host

Results 1 - 25 of 761Sort Results By: Published Date | Title | Company Name

Consideration Report: Reap the Full Potential of Workload Mobility within the Cloud and Data Center

Published By: Intel     Published Date: Nov 14, 2019
You can migrate live VMs between Intel processor-based servers but migration in a mixed CPU environment requires downtime and administrative hassle A study commissioned by Intel Corp. One of the greatest advantages of adopting a adopting a public, private, or hybrid cloud environment is being able to easily migrate the virtual machines that run your critical business applications—within the data center, across data centers, and between clouds. Routine hardware maintenance, data center expansion, server hardware upgrades, VM consolidation, and other events all require your IT staff to migrate VMs. For years, one powerful tool in your arsenal has been VMware vSphere® vMotion®, which can live migrate VMs from one host to another with zero downtime, provided the servers share the same underlying architecture. The EVC (Enhanced vMotion Compatibility) feature of vMotion makes it possible to live migrate virtual machines even between different generations of CPUs within a given architecture.
Tags : 
    
Intel

How Live Stream Chat Is Redefining Media Consumption and Social Engagement

Published By: SendBird     Published Date: Nov 14, 2019
Media brands are beginning to see that while their content generates excitement, all of their audience engagement takes place on external platforms. As a result, companies such as Facebook and Twitter control the audience’s experience — and reap the many benefits of hosting conversations and interactions surrounding content they did not create. For customers, this fragmented landscape creates a disjointed user experience because they’re forced to constantly switch between applications and risk missing the action in the process. They use one app to consume content, another app to discuss with friends, and yet another app to chat with the broader community.
Tags : 
    
SendBird

Enabling growth & service excellence by out-tasking data center operations

Published By: Schneider Electric     Published Date: Nov 13, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: Overcome the worldwide shortage of experienced data center professionals Understand how out-tasking data center operations can benefit you & your clients Identify key characteristics of a strong data center operations partner
Tags : 
data center,  business growth,  schneider electric
    
Schneider Electric

Point-of-Sale Systems for the Cloud-Enabled Food Service Market

Published By: Heartland     Published Date: Nov 08, 2019
Download this whitepaper to learn how to bring the food service industry into the 21st century with advanced hosted point-of-sale (POS) systems.
Tags : 
    
Heartland

Webinar: Proving the Value of an ERM Program

Published By: Resolver     Published Date: Nov 01, 2019
As risk professionals, you’re tasked with the responsibility to minimize and mitigate risk, all while battling skeptical and reluctant executives for increased budget and more resources. The risk management paradox is a tough pill to swallow. When you’re doing your job well, nobody notices. And when something goes wrong, you’re the scapegoat. So, how do you prove the value of something not happening? In partnership with The Risk Management Society (RIMS), Resolver hosted a webinar to answer questions many risk managers struggle with: - How do you prove the value of an ERM program? - Who is ultimately responsible for risk management? - What metrics and KRIs should you track to measure the impact of your ERM program? - How do you encourage risk-based decision making across the enterprise? - How can technology be leveraged to maximize the value of an ERM program? Complete the form for access to the full webinar video that will help your team make the case for an ERM program.
Tags : 
    
Resolver

Secrets To A Stronger Strategy For Container Security

Published By: Alert Logic     Published Date: Oct 25, 2019
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host. Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include: • Planning for maximum portability • Setting permissions for users and system resources • Creating an action plan based on log monitoring and IDS data
Tags : 
    
Alert Logic

Next Generation Software Asset Management

Published By: ServiceNow     Published Date: Oct 24, 2019
Organizations spend a huge amount of money on enterprise software. Software asset management (SAM) practitioners still wrestle with time?consuming, inaccurate manual processes hosted in spreadsheets or legacy SAM tools. Fortunately, next?generation IT asset management solutions are starting to replace traditional SAM tools.
Tags : 
servicenow, asset, management, sam, spreadsheets, enterprise
    
ServiceNow

Osterman Research: Ten Questions to Ask About Your Office 365 Deployment

Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast

Optimizing delivery logistics for peak demand

Published By: HERE Technologies     Published Date: Sep 30, 2019
Let’s face it, consumers are addicted to fast delivery. As delivery windows continue to shrink, demand is only growing stronger. The pressure is on for online food delivery and e-commerce companies to consistently meet these ever-tightening deadlines and keep customers happy and loyal. But what happens to your ETAs when a snowstorm strikes? Or a restaurant in your market hosts a promotion that causes demand to spiral out of control? Don’t let times like these send you scrambling to stay ahead of peak demand. Drive down click-to-door times by discovering: The role location technology plays in food and e-commerce delivery The benefits of dynamic routing How to stay ahead of predictable and unpredictable peak demand
Tags : 
    
HERE Technologies

SD-WAN Buyer’s Guide

Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks

IDC Paper - Three Keys to Maximize Application Migration and Modernization Success

Published By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
'Make your Cloud Migration and Application Modernization an Ongoing Success: The drivers for cloud migration and application modernization have long been cost savings and total efficiency. While that still remains the case, an increase business agility, innovation and overall performance have become goals for strategic organizations. Learn the importance of an effective cloud strategy and how to efficiently manage different hosting environments for your applications. IBM’s cloud application migration and modernization services can help your business establish and nurture an ongoing, successful cloud solution.
Tags : 
    
