devices

Results 51 - 75 of 1772Sort Results By: Published Date | Title | Company Name

Building modern applications with Linux and containers ebook

Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat

Citrix and Cisco: Discover The Keys To a Modern Digital Platform

Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation

Abandoning the Perimeter Mindset

Published By: Zscaler     Published Date: Jun 19, 2019
You can’t impose controls on something you don’t own. And in today’s cloud- and mobile-oriented enterprise, no one truly owns the network. The Internet has become the one network that every corporate worker uses and that no corporate IT can control. The emergence of cloud, ubiquitous networks, smartphones and smart (or dumb) networked devices are wreaking havoc over the traditional command-and-control IT mode of operation. This shift is different from anything we’ve experienced before, because nobody owns the network.
Tags : 
    
Zscaler

Why Road User Charging Systems Need a More Intelligent Distributed IoT Solution

Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless

How Dartmouth College improved its campus-wide Wi-Fi

Published By: Mist Systems     Published Date: Jun 19, 2019
With a surge of 25,000 devices and counting, Dartmouth College needed its new Wi-Fi to be fast, reliable and as smart as its students. In response, Dartmouth, based in Hanover, N.H., began deploying new campus-wide Wi-Fi from Mist Systems last summer. It expects to complete the project throughout the campus in three to five years, according to Bryan Ward, a network engineer at Dartmouth. The IT department manages the Wi-Fi through a cloudbased wireless LAN and can already see the benefits of better coverage and easier management. But the team faced difficulties when embedding the new system with Dartmouth's centuries-old campus architecture, which is less supportive of campus-wide Wi-Fi than modern architecture. The following interview has been edited for length and clarity.
Tags : 
    
Mist Systems

Retail and E-Commerce Industry Spotlight

Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace

Industry Spotlight: Cyber Defense for Oil and Gas

Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace

SANS Whitepaper: Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon

ESG Lab Validation: Forcepoint CASB

Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint

A Guide to Scaled DevOps

Published By: Ahead     Published Date: Jun 05, 2019
Digital Business Demands Better Software, Faster In your organization, you’ve probably heard questions like these asked of the application development and/or infrastructure and operations organizations. > Why can’t our software development teams keep up with new business requirements? > Why are we always waiting on infrastructure teams? > Why do our business initiatives become outdated before their required software is even deployed? > Is our software development team aligned with corporate goals like engaging younger consumers on their mobile devices?
Tags : 
    
Ahead

Privileged Access Threat Report 2019

Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust

Safety First: The Face of Cybersecurity in Today's Workplace

Published By: HP Inc.     Published Date: Jun 03, 2019
As the changing workforce puts pressure on companies to adopt the use of mobile and personal devices, significant business trends, such as data analytics, the digitization of business functions and the blending of service offerings across industries, are also expanding the use of technologies. This expansion increases the boundaries of what’s possible, and it also creates risks.
Tags : 
    
HP Inc.

Best Next Action Technology for Telecommunications

Published By: FICO EMEA     Published Date: May 31, 2019
The telecommunications market is highly saturated. In most of the developed world, nearly everyone who wants a mobile phone has one. There are opportunities for carriers to increase service usage or upsell customers on higher-value devices or services, but each new account generally comes at a competitor’s expense—so customer retention is crucial. Telecom service providers need to reduce losses, prevent churn and maximise revenue on their offerings. FICO’s Best Next Action™ technology can be an important tool to achieve all of these objectives, either by presenting new offer terms or cross-selling other products and accessories to enhance the customer’s telecommunications experience—the handset upgrade, better financing terms, insurance on the handset or a subscription service for content. o Prevent account churn o Optimise service utilisation o Segment accounts o Tailor the contact method to the account
Tags : 
telecommunications, advanced analytics, telco, customer retention
    
FICO EMEA

Telco Research Report: Smart Analytics Pay Dividends Across the Customer Lifecycle

Published By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA

ERP Cloudification

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

The Business Case for SSL/TLS Encryption Orchestration

Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd

The Business Case for SSL/TLS Encryption Orchestration

Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 25, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA

Take your security to new heights: The Cloud

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed.
Tags : 
    
Cisco Umbrella EMEA

Insurance Blueprint

Published By: Equinix EMEA     Published Date: May 22, 2019
This document outlines how Insurance providers must optimize and scale for policy collaboration in a rapidly changing, omni-channel environment while shifting to providing new types of digital insurance. Additionally, shifting demographics is transforming interaction between insurance providers, reinsurers and customers. To address, Insurance providers must move to the digital edge adjacent to customers, clouds, partners and remote devices.
Tags : 
    
Equinix EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.