Business-Critical Workloads on Oracle Linux

Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC

LTI Recognized as U.S. Market Leader for Next-Gen ADM Services by ISG

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
In the Overall segment, the ISG Provider Lens Next-Gen ADM Quadrant Report cited LTI’s idea-led innovation approach to delivering unique business solutions; the organization’s digital way of working (WoW), designed to deliver and amplify outcomes; and an IP-led growth strategy as key strengths that earned the market leader designation. The ISG Provider LensTM report recognized LTI’s extensive experience in working with both packaged and custom software, running multi-year maintenance deals, and a growing digital portfolio, as factors that make it an attractive alternative to large multinational providers.
Tags : 
    
Larsen & Toubro Infotech(LTI)

Five things you may be overlooking - Getting the Most from your Workplace Safety Programme

Published By: Skillsoft     Published Date: Apr 27, 2015
This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.
Tags : 
workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme, security management
    
Skillsoft

Four Key Challenges of Healthcare Reform. The First Challenge: Comply with Reform

Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group

Making the Business Case for Virtualization

Published By: VMware     Published Date: Aug 25, 2011
This guide is designed to help business leaders make a case for virtualization by showing how it reduces costs and improves continuity and efficiency.
Tags : 
vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, gyro, storage virtualization, business technology, infrastructure
    
VMware

Increasing ROI in Responsive Web Design

Published By: Adobe     Published Date: Jan 27, 2014
Best practices, tips and examples for understanding responsive web design and its optimization.
Tags : 
technology, responsive web design, web design, responsive design, research
    
Adobe

Scott Brownrigg Success Story: Designing the Future

Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization, software development, contact management, content integration, content management system, information management
    
Adobe
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.