hi def

Results 376 - 400 of 1110Sort Results By: Published Date | Title | Company Name

Software-defined Data Center - Get the most out of today's infrastructure

Published By: IBM     Published Date: Aug 09, 2018
This Aberdeen report outlines the impact of software-defined data center in empowering organizations to get the most of their IT.
Tags : 
    
IBM

Whitepaper: The Spotfire A(X) Experience: The Future of Analytics is Now

Published By: TIBCO Software     Published Date: Feb 14, 2019
With the new TIBCO Spotfire® A(X) Experience, we are revolutionizing analytics and business intelligence. This new platform accelerates the personal and enterprise analytics experience so you can get from data to insights in the fastest possible way. With the fusion of technology enablers like machine learning, artificial intelligence, and natural language search, the Spotfire® X platform redefines what’s possible for analytics and business intelligence, simplifying for everyone how data and insights are generated, consumed, and acted on. Download this whitepaper to learn more, then check out the new Spotfire analytics. It’s unlike anything you have ever seen. Simple, yet powerful, it changes everything.
Tags : 
    
TIBCO Software

Blockchain for Mobility Services

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
    
Group M_IBM Q119

Model Management: A Framework to Build a Model-Driven Business

Published By: Domino Data Lab     Published Date: May 23, 2019
This paper introduces the practice of Model Management, an organizational capability to develop and deliver models that create a competitive advantage. Today, the best-run companies run their business on models, and those that don’t face existential threat. The paper explains why companies that fail to run on models are falling for the Model Myth—the assumption that models can be managed like software or data. Models are different and need a new organizational capability: Model Management. What’s inside: Defining a model Why models matter for businesses Why companies fall for the Model Myth A framework for Model Management Practical steps to get started The paper is intended for anyone in a data science organization, or anyone who hopes to use data science as a key source of competitive advantage for their business.
Tags : 
    
Domino Data Lab

The Essential Price Management Guide for Technology Solution Providers

Published By: ConnectWise     Published Date: Aug 22, 2019
Smart pricing based on a sound strategy is fundamental to the success of your technology business. While you may think you can’t afford to spend time and resources defining and enforcing a pricing strategy, the truth is, you can’t afford not to. Sticking to a plan for pricing will help grow your profits, while veering off course can cause devastating effects. Even one or two margin points have the potential to substantially impact your bottom line. ConnectWise Sell is designed to help guide you and your sales team to greater profitability with easy-to-use price management tools.
Tags : 
    
ConnectWise

New 2015 Mobile Malware Report from Blue Coat Security Labs

Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat

Defending Your Network from Cryptomining

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims’ computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco® security portfolio.
Tags : 
    
Cisco Umbrella EMEA

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware Citrix     Published Date: Jan 23, 2018
This paper provides guidance for selecting and purchasing a virtual workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual workspace strategy for your environment. The intended audience for this paper is enterprises seeking to empower a completely mobile workforce while enabling IT administrators to manage and secure their rapidly changing networks. IT decision-makers and lineof- business leaders alike will find the insights presented helpful for executing a mobile conversion strategy.
Tags : 
buying criteria, mobile, workforce, work solutions, vmware
    
VMware Citrix

Stopping Email Fraud

Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies

Conquering Compliance Complexity with the Cloud

Published By: Symantec.cloud     Published Date: Aug 03, 2011
Cloud-based archives offer the cost savings, ease of use, and scalability of the cloud coupled with best-of-breed security from a trusted provider for defensibly handling high-risk enterprise data. Download this whitepaper to find out more now!
Tags : 
messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas, convergence, network management
    
Symantec.cloud

Types of Prefabricated Modular Data Centers

Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
data centers, container, it space, cooling, prefabricated modular data centers
    
Schneider Electric

Why Data Center Modernization is Critical to Business Success

Published By: Dell EMC     Published Date: Aug 01, 2019
Pursuing agility to truly impact business transformation requires embracing date center modernization as a core competency. Crucial to this is having the most up-to-date IT instructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC

Meeting today’s data demands with IBM Spectrum NAS (Network Attached Storage)

Published By: IBM APAC     Published Date: Mar 19, 2018
Unstructured data has exploded in volume over the past decade. Unstructured data, media files and other data can be created just about anywhere on the planet using almost any smart device available today. As the amount of unstructured data grows exponentially, customers using this data need to be able to take advantage of the right storage solutions to support all of their file and object data requirements. IBM® recently added a new storage system to their Spectrum product family, IBM Spectrum Network Attached Storage (NAS). IBM Spectrum NAS adds another software-defined file storage system to IBM’s current unstructured data storage solutions, IBM Spectrum Scale™ and IBM Cloud Object Storage (COS). Below, we will discuss the three systems and supply some guidance on when and where to use each of them.
Tags : 
    
