tech products

Results 151 - 175 of 204Sort Results By: Published Date | Title | Company Name

IDC Analyst Connection: Opportunities in Omni-Channel Merchandise Optimization

Published By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : 
omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance
    
IBM

Mythbusting Goes Virtual: Debunking Four Common vSphere "Truths"

Published By: Dell     Published Date: Aug 16, 2013
"As any technology becomes increasingly popular and widespread, certain pieces of inaccurate information begin to sound like facts. Moreover, as a product matures, it evolves by taking on new features, shedding old ones and improving functionality. However, many products continue to carry those myths as truisms even as the version count rises higher. Get the facts about vSphere. Read the White Paper "
Tags : 
vsphere, virtual, technology, iscsi, storage virtualization, security management, business technology, virtualization
    
Dell

Top 10 Advantages of a Proxy Deployment in Conjunction with a Next-Generation Firewall

Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec

EMC IT: Leading the Transformation

Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service
    
EMC

EMC IT: Leading the Transformation

Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC

EMC IT: Leading the Transformation

Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC

FR EMC IT: Leading the Transformation

Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC

EMC IT: Leading the Transformation

Published By: EMC     Published Date: Apr 16, 2014
A report to provide an insight for IT professionals about data center technology products.
Tags : 
data center technology, emc, esg, customer service, cloud computing, it as a service, data center
    
EMC

Mitigating DDoS Attacks with F5 Technology

Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology, network security, application security, security management
    
F5 Networks Inc

Taneja Group Technology Analysts Delivering True Enterprise CDT

Published By: InMage     Published Date: Feb 18, 2009
The concept of Continuous Data Technologies (CDT) emerged on the scene two years ago, and is now transforming the data storage industry. Nearly every major storage vendor has one or more CDT products in their offering roadmap, in addition to a vital community of emerging vendors who are the true innovators in this space.
Tags : 
inmage, taneja group, continuous data technologies, cdt, dr scout, continuous data protection, cdp, continuous data imaging, cdi, apit data capture, any-point-in-time, data management, database development, data protection, data quality, database security
    
InMage

IBM PowerVM Virtualization Technology on IBM POWER7 Systems

Published By: IBM     Published Date: Oct 01, 2013
This technical white paper presents benchmark results showing greater VM consolidation ratios than demonstrated in previous benchmarks and demonstrating the extent of the performance lead that PowerVM virtualization technologies deliver over x86-based add-on virtualization products. The tests, running two workload benchmarks of different consolidation ratios on POWER7 processor-based and comparable Intel-based systems, demonstrate the exceptional performance and scalability of PowerVM virtualization technologies compared to VMware vSphere1 on an x86-based platform.
Tags : 
ibm, ibm power7 systems, ibm powervm, virtualization, virtualization technology, consolidation, infastructure, business technology
    
IBM

IBM's BladeCenter Foundation for Cloud vs Cisco's Unified Computing

Published By: IBM     Published Date: Oct 01, 2013
Clabby white paper that highlights the benefits and advantages that IBM brings to the market with its breakthrough technology and products, providing the right solution and value for customers' issues compared to Cisco UCS.
Tags : 
ibm, ibm’s bladecenter, x86 servers, it solutions, servers, san, chassis, applications, energy efficienct, networking, storage, data management, business technology, data center
    
IBM

Web API Management: New Rules for a New Economy

Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software, software development, it management, enterprise applications, cloud computing
    
IBM

Business Value Analysis

Published By: Cisco     Published Date: Dec 21, 2016
Nemertes Business Value Analysis independently evaluates technology products and services to identify the value to enterprise organizations. Through detailed interviews with technology professionals who use the products or services, Nemertes analyzes and quantifies the real-world benefits and improvements to the efficiency of their organizations.
Tags : 
    
