research

Results 476 - 500 of 2523Sort Results By: Published Date | Title | Company Name

CITO Research: Buyer's Guide to Big Data Integration

Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho

Citrix named a leader in the Gartner Magic Quadrant for ADCs.

Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix is positioned in the Leaders Quadrant for Application Delivery Controllers for the eighth consecutive year: the Gartner Magic Quadrant Report focuses on vendor's ability to solve complex application deployment challenges. Don't miss this chance to learn from Gartner's independent research. — Read the report today!  Compliments of Citrix.
Tags : 
application, deployment, research, enterprise, data center, controller, network, security, cloud, virtualization, platform, performance, scalability, enterprise applications
    
Citrix Systems

Citrix version: The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering

Published By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, that’s welcome news among IT leaders.
Tags : 
    
Citrix Systems

Clabby:A Comparison of IBM’s Flex Sys Environments to Traditional Blade Architectures

Published By: IBM     Published Date: Jan 09, 2014
In this Research Report, Clabby Analytics takes a closer look at IBM’s Flex System converged architecture. The new Flex System’s advanced blade offering shines compared to its closest rival: traditional blade architecture. Flex System offers superior manageability, faster communications, more storage capacity (using up to eight internal solid state drives [SSDs] per compute node) and better storage management — as well as broader/better physical/virtual system management — than all of today’s leading blade competitors.
Tags : 
clabby analytics, ibm, flex system, architecture, blade architecture, puresystems, pureflex, virtualization, blade servers, storage management, storage virtualization, cloud computing
    
IBM

Clearing the Network Hurdle to Cloud Deployment

Published By: XO Communications     Published Date: Jul 22, 2014
IT departments are jazzed about cloud services, which promise fast deployments and major cost savings. But is the cloud actually delivering on these promises? Now that more enterprises have cloud experience under their belts, IDG Research Services decided to find out.
Tags : 
xo communications, cloud services, cloud computing, cloud applications, wan, wide area network, cloud networking, ip networks, tcp/ip protocol, wide area networks, wireless infrastructure
    
XO Communications

Client-Driven Redesign of Mainframe Performance

Published By: IBM     Published Date: Nov 09, 2012
This research report looks at the client driven redesign of mainframe performance and availability monitoring. Clabby Analytics also got the opportunity to review IBM's new OMEGAMON V5 mainframe which has improved it's features.
Tags : 
omegamon v 5.1, ibm, mainframe, analytics, it architecture, enterprise applications, data management, business technology
    
IBM

Cloud 2.0 - Catch the Next Wave with a Hybrid Multi Cloud Strategy

Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC

Cloud Business Email Market Quadrant

Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services, security, deployment, it management, platforms, email security, messaging, cloud computing, business technology
    
SilverSky

Cloud Business Email: The Market Leaders

Published By: SilverSky     Published Date: May 22, 2014
Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.
Tags : 
silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services, ibm softlayer, content delivery, messaging, cloud computing, business technology
    
SilverSky

Cloud Computing and Application Performance Management

Published By: CA Service Assurance     Published Date: Sep 16, 2010
CA Technologies Newsletter featuring Gartner Research. This publication, enhanced by Gartner research, reveals how to take a proactive IT approach which ensures visibility and control during the adoption of virtualization and cloud environments.
Tags : 
apm, application performance, ca technologies, service delivery, application delivery, user experience, gartner, business services, application integration, application performance management, business integration, ebusiness, service management, cloud computing
    
CA Service Assurance

Cloud Confidence (benchmark) Tool

Published By: Oracle     Published Date: Mar 01, 2019
Are you Cloud-Confident? Take five minutes and find out how you compare with your peers. Recent research conducted by Longitude looked at how companies are using cloud, and where it is delivering the greatest benefits. We've benchmarked some of the results in this short assessment tool. Are you ahead of the curve, or do you need to catch up?
Tags : 
    
Oracle

Cloud Mobile Development: Enabled By Back-End-As-A-Service, Mobile's New Middleware

Published By: Salesforce.com     Published Date: Apr 16, 2013
Successful mobile apps, especially enterprise mobile apps, typically need to interact with a well-architected set of back-end services, but most mobile app developers are more skilled at client-side front-end development. Enter mobile back-end-as-a-service (BaaS), a new set of hosted platforms that addresses the gap between front-end development proficiency and back-end infrastructure requirements. Enterprise-class back-end-as-a-service addresses scalability while providing an integration platform into existing enterprise services. Use this research as your guidebook to navigating the emerging BaaS landscape.
Tags : 
cloud mobile development, applications, baas, back end as a service, mobile application development, apps, mobile applications, enterprise, scalability, mobile computing, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, application integration, application performance management, best practices
    
Salesforce.com

Cloud Security 2017 Spotlight

Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9

Cloud Security Report: Research on the Evolving State of Cloud Security for SMB Enterprises

Published By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : 
cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
Singlehop

Cloud Skills and Organizational Influence

Published By: Microsoft     Published Date: Jul 20, 2018
Cloud is becoming an essential ingredient to a successful IT infrastructure. Recent research by IDC has identified how the growth of cloud as a computing platform has magnified the importance of cloud skills to the success of the enterprise. Moreover, it is becoming clear that IT professionals with cloud skills are strongly influencing both the type of cloud infrastructure and the ultimate pace of adoption of cloud. This puts IT professionals with cloud skills in the driver's seat of their own career. In fact, IT professionals with certifications related to cloud development and operations have dramatically more influence over their organizations' adoption and expansion of cloud services than otherwise similar IT professionals have over the adoption of other types of technical solutions. Cloud skills accelerate the success and career path of IT professionals. The impactful cloud roles are diverse: Multicloud or hybrid cloud management, workload-centric management, and DevOps illustrate
Tags : 
    
Microsoft

Cloud(n): Innovative IaaS Public Cloud Services Backed by NTT and Built on Citrix CloudPlatform

Published By: Verio     Published Date: Aug 06, 2014
Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. • Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. • Using NTT’s vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. • Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. • The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. • ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).
Tags : 
ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws, free bandwidth, ease-of-use, templates, cloud services, portal, load balancing, auto scaling, monitoring, 24/7 support, affordable, 99.99% reliability, web services
    
Verio

CMDB Adoption in the Real World: Just How Real Is It?

Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway, governance, infrastructure
    
Tideway Systems

Collaborative Efforts: Survey Reveals Clear Business Acceleration Using On-Demand Collaboration Tech

Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx

Combat the Latest Security Attacks With Global Threat Intelligence

Published By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, it security, vulnerability management, virus protection, spyware protection, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, data loss prevention
    
IBM

Combat The Latest Security Attacks With Global Threat Intelligence

Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security, security, data quality, database security
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Apr 04, 2016
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x-force, ibm security portfolio, threat intelligence, security, knowledge management, enterprise applications
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : 
ibm, security, ibm x-force, threat intelligence, enterprise applications, business technology
    
IBM

Commerce Anywhere: A Business and Technology Strategy to Maximize Cross-Channel Commerce Growth

Published By: Oracle     Published Date: Feb 03, 2012
This white paper details a commerce-anywhere approach that encourages businesses to extend their concept of the research and purchase process beyond individual transactions.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management, knowledge management, enterprise applications
    
Oracle

Communications Breakdown: Broadband &Telco Providers Need To Embrace Innovative Services

Published By: Pega     Published Date: Apr 04, 2016
Technology is empowering today’s consumers like never