large scale

Results 76 - 100 of 137Sort Results By: Published Date | Title | Company Name

Network Troubleshooting - Cascade Helps Identify Issues In Seconds And Fix Them In Minutes

Published By: Riverbed     Published Date: Jul 17, 2013
This guide includes a demonstration on how you can accelerate troubleshooting, gain end-to-end visibility, and solve intermittent performance problems without having to recreate them; a detailed case study that shows how a large-scale federal government and defense consultant solved a months-long problem in just 15 minutes; and an on-demand webinar that introduces you to Cascade Shark and Cascade Pilot.
Tags : 
network, troubleshooting, speed of thought, performance, network, bandwidth management, infrastructure, local area networking, network architecture, network management, network performance, network performance management, traffic management
    
Riverbed

New RICH DATA Solution for Online Display Targeting

Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting

Niche Tourism Beginning and digital marketing : Beginning of the future?

Published By: Vineet Singh     Published Date: Aug 31, 2010
The evolution of the tourism industry has been frantic, and to a large scale been dictated by the fluctuations in the socio-economic and political landscape of our planet.
Tags : 
tourism industry, digital marketing
    
Vineet Singh

One Highly Flexible Solution Supports Hagadone Corporation’s Diverse Enterprise

Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this case study to learn how Spectrum Enterprises has provided the scalability, reliability and security to support Hagadone Corporation’s ongoing drive for excellence including: - Productivity driven by the network’s ability to handle day-to-day work flow quickly and with little latency, especially during spikes in usage - Reliable connectivity for sharing large files for electronic publishing Flexibility to innovate and create an interactive hospitality guest experience - Ability to scale bandwidth to support diverse business needs and expand Hagadone’s influence as a media company
Tags : 
    
Spectrum Enterprise

Performance Analysis: Benchmarking a NoSQL Database on Bare-Metal and Virtualized Public Cloud

Published By: Internap     Published Date: Dec 02, 2014
NoSQL databases are now commonly used to provide a scalable system to store, retrieve and analyze large amounts of data. Most NoSQL databases are designed to automatically partition data and workloads across multiple servers to enable easier, more cost-effective expansion of data stores than the single server/scale up approach of traditional relational databases. Public cloud infrastructure should provide an effective host platform for NoSQL databases given its horizontal scalability, on-demand capacity, configuration flexibility and metered billing; however, the performance of virtualized public cloud services can suffer relative to bare-metal offerings in I/O intensive use cases. Benchmark tests comparing latency and throughput of operating a high-performance in-memory (flash-optimized), key value store NoSQL database on popular virtualized public cloud services and an automated bare-metal platform show performance advantages of bare-metal over virtualized public cloud, further quant
Tags : 
internap, performance analysis, benchmarking, nosql, bare-metal, public cloud, infrastructure, on demand capacity, it management, data center
    
Internap

Physical Security Threat Landscape: Recent Trends and 2015 Outlook

Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance

PODS for Business Helps New York City's Times Square Ring in the New Year

Published By: PODS for Business     Published Date: Jul 24, 2017
The Times Square Alliance works to improve and promote Times Square—cultivating the creativity, energy and edge that have made the area an icon of entertainment, culture and urban life for over a century. Each year, the organization coordinates many large-scale events, including the world-renowned Times Square New Year’s Eve celebration.
Tags : 
efficiency, technology, coordination, organization, new years eve
    
PODS for Business

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
    
BeyondTrust

Pro-Recruiter Tips for Hiring a Growing Workforce

Published By: iCims     Published Date: Jan 24, 2017
A growing business is usually a good thing, but for talent acquisition teams, growth on a large scale can pose some unique recruiting challenges. That’s because rapid expansion can confront talent acquisition with the need to ensure that as the company grows, quality of hire doesn’t shrink.
Tags : 
    
iCims

Real World AI: Deep Learning Pipeline Powered by FlashBlade

Published By: Pure Storage     Published Date: Dec 05, 2018
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to tap into their data with artificial intelligence (AI). With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists are tackling new use cases like autonomous driving vehicles and natural language processing. Read this technical white paper to learn reasons for and benefits of an end-to-end training system. It also shows performance benchmarks based on a system that combines the NVIDIA® DGX-1™, a multi-GPU server purpose-built for deep learning applications and FlashBlade, a scale-out, high performance, dynamic data hub for the entire AI data pipeline.
Tags : 
    
Pure Storage

Real-time Performance Management with Digital Signage

Published By: RMG Networks     Published Date: May 08, 2014
Download to learn how large scale enterprises can improve quality, efficiency, productivity, and time from raw material to the point of purchase.
Tags : 
rmg networks, large scale enterprises, historical performance tracking, productivity data, visual communications, enterprise video, real time data, knowledge management, enterprise applications
    