Cisco

Transforming the Enterprise with Secure Mobility

Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco

Optimizing Digital: Throughout the Path to Purchase

Published By: InReality     Published Date: Aug 31, 2015
Rapid consumer adoption of digital technologies and online channels has evolved the traditional path to purchase to the point of no return. Now consumers control when, where and how they research, purchase and receive products, leaving brands and retailers struggling to connect the dots between the online, mobile and physical worlds.
Tags : 
inreality, digital, strategy, content, commerce, it management, business technology
    
InReality

5 Biggest CIO Communications Problems

Published By: Microsoft Office 365     Published Date: Sep 26, 2017
As a tech leader, you recognize that disruption is afact of life. According to Gartner, enterprise IT has entered an era of digitalization where disruptive new products are providing a continuous stream of growth, innovation, and differentiation. IT overhauls in business productivity—moving to the cloud, supporting a remote workforce, and preserving valuable legacy data while maintaining security and control—are necessary for your business to remain competitive. These changes require communications solutions that can keep pace with the accelerating demands of the connected world.
Tags : 
    
Microsoft Office 365

Assessing the Business Value of Endpoint Specialized Threat Analysis and Protection Solutions

Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco

eBook: the Power of Insight

Published By: IBM     Published Date: Jul 31, 2015
New competitors, new technologies and new expectations created by ubiquitous mobile connectivity are dramatically reshaping—and disrupting—the retail and consumer products landscape. To keep up, retailers and consumer products manufacturers need to understand their customers better than ever before.
Tags : 
ibm, consumer products landscape, consumer products manufacturers, big data, retailers
    
IBM

10 VoIP Companies and Technologies to Watch in 2013

Published By: Wheelhouse     Published Date: Aug 13, 2013
The key to understanding the evolving role of VoIP is recognizing that it’s a lot more than just another method for making voice calls. Buying VoIP means more than simply replacing your existing phone system with a functionally identical one running over an IP network. In fact, the underlying IP technology makes possible great advances in the convenience and capabilities of phone systems. Most important of these is that it allows the integration of voice calling with multiple other methods of communication. Both sellers and buyers of VoIP products that build their strategies around this reality will fare best.
Tags : 
voip, technology, business management, voice over ip, business intelligence
    
Wheelhouse

Info-Tech Vendor Landscape: Virtual Backup Software

Published By: Symantec     Published Date: Jul 11, 2014
This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropriate for your organization. Find out why Symantec was named a “Champion” in virtual backup software.
Tags : 
info-tech, landscape, virtual, software, backup, machine, vendors, networking, productivity, project management, software compliance
    
Symantec

FlexPod Data Center with Microsoft Fast Track Private Cloud 3.0 Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

80 Easy Ways to Supercharge Your Business Growth

Published By: Microsoft Office 365     Published Date: Jun 03, 2016
Feeling overwhelmed by starting a new business? Or stuck about what to do next to grow your existing business? We know being a business owner is no easy feat, and it can be extremely helpful to get advice from other successful entrepreneurs who have been in your shoes. So, we partnered with CNBC’s Carol Roth and reached out to hundreds of influential small business owners and organizations that serve small businesses to offer advice and insights on what they found to help prosper their business. In this eBook, you’ll find 80 tips and strategies regarding: • Managing your business • Accelerating growth • Connecting with people • Leveraging technology • Marketing and selling your products or services Download the free eBook to find out how to take your business to the next level from these experts who know a thing or two about success.
Tags : 
    
Microsoft Office 365

RunSmart Platform Rearchitected to Reach Beyond the Datacenter

Published By: Runsmart     Published Date: Feb 22, 2018
Download the white paper that takes an in-depth look at the technology behind Baselayer's updated RunSmart, as well as information on competing products.
Tags : 
runsmart, dcim, data center management, infrastructure, architecture, data integration, storage management, data center design and management
    
Runsmart

Info-Tech Quality Management and Test Champion Report

Published By: IBM     Published Date: Oct 22, 2013
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : 
ibm, info-tech, quality management, test champion report, microsoft, parasoft, software testing, vendor selection, market share, vendor landscape, infrastructure testing, future changes, development platform toolset, leveraging tool, testing functionality, product selection, vendor selection, information gathering, software testing solutions, business management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.