lte

Results 226 - 250 of 959Sort Results By: Published Date | Title | Company Name

Data Integration for Dummies

Published By: Infomatica     Published Date: May 19, 2015
In this eBook, best-selling author Brian Underdahl explores the fundamentals of data integration and how the latest tools can simplify today’s (and tomorrow’s) data landscape. “Data Integration for Dummies” provides valuable reference if you need to explain data integration to the business, are looking for an alternative to hand-coding data mappings, or simply interested in expanding your knowledge.
Tags : 
data integration, it infrastructure, data sources, data landscape, data mappings, it management
    
Infomatica

Data Movement in Today’s Evolving Eco-System Topology

Published By: Teradata     Published Date: Aug 27, 2015
While your specific data throughput mileage may vary, this paper will share the factors that directly contribute to a Data Movement solution, the data storage ecosystem alternatives, and the pitfalls you may face when attempting to architect such a solution in your data warehouse environment.
Tags : 
analytics, big data, applications, lob, application integration, analytical applications, configuration management
    
Teradata

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.

Data Protection Suite Ein gutes Team

Published By: Dell PC Lifecycle     Published Date: Aug 14, 2018
Wenn Sie kein Risiko eingehen möchten, sollten Sie die Data Protection einem Anbieter mit einer umfassenden Lösung anvertrauen. Holen Sie das Optimum aus Dell EMC Data Domain heraus – mit der leistungsfähigen Data Protection Suite.
Tags : 
    
Dell PC Lifecycle

Data Visualization Made Easy

Published By: SAS     Published Date: Mar 19, 2013
Use drag-and-drop, autocharting and data filtering to understand your data.
Tags : 
big data, visualization, interactive, data, data visualization, application integration, best practices, business activity monitoring, business analytics, business intelligence, business management, business metrics, enterprise software
    
SAS

Data Warehousing in the Cloud - Opportunities, Benefits and Best Practices

Published By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google

Data Warehousing in the Cloud - Opportunities, Benefits and Best Practices

Published By: Google     Published Date: Jan 24, 2019
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google

Daten-Gesteuerte Transformation

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die direkte Integration zwischen NetBackup und Veritas Information Map sorgt für Transparenz und Kontrolle, um Risiken und Kosten zu reduzieren. Dank der direkten Integration von Veritas Resiliency Platform (VRP) in NetBackup erhalten Sie eine durchgängige Unternehmenslösung zur Ausfallsicherheit.
Tags : 
datenflusses, letzten, technologie, integrierten, datenschicht
    
AstuteIT_ABM_EMEA

Daten-Gesteuerte Transformation

Published By: Astute IT DACH     Published Date: Feb 28, 2018
Die direkte Integration zwischen NetBackup und Veritas Information Map sorgt für Transparenz und Kontrolle, um Risiken und Kosten zu reduzieren. Dank der direkten Integration von Veritas Resiliency Platform (VRP) in NetBackup erhalten Sie eine durchgängige Unternehmenslösung zur Ausfallsicherheit.
Tags : 
datenflusses, letzten, technologie, integrierten, datenschicht
    
Astute IT DACH

Datenklassifizierung für höhere Dokumentensicherheit

Published By: Adobe     Published Date: Apr 25, 2016
In diesem Whitepaper beschäftigen wir uns mit der Frage: Wie lassen sich Inhalte in solchen teilstrukturierten Ad-hoc-Umgebungen verwalten und schützen?
Tags : 
    
Adobe

DDoS Threat Landscape Report

Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, networking, security, it management
    
Incapsula

Deep Packet Inspection for Threat Analysis

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Deep Packet Inspection for Threat Analysis Advisory

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Defending against today’s critical threats February 2019 Threat Report

Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA

Deliver Scalable VoLTE and Agile Rich Communications Services

Published By: Intel     Published Date: May 22, 2017
While holding the promise of HD quality, enriched services, and the benefits of a common packet switched access infrastructure, the adoption of infrastructure-based voice over LTE (VoLTE), along with rich communications such as video and real-time messaging, has stalled over the last few years with concerns around quality, security, and cost. During that time, the value of the phone number as a globally significant user ID and key services such as SMS and MMS have been relegated by phone manufacturers, over the top (OTT) services, and even the subscribers themselves as “technologies of last resort.” Finally, the proliferation of 4G, together with the emergence of network functions virtualization (NFV), powered by Intel®, Hewlett Packard Enterprise* (HPE), and Metaswitch*, is allowing network operators to take charge of the consumer’s communications experience, once more.
Tags : 
    