RMG Networks

Reinvent your technology strategy for a changing world

Published By: KPMG     Published Date: Sep 13, 2018
Create a transformation vision and an integrated technology roadmap to get started towards your goals. As digital complexity increases, you’ve probably spent a lot of time making sure your customer-facing strategies and technologies are ready to meet the next challenge. And rightly so. But what about your internal functions? Are your ERP, finance, HR, procurement and supply chain strategies ready? You may be asking some hard questions: • How do I manage a large-scale transformation of my back office underpinned with the right technologies? • Is my technology strategy truly aligned to meet my business goals? • What are other organizations doing to make the transition? KPMG Technology Strategy and Selection gives you the tools to frame such decisions by working with you to develop a transformation strategy that’s based on your organization’s overarching business needs. One that will diminish some of the noise of disruption by helping you see what’s coming--while focusing on an integr
Tags : 
kpmg, business transformation
    
KPMG

Retailers Relying on Mobile Solutions for ROI: The Big Picture

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Produced in conjunction with Integrated Solutions for Retailers, this National Retail Foundation (NRF) 2014 guide explores why mobile device, app and content management are critical components of success for large scale mobile deployment and ongoing security management.
Tags : 
mobile solutions, roi, mobile deployment, mobile security management, mobile hardware, it management, knowledge management, enterprise applications
    
IBM MaaS360

Rise of the Machines: How to make a successful smart meter roll-out

Published By: ClickSoftware     Published Date: Sep 12, 2014
This e-book will explore the challenges in this large-scale roll-out and provide some insight on how to overcome them.
Tags : 
guide to a smart meter roll-out, smart meter usage, implementing smart meter usage, benefits of the smart meter, clicksoftware, software development, wireless, electronics, business technology
    
ClickSoftware

Sage Business Cloud Enterprise Management Data & Analytics

Published By: Sage Software (APAC)     Published Date: May 02, 2018
Data overload have burdened practically every largescale enterprise today. It’s vital for competitive enterprise not only to find solutions that will deliver the right data at the right time, but also be confident that the data they are looking at is governed and trusted. Sage Business Cloud Enterprise Management enables businesses to gain real-time access to data and make critical business decisions; achieve a better ROI while reducing IT overhead; automate data integration and deliver a 360-degree view of the businesses; mitigate data security risks and comply with legal regulations. Download this whitepaper and discover how to overcome some common challenges of information overload to increase your business insight and visibility.
Tags : 
    
Sage Software (APAC)

SBIC Report-Transforming Information Security (Designing a state-of-the-art extended team)

Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security, business technology
    
EMC Corporation

Scale-out Storage Helps Optimize Your Storage Infrastructure

Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are shifting from large scale-up approaches to scale-out of clustered storage approaches. The need to increase the levels of storage and application availability, performance, and scalability while eliminating infrastructure or application downtime has necessitated such an architectural shift. This paper looks at the adoption and benefits of clustered storage among firms of different sizes and geographic locations. Access this paper now to discover how clustered storage offerings meet firms’ key requirements for clustered storage solutions and the benefits including: Non-disruptive operations Secure multi-tenancy Scalability and availability And more"
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, storage, data management, data center
    
NetApp

Securing MySQL Databases

Published By: McAfee     Published Date: Nov 14, 2012
Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers are as determined as ever, and employee-related abuses are on the rise.
Tags : 
sql, security, database, mcafee, hackers, web service security, open source, data protection, vulnerability management
    
McAfee

Seven Quick Wins To Lower Costs And Accelerate Revenue

Published By: Oracle Primavera     Published Date: Oct 09, 2015
Enterprise project portfolio management (EPPM) is mission critical to the oil and gas industry, which is driven by billions of dollars in capital investments. These large-scale exploration and production projects, if they fail, have an impact on the company and their share price. EPPM provides that full end-to-end capability to support the capital asset lifecycle – from planning, building & construction, operation & maintenance, to decommissioning. Read seven quick wins to lower costs and discover how to accelerate revenue.
Tags : 
oracle, eppm, capital asset, capital asset lifecycle, project management, portfolio management, capital projects, strategic planning, decommissioning
    
Oracle Primavera

Seven Signs You're on the Road to Real-Time ERP

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
A step-change in the pace of business today brings enterprise resource planning (ERP) systems face-to-face with the largest transformation in their role since they were first introduced in the early 1990s. The rise of a new generation of business automation demands real-time information processing and visibility on a scale that was unthinkable just a few years ago. Coupled with—and in large part enabled by—this new wave of business automation, there has been a surge in the pace of business itself. Learn how Real-Time ERP puts you and your business at the forefront of this change.
Tags : 
real-time erp, enterprise, business automation demands, information processing and visibility, enterprise resource planning
    
Netsuite DWASF Leads Display Q1 2015

Simplifying large-scale Internet of Things (IoT) device deployments

Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS

Six Steps for Devising a Foundation for Success

Published By: Cox Business     Published Date: Apr 27, 2017
From the largest states and cities to the smallest municipalities, the public sector is undergoing large-scale modernization projects. To serve constituents now and in the years ahead, government agencies need a strategy to build the right networking infrastructure. The following six steps can help state and local governments build a solid foundation for modernization initiatives.
Tags : 
    
Cox Business

State of The Internet/Security

Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.