adoption

Results 351 - 375 of 963Sort Results By: Published Date | Title | Company Name

Internet of Things Security Considerations in a Multicloud Environment

Published By: ForeScout     Published Date: Aug 15, 2017
In this IDC Perspective report, research director Abhi Dugar looks at IoT security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments.
Tags : 
    
ForeScout

ESG: ForeScout and the Software-Defined Perimeter (SDP)

Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout

What to Consider When Evaluating your SD-WAN Options

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA

How the Rapid Adoption of Public Clouds Is Affecting Cybersecurity

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA

A New Paradigm for Cloud: Architecting Control & Resilience at Scale with Fugue

Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue

Unified Cloud Runtime: Achieving the True Value of the Cloud by Intellyx

Published By: Fugue     Published Date: Mar 27, 2017
This paper details that approach to cloud's complex challenges and how an extensible, infrastructure-level cloud operating system like Fugue fits the bill to realize success.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue

Ovum—On the Radar: Fugue Offers Infrastructure Deployment and Automation in the Cloud

Published By: Fugue     Published Date: Mar 27, 2017
Check out this report to see why Ovum recommends Fugue’s solution to help developers generate applications that can exploit cloud capabilities and deliver on the promise of the cloud.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue

RFID Solutions for Livestock Industry

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
It is well known that the adoption of RFID is happening around the globe. But where are the success stories and in which market sectors? One industry that has realized the benefits of RFID technology for several years is the Livestock industry.
Tags : 
rfid, livestock, gao rfid, gao group, identity management
    
GAO RFID Inc.

Mastering the EMR Selection Process: Steps to Successful Electronic Medical Record Adoption

Published By: GE Healthcare     Published Date: Jun 04, 2014
A recent KLAS publication reported more than a third of ambulatory practices (ranging from small to large) will replace their current EMR system. Why? Poor functionality, sun-setting products, and concerns about the corporate viability drive replacement needs. KLAS notes that while providers are still evaluating niche EMR products, many organizations are seeking the stability of established vendors. With Health Information Technology, especially EMR, moving from “nice to have to need to have,” selecting the right EMR has become a mission critical business driver.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it
    
GE Healthcare

The Total Cost of Ownership of EHR in a Meaningful Use World

Published By: GE Healthcare     Published Date: Jun 04, 2014
The central theme of industry wide adoption of EHRs is based on the concept of “meaningful use,” which by design is a metric that will connect all the moving parts of this complicated initiative into a system that communicates and delivers high-grade electronic healthcare services. To qualify as a “meaningful user,” eligible providers must demonstrate use of a “qualified EHR” in a “meaningful manner.” It is a lofty and worthwhile goal. This white paper examines the total cost of ownership for “meaningful” EHR adoption in a physician practice.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it
    
GE Healthcare

Genesys SIP: Empowering Enterprise-wide Customer Service

Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s, enterprise applications, data center design and management
    
Genesys

Making AI Routine, Repeatable and Reliable

Published By: Gigaom     Published Date: Oct 07, 2019
While interest in Machine Learning/Artificial Intelligence/ (ML/AI) has never been higher, the number of companies deploying it is only a subset, and successful implementations a smaller proportion still. The problem isn’t the technology; that part is working great. But the mere presence and provision of tools, algorithms, and frameworks aren’t enough. What’s missing is the attitude, appreciation, and approach necessary to drive adoption and working solutions. To learn more, join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and panelists Jen Stirrup, Lillian Pierson, and special guest from Cloudera Fast Forward Labs, Alice Albrecht. Our panel members are seasoned veterans in the database and analytics consulting world, each with a track record of successful implementations. They’ll explain how to go beyond the fascination phase of new technology towards the battened down methodologies necessary to build bulletproof solutions th
Tags : 
    
Gigaom

Social Login 101

Published By: Gigya     Published Date: Jun 08, 2015
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than just a means to faster registration, and as a key for gaining access to rich, permission-based identity data that drives relevant user experiences. You’ll learn: About the state of social login and latest trends What benefits social login provides for users What value social login can bring to your business Best practices when implementing social login Case studies from leading brands that are using social login
Tags : 
social login, user experience, faster registration, social login benefits, best practices, enterprise applications
    