Group M_IBM Q4'19

Optimizing delivery logistics for peak demand

Published By: HERE Technologies     Published Date: Sep 26, 2019
Let’s face it, consumers are addicted to fast delivery. As delivery windows continue to shrink, demand is only growing stronger. The pressure is on for online food delivery and e-commerce companies to consistently meet these ever-tightening deadlines and keep customers happy and loyal. But what happens to your ETAs when a snowstorm strikes? Or a restaurant in your market hosts a promotion that causes demand to spiral out of control? Don’t let times like these send you scrambling to stay ahead of peak demand. Drive down click-to-door times by discovering: • The role location technology plays in food and e-commerce delivery • The benefits of dynamic routing • How to stay ahead of predictable and unpredictable peak demand
Tags : 
    
HERE Technologies

The Benefits of Edge Cloud On-Ramps for CSPs & End Users

Published By: Data Center Frontier LLC     Published Date: Sep 24, 2019
Enterprise applications are moving to the cloud, and for good reasons: The cloud offers a host of potential benefits for both small & mid-sized businesses and large enterprises. These benefits include lower costs, scalable and flexible deployment options, lower capital spending, and access to innovative applications. Communications Service Providers (CSPs), meanwhile, see more opportunities to offer more bandwith to businesses within their footprint.
Tags : 
    
Data Center Frontier LLC

Unifying Analytics Across Warehouse, Lake and Into the Cloud

Published By: Gigaom     Published Date: Sep 16, 2019
We’ve heard it before. A data warehouse is a place for formally-structured, highly-curated data, accommodating recurring business analyses, whereas data lakes are places for “raw” data, serving analytic workloads, experimental in nature. Since both conventional and experimental analysis is important in this data-driven era, we’re left with separate repositories, siloed data, and bifurcated skill sets. Or are we? In fact, less structured data can go into your warehouse, and since today’s data warehouses can leverage the same distributed file systems and cloud storage layers that host data lakes, the warehouse/lake distinction’s very premise is rapidly diminishing. In reality, business drivers and business outcomes demand that we abandon the false dichotomy and unify our data, our governance, our analysis, and our technology teams. Want to get this right? Then join us for a free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guest, Dav
Tags : 
    
Gigaom

Petróleo e Gás na América Latina

Published By: TIBCO Software     Published Date: Sep 16, 2019
A indústria de petróleo está sendo transformado de maneira dinâmica graças ao poder de conexão da Internet, aos avanços nos sensores conectados remotamente e às possibilidades que o machine learning e a inteligência artificial (IA) oferecem. À medida que a busca por hidrocarbonetos e fontes alternativas de energia se estende a ambientes mais profundos e hostis, operadores, empresas de serviços e proprietários de ativos estão aproveitando os avanços tecnológicos para garantir que seus funcionários estejam mais seguros, seus campos sejam mais produtivos e seus ativos operem com eficiência máxima.
Tags : 
    
TIBCO Software

Activos inteligentes conectados

Published By: TIBCO Software     Published Date: Sep 16, 2019
La industria petrolera se está transformando de manera dinámica gracias el poder de conexión del Internet, los avances en sensores remotos conectados, y las posibilidades que ofrece el machine learning y la inteligencia artificial (IA). A medida que la búsqueda de hidrocarburos y fuentes de energías alternativas se amplía a entornos más profundos y hostiles, los operadores, las compañías de servicios y los propietarios de los recursos están aprovechando los avances tecnológicos para garantizar que sus empleados estén más seguros, sus campos sean más productivos y sus activos fijos estén operando a su máximo nivel de eficiencia.
Tags : 
    
TIBCO Software

Building Secure Applications: Recommendations for Financial Services

Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx

Threat Landscape - How to predict, spot and mitigate threats

Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA

Empowering QuickBooks Desktop Clients with Cloud Hosting

Published By: Right Networks     Published Date: Aug 13, 2019
For Denise Bailey, Principal at Elliot Davis, staying on top of the latest accounting technologies is a critical component of her job – and one that she’s extremely passionate. When evaluating new technologies, Denise puts a premium on security, customer service, and a flexible integrations environment. Read the full story to learn how the firm and its QuickBooks Desktop Enterprise clients have benefited from anytime/anywhere access and enhanced security with a cloud hosting.
Tags : 
    
Right Networks

How You Can Overcome Insurance Fraud in the Digital Age

Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation

A CPG major achieved 30% improvement in task completion rate

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
One of the largest consumer product goods conglomerates wanted their entire platform to be re-hosted, and also enhance its storage and stability. The LTI-developed Cloud Native app on Azure PaaS also helped drive the business value for sourcing through the integration of S2P transformation. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)

Electro Mobility in the Cloud Era - Live Event Q&A

Published By: Dassault Systèmes     Published Date: Jun 11, 2019
Q&A from Electro Mobility in the Cloud Era Event. Deep dive with industry-leading speakers to discover in depth answers to compelling questions from the event which was hosted on May 28th.
Tags : 
    
Dassault Systèmes

Building greater trust in your data

Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle

Building greater trust in your data

Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle

Privileged Access Threat Report 2019

Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.