IBM APAC

Lead Scoring: Guide for Modern Marketers

Published By: Oracle OMC     Published Date: Nov 30, 2017
Lead scoring is an objective ranking of one sales lead against another. This not only helps align the right follow-up to the corresponding inquiry, it also helps marketing and sales professionals identify where each prospect is in the buying process. The process of defining lead scores improves alignment and collaboration between marketing and sales teams. After all, by jointly establishing an objective definition of a quality lead, sales and marketing can exchange better feedback on the quality of leads being passed to sales. Plus, lead scoring helps ensure that the best leads are followed up on immediately by prioritizing leads according to revenue potential and buyer readiness.
Tags : 
    
Oracle OMC

Data Replication Demo

Published By: Informatica     Published Date: Nov 21, 2011
This demo showcases the ease-of-use to replicate data sets, the process of connecting to a data source, defining a mapping, initial synchronization, extraction and finally applying to a destination.
Tags : 
demo, data sets, data replication, replication, mapping, synchronication, reporting, loading
    
Informatica

Virtualization: Not Just for Big Business

Published By: VMware Dell     Published Date: Jan 31, 2008
A virtualized data center is a more nimble, responsive, and efficient data center. This report discusses the trend towards x86 virtualization and customer benefits, and examines how (in defiance of conventional wisdom) SMB customers have been embracing – and benefiting from – x86 virtualization at about the same rate as larger enterprises.
Tags : 
gabriel, gabriel consulting, vmware, virtual, virtual server, server, server software, small business
    
VMware Dell

Search Engine Link Spam: Risks, Threats, Solution

Published By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs
    
MessageLabs

Digital Marketing: Are You Ready to Go Agile? (Best Practices)

Published By: SAS     Published Date: Apr 16, 2015
The exponential growth in digital channels has given rise to the importance of digital marketing. But digital marketing isn’t just about the channel, it’s the mechanism by which people are creating and sharing experiences; engaging not only with each other, but with companies they do business with. With such high channel fragmentation, making strategic decisions on audience, con¬tent and platforms is critical. Marketers need the capability to define their market, build outstanding content, tailor messaging and provide that messaging in the right medium – quickly!
Tags : 
    
SAS

Artificial Intelligence for Executives: Integrating AI into your analytical strategy

Published By: SAS     Published Date: May 24, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand. Great leaders become great by balancing strategy with tactics, future vision with current reality and strengths with weaknesses – all with the goal of accomplishing a clearly defined objective. Great leaders also understand that people are the most valuable resources within their organization. To drive and inspire their success, you must optimize strengths while recognizing inherent weaknesses. Many of our daily human experiences and interactions involve machines or devices of some sort. Technolo
Tags : 
    
SAS

How to do Deep Learning with SAS

Published By: SAS     Published Date: May 24, 2018
This paper provides an introduction to deep learning, its applications and how SAS supports the creation of deep learning models. It is geared toward a data scientist and includes a step-by-step overview of how to build a deep learning model using deep learning methods developed by SAS. You’ll then be ready to experiment with these methods in SAS Visual Data Mining and Machine Learning. See page 12 for more information on how to access a free software trial. Deep learning is a type of machine learning that trains a computer to perform humanlike tasks, such as recognizing speech, identifying images or making predictions. Instead of organizing data to run through predefined equations, deep learning sets up basic parameters about the data and trains the computer to learn on its own by recognizing patterns using many layers of processing. Deep learning is used strategically in many industries.
Tags : 
    
SAS

Best Practices Guide for Premium Differentials and Surcharges

Published By: Alere Wellbeing     Published Date: Sep 26, 2011
Alere Wellbeing evaluation and client feedback have shown that incentives are a successful part of a comprehensive tobacco control strategy. This brief defines what premium differentials and surcharges are and provides best practices from our clients.
Tags : 
alere, tobacco control strategy, free & clear evaluation, premium differential, surcharge, tobacco cessation program, quit for life program®, productivity
    
Alere Wellbeing

Finance Redefined Workday Global Finance Leader Survey

Published By: Workday     Published Date: Sep 14, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday

Five Steps to Better People Analytics

Published By: Workday     Published Date: Jan 09, 2019
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
    
Workday

Policy -The Foundation to Business Security

Published By: WatchGuard     Published Date: Oct 16, 2012
The importance of effective security for businesses can't be understated and effective IT policies must be made. With this overwhelming amount of data in your hands, how do you ensure proper network defense and actionable incident responses?
Tags : 
watchguard, it policy, data management, aup, risk, data security, security, business technology
    
WatchGuard
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.