hi def

Results 526 - 550 of 1119Sort Results By: Published Date | Title | Company Name

Intelligence and speed drive 2019 tech trends

Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

Intent-Based Networking in the limelight with Cisco's Launch of Catalyst 9000 Series Ethernet Switch

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA

Intent-Based Networking Taxonomy

Published By: Apstra     Published Date: Aug 19, 2019
The response to the question “How is one Intent-Based Networking offering different than the others?” typically sounds subjective, descriptive, and open to interpretation. What is needed is a tangible, objective, and fact-based nomenclature that can help you rationalize the maturity of Intent-Based Networking solutions. Using this nomenclature, we should be able to map Intent-Based Networking solutions to a specific maturity level, starting with Level 0 (low maturity/incomplete) up to Level 3 which enables a fully capable Intent-Based Networking solution (mature/complete). Apstra introduced the notion of Intent-Based Networking and Self-Operating Networks™ in June of 2016, and in our blog “Intent Based Networking: What Is It” we provided a definition of Intent-Based Networking, listing capabilities that a complete Intent-Based Networking system needs to provide. The goal is to categorize maturity levels of various Intent-Based Networking implementations and enable network operators to
Tags : 
    
Apstra

Intercom on Customer Engagement Book

Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom

Intermedia's Dedicated Exchange powered by AWS

Published By: Intermedia     Published Date: Mar 01, 2016
This is a practical guide to implementing Intermedia’s Dedicated Hosted Exchange on AWS. What’s inside this guide: • A definition of Dedicated Cloud and its main benefits • Details of Intermedia’s Dedicated Exchange powered by AWS • The main benefits of the AWS platform for your business email • How can you get the cloud on your terms and not on a vendor’s terms • Steps to implement Intermedia’s Dedicated Exchange on AWS
Tags : 
    
Intermedia

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy
    
Iovation

Internet of Everything Transformation in Defense

Published By: Cisco     Published Date: Sep 16, 2015
Internet of Everything is driving transformation.
Tags : 
transformation, network, dod, application integration, business integration, business intelligence, productivity
    
Cisco

Internet of Everything Transformation in Defense

Published By: Cisco     Published Date: Nov 18, 2015
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
transformation, network, dod, networking, it management
    
Cisco

Internet of Everything Transformation in Defense

Published By: Cisco     Published Date: Jul 11, 2016
Transformation doesn’t happen overnight. It takes time, commitment, and an understanding of the operational mission. Today, the Internet of Everything (IoE) is driving transformation by securely extending the network to the tactical edge and providing the Department of Defense (DoD) unprecedented access, agility, and capability.
Tags : 
    
Cisco

Introduction To Business Process Management (BPM)

Published By: Lombardi Software     Published Date: Dec 07, 2006
For those individuals or organizations that are being asked to investigate process improvement, Business Process Management (BPM) is a term that frequently associated with the process improvement. This paper defines BPM and explains how it can be applied to help companies achieve process improvement goals.
Tags : 
bpm, business process management, process improvement, productivity, business management, work smarter, lombardi, lombardi software
    
Lombardi Software

Introduction to Integrated Marketing: Lead Scoring

Published By: Act-On     Published Date: Aug 18, 2014
Lead scoring is a key missing link in many B2B marketing strategies. A growing number of B2B marketers understand this vital role lead scoring plays in the marketing process. Yet they still face challenges getting started with lead scoring and learning how to generate a measureable ROI from their efforts. In this whitepaper you will learn seven foundational steps your company can take to set up a functional and cost-effective lead scoring strategy. These include understanding the fundamentals of lead scoring; learning how to identify the traits that define your ideal sales prospects; and building a system that will grow with your organization over time.
Tags : 
act-on, marketing, integration, lead scoring, b2b, strategy, roi
    
Act-On

Intrusion Defense: Is Your Castle Protected?

Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter

IPAM Intelligence: All Roads Lead to Proteus

Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat

Is There a Better Way to Manage Product Development Projects?

Published By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : 
product development, engineering, companies, plm, product lifecycle management, market, designs, budget
    
Dassault Systèmes

Is Your Data Center Being Overwhelmed By Rapidly Converging Technologies?

Published By: IBM     Published Date: Oct 06, 2015
An IBM infographic highlighting the infrastructure implications of today’s converging technology forces and the software defined, data center transformation essential to capitalizing on them.
Tags : 
ibm, data center, software defined data center, data center transformation, it management
    
IBM

Is Your R&E Network Ready for the Great Surge?

Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena

Is Your R&E Network Ready for the Great Surge?

Published By: Ciena     Published Date: Jun 12, 2017
What if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena

Is your site trusted by every visitor on every page, every time? Thawte

Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert

Is your site trusted by every visitor on every page, every time? Digicert

Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert

Is your site trusted by every visitor on every page, every time? Geo Trust

Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert

Is your site trusted by every visitor on every page, every time? Symantec

Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions

Published By: Cisco     Published Date: Mar 15, 2011
This document explores the environmental uses of job scheduling (batch processing) and RBA (IT process automation) and defines the conditions for choosing one solution over another. This document also notes when it is appropriate to run a combination of both to gain immediate benefits for business operations and continuity.
Tags : 
cisco, it automation, job scheduling, run book automation, batch processing, process automation, continuity, business continuity
    
Cisco

IT Service Management Blueprint: Consumerize the User Experience

Published By: ServiceNow     Published Date: Jan 17, 2017
A self-service experience helps IT and business users do more, and do it better, at a lower cost This eBook, “Consumerize the User Experience,” distills insights from the ServiceNow user community that can help you rapidly deploy an improved self-service experience while maximizing your short, medium, and long-term benefits. Learn best practices to: • Create a self-service portal where users can report issues, make requests, ask questions, and check request status • Define the service catalog to accurately reflect details of supported services, such as: scope, cost, service level agreements (SLAs), dependencies, and more • Automate knowledge sharing for better service and less hunting for information
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management
    
ServiceNow

IT Service Management Blueprint: Define Your Services for Fast and Accurate Service Delivery

Published By: ServiceNow     Published Date: Jan 17, 2017
Provide better IT service delivery, more consistently, and with less effort This eBook, “Define Your Services for Fast and Accurate Service Delivery,“ shows you: A simple plan for defining and managing your services and building your single system of record in a CMDB Best practices for incident, change, problem and asset management, reporting, and more How to prevent unexpected downtime creating a comprehensive, connected view of business services and IT Infrastructure
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management
    
ServiceNow
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.