scribe

Results 326 - 350 of 862Sort Results By: Published Date | Title | Company Name

How Security is Changing to Support Virtualization and Cloud Computing

Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, network security, data protection, data center design and management
    
Trend Micro Inc.

Economist Study: Power of In-Person Collaboration Infographic

Published By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : 
collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration, networking, it management, knowledge management, data management, business technology
    
Cisco Systems

Economist Study: Power of In-Person Collaboration Whitepaper

Published By: Cisco Systems     Published Date: Oct 16, 2013
75% of business leaders believe that in-person collaboration is critical to business success. This Economist Intelligence Unit survey identifies key areas of collaboration, and describes how Cisco TelePresence is being used to create in-person experiences with colleagues, customers, and partners. Download Now
Tags : 
collaboration, cisco, best practices, technology, business success, telepresence, in-person collaboration, networking, it management, knowledge management, data management, business technology
    
Cisco Systems

Mastering Enterprise Continuous Delivery

Published By: UrbanCode     Published Date: Jul 09, 2013
Throughout this paper the levels of maturity of various components of Enterprise Continuous Integration will be described in the same way.
Tags : 
urbancode, enterprise continuous delivery, continuous integration, enterprise continuous integration, it management
    
UrbanCode

The Data Center as a Strategic Asset

Published By: Compass Datacenters     Published Date: Jul 07, 2015
The purpose of this white paper is to describe the provider thinking and product elements that must be addressed to change the data center selection process from one that is tactical to one that is strategic in nature.
Tags : 
data center, it decision making, data center operators, it management, storage management, data protection, data loss prevention
    
Compass Datacenters

BYOD Design Overview PART 2

Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco, mobile computing, mobile data systems, mobile workers
    
Cisco

Migrate to a 40-Gbps Data Center with Cisco QSFP BiDi Technology

Published By: Cisco     Published Date: May 14, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
data center, software, networking, cisco, migration, cloud computing, data center design and management, virtualization, infrastructure, design and facilities, infrastructure management
    
Cisco

FlexPod Data Center with Microsoft Fast Track Private Cloud 3

Published By: Cisco     Published Date: May 15, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, migration, network management, network performance
    
Cisco

Three Trends That Made Marketing Automation a Must-Have

Published By: Adobe     Published Date: Jun 26, 2019
Turn leads into customers. Reengage cold ones. Welcome new subscribers and remind them to renew. All of these practices are possible one to one. But what if you’re a marketer who needs to reach millions? Take a look at Marketing Automation Workflows Every Marketer Should Know and learn how to improve engagement, gain more qualified leads, and drive ROI at scale.
Tags : 
    
Adobe

Education in 2025: Education Technology Innovation Survey

Published By: Polycom     Published Date: Mar 06, 2017
Education today is described as between paradigms from the traditional to the digital. Students expect a highly engaging interactive learning environment, not stagnant instructor-led designs. Learning technologies, and changing pedagogical methods, are not only changing the way we teach but also the physical environments we teach in. Download now to learn more.
Tags : 
polycom, education, education technology, students, public sector, global connectivity, education sector, enterprise applications
    
Polycom

A Guide to Building a Better Email: The Welcome Series

Published By: Movable Ink     Published Date: Apr 01, 2016
You don’t get a second chance at a first impression. Your email welcome series is one one of the best opportunities you have to build a lasting relationship with a customer. But the stakes are high — you can gain or lose a customer in that initial contact. But with proper planning and data, a well-crafted welcome series can help build a love story between you and your subscribers. This eBook will guide you through the steps to build a welcome series that will turn your subscribers into loyal customers, while collecting valuable data along the way that will drive action throughout the customer relationship.
Tags : 
email marketing, email welcome series, email personalisation, email design, customer interaction service, customer relationship management, customer satisfaction, customer service
    
Movable Ink

9 Considerations for Securing Web Apps in the Cloud

Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS

Brief: The Cost of Migrating an Enterprise Application to a Public Cloud Platform

Published By: Skytap     Published Date: Sep 01, 2017
In this report, Forrester answers these questions and prescribes a detailed model for assessing, budgeting and managing the migration of a traditional enterprise application to the cloud.
Tags : 
    
Skytap

SiriusDecisions 3 Stages of Sales Planning

Published By: Anaplan     Published Date: Sep 11, 2019
A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: The three crucial stages of the annual sales planning process How to ensure that all relevant stakeholders participate in the sales planning process How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan

Real-world Experiences with End Point Security & Modern Management

Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware

Want Security in the Cloud? Look to Identity First

Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC

Security and Resilience in Cloud, Hybrid and Multicloud Deployments

Published By: Equinix APAC     Published Date: Feb 25, 2019
Security and Resilience in Cloud, Hybrid and Multicloud Deployments This white paper describes the challenges and motivations facing cloud, hybrid and multicloud users as they consider how to deliver traditional levels of security and robustness, while maintaining the API-enabled virtues of flexibility and short lead-times of cloud-enabled IT. Key Highlights: • Critical considerations associated with cryptographic key management for multicloud users • Implement solutions that are capable of maintaining an always-on service
Tags : 
    
Equinix APAC

Perfect Forward Secrecy

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd

Perfect Forward Secrecy

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : 
security, forward secrecy
    
F5 Networks Singapore Pte Ltd

FICO Optimisation Solutions Streamline Customer Acquisition

Published By: FICO EMEA     Published Date: Jan 25, 2019
A leading communication services company serving more than 50 million individual, business and government subscribers across the United States.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA

Understanding Intent-Based Analyics (IBA)in Apstra Operating System (AOS): A Technical Deep-Dive

Published By: Apstra     Published Date: Aug 19, 2019
Intent Based Analytcs (IBA), an important feature of AOS and a main enabler for closed loop telemetry is described in this whitepaper. Prerequisites for this whitepaper include a basic understanding of the Apstra AOS soluton, such as from the white paper ttled “The Apstra Operatng System (AOS) Architecture Overview.
Tags : 
    
Apstra

The 7 Deadly Sins of B2B Direct Marketing

Published By: Oliver Russell     Published Date: Oct 05, 2009
Can you name the 7 Deadly Sins of B2B Direct Marketing? Are you committing them? This entertaining and educational epistle written for B2B marketing disciples will describe the seven most damning mistakes made in B2B Direct Marketing, and identify the pathway to glorious B2B salvation.
Tags : 
oliver russell, measurability, b2b, b2b marketer, direct marketing, b2b direct marketing
    
Oliver Russell

Video:Using VisiBroker,the market leading CORBA environment,to scale up your distributed application

Published By: Micro Focus     Published Date: May 03, 2011
The explosion of data and consumer mobility trends put more pressure than ever on the back office systems across telecommunications companies, defense, transportation, healthcare, financial services and more. Using selected customer scenarios this webcast describes how VisiBroker, the market leading CORBA ORB, is the most cost effective, high performance solution to bring together tens of thousands of end points across distributed applications.
Tags : 
micro focus, visibroker, corba environment, distributed application, infrastructure, internetworking hardware, interoperability, application integration, application performance management, analytical applications, business intelligence, service oriented architecture
    
Micro Focus

Protecting Sensitive Information through IPsec-Based Server and Domain Isolation

Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, encryption, internet security, security management, database security, information management
    
Centrify Corporation
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.