Intel

Delivering the Next Generation of Online Video: What to Expect in 2018

Published By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
    
Limelight Networks

Delivering the Next Generation of Online Video: What to Expect in 2018

Published By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
    
Limelight Networks

Dell EMC XC630 - Greater Database Performance than Alternative Integrated Solution

Published By: Dell EMC     Published Date: Aug 17, 2017
If your business uses a three-tier architecture with disaggregated servers, storage, and SAN to run applications, you might be considering upgrading to an integrated solution to streamline your business. However, implementing a hyperconverged Dell EMC XC Series cluster powered by Nutanix software is an even more attractive option that can provide over 73 percent greater database performance - an advantage that translates to 50 percent greater database performance per dollar than a traditional integrated solution.
Tags : 
three-tier architecture, disaggregated servers, integrated solution, hyperconverged infrastructure, database performance
    
Dell EMC

Deltek delivers robust financial and project management to international consulting & engineering

Published By: WorkBook from Deltek     Published Date: May 04, 2018
Pöyry is an international consulting and engineering company that delivers smart solutions across power generation, transmission & distribution, forestry, chemicals & bio-refining, mining & metals, transportation and water. Pöyry’s net sales in 2016 were €530 million. The company’s shares are quoted on Nasdaq Helsinki (POY1V). Pöyry has approximately 5,500 experts in 130 offices across 40 countries delivering 10,000 projects each year. As a global firm, Pöyry wanted a single, integrated ERP solution that could provide transparency and realtime visibility into finance and projects, while streamlining operations and enhancing collaboration. After evaluating a number of solutions, the organization selected Deltek. Since implementing Deltek, Pöyry has experienced numerous benefits including increased visibility and better collaboration across the entire business.
Tags : 
deltek, delivery, financial, project, management, international, consulting, engineering
    
WorkBook from Deltek

Deltek First Practical and Affordable Cloud Solutions for Small- to Mid-Sized Government Contractors

Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
In this white paper we explore how smaller contractors can now have access to robust and compliant solutions via the cloud, thus removing the IT and cost barriers that previously kept these solutions out of reach.
Tags : 
smb, government contractors, cloud solutions, cloud computing, cloud, project management, accounting solutions, spreadsheets, application integration, application performance management, best practices, business activity monitoring, business analytics, business integration, business intelligence, business management, business process management, enterprise resource planning
    
Deltek - Nethawk

Demystifying the Anti-Spam Buzz

Published By: Roaring Penguin     Published Date: Aug 21, 2009
This paper by Roaring Penguin Software demystifies the enterprise anti-spam market and its various choices and buzzwords to help you cut through the hype and focus on the basics.
Tags : 
spam, antispam, anti-spam, email security, blocking, filtering, roaring penguin, anti spam, anti virus
    
Roaring Penguin

DEN WANDEL GESTALTEN

Published By: Adobe     Published Date: Jul 04, 2016
Creativity is all about change. It’s about changing your perspective to reimagine the world around you. It’s about finding new ways to solve problems and express ideas. If you want to create art and ideas that change the world, you must be willing to embrace change. Fortunately for creative and business visionaries, change is a good thing. The truth is that companies that welcome creativity, change, and innovation are inevitably more successful.
Tags : 
    
Adobe

Deployment Automation Basics

Published By: IBM     Published Date: Apr 06, 2016
"Discover the benefits of deployment automation and how to maximize your automation investments! IT organizations have been finding it increasingly difficult to deploy more quickly without adding more people and incurring additional risks. Only until recently have there been more viable automated deployment options to offer an alternative to the slow and error prone process of manual deployment. Read the paper to learn about: • The limitations of manual deployment, namely its inconsistency, lack of visibility, and proneness to error • The benefits of deployment of automation • The base set of features that an automated system should provide"
Tags : 
ibm, deployment automation, consistent deployments, urbancode, software development
    
IBM

Der Aufstieg des Social Enterprise

Published By: Workday DACH     Published Date: Mar 27, 2019
Die HCM-Technologie unterstützt Unternehmen entscheidend beim Aufstieg des Social Enterprise. Sie ermöglicht das Management des gesamten Personallebenszyklus und liefert Analysen, um wichtige Geschäftsentscheidungen voranzubringen. Lesen Sie, welche vier Schritte Unternehmen jetzt ergreifen sollten.
Tags : 
workforce-technologie, digitale strategie
    
Workday DACH
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.