Gigya

TV Everywhere

Published By: Gigya     Published Date: Jun 08, 2015
As TV Everywhere (TVE) adoption rises alongside multi-device content consumption, media companies should look to revamp their engagement strategies. To engage with viewers across different devices, it’s important to have an in-depth understanding of how this process is spearheaded with user authentication, particularly via TVE.
Tags : 
tv everywhere, multi-device content consumption, engagement strategies, authentication process, tve benefits
    
Gigya

Cloud Computing and Web Application Performance: The Risks of Adopting The Cloud

Published By: Gomez IT     Published Date: Dec 04, 2009
Any business considering cloud computing to support its customer-facing Web applications must look beyond the cloud's cost savings and scalability and evaluate how cloud adoption will impact the end-user experience. This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to achieve world class Web performance and assist in the evaluation of cloud providers and development of cloud performance SLAs.
Tags : 
gomez, web performance, site performance, ecommerce, online shopping, web performance, customer service, ebusiness, business intelligence, configuration management, service oriented architecture
    
Gomez IT

BYOD Best Practices: a Practical Guide for Implementing BYOD Programs

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation, business technology, cloud computing
    
Good Technology Corporation

Survey Report: Behind The Growing Confidence In Cloud Security

Published By: Google     Published Date: Apr 30, 2018
"In a recent global survey conducted on behalf of Google Cloud in association with MIT SMR Custom Studio, respondents were asked: over the last two years, how has your overall confidence in the security of cloud applications and infrastructure changed? The response was encouraging. 74% of respondents have become more confident in cloud security. The age of unthinking fears about cloud security is over. Not only is cloud adoption rising steadily across geographies, industries and job functions, but confidence in cloud security is rising as well — to the point where increased security is a major reason enterprises opt for cloud solutions. Download this report and find out more."
Tags : 
    
Google

Creating World-Class Developer Experiences Inside the API Product Mindset

Published By: Google Apigee     Published Date: Feb 15, 2019
This is the age of API-driven businesses and enterprises need to create great developer experiences to build an ecosystem for their APIs. Many enterprises now view developers as one of the most essential actors in their value chains—the people who translate digital assets into digital experiences that move the business needle. Google Cloud’s new eBook, Creating World-Class Developer Experiences, takes a deeper look at creating world-class developer experiences. Learn about best practices for engaging developers and how to launch a developer portal that speeds adoption or your API products.. Explore how to delight developers and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices to delight developers and grow API programs ? Real-world use case: AccuWeather ? Developer experience checklist CTA: Download eBook
Tags : 
    
Google Apigee

Maximizing the Business Value of Digital Assets Through API Monetization

Published By: Google Apigee     Published Date: Mar 05, 2019
API monetization is a key way to unlock value from your API programs and increase API adoption. Monetization enables API providers to reach beyond current business models, scale API programs, and open new opportunities with customers, developers, and partners. Google Cloud’s new eBook, Maximizing the Business Value of Digital Assets Through API Monetization, maximizing the business value of digital assets via API monetization. Read the real-use cases and learn about best practices to realize additional value from your API products. Explore how to generate revenue from API products and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use case: Telstra ? API monetization checklist
Tags : 
    
Google Apigee

10-Point Checklist for Ensuring Self-Service BI Adoption

Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Encouraging self-service BI adoption is both a technical and a human resource effort. This white paper offers a 10-point checklist for improving this process, and includes these questions and more in this easy-to-read white paper.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.

The Internet of Things Deluge

Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software

IoT Risks & Rewards: What Every CXO Should Know

Published By: Great Bay Software     Published Date: Jan 24, 2018
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
iot, security, security systems, iot deployments
    
Great Bay Software

IoT Risks & Rewards: What Every CXO Should Know

Published By: Great Bay Software     Published Date: Apr 12, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
    
Great Bay Software

Using Secure IoT to Drive Business Growth

Published By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software

Using Secure IoT to Drive Business Growth

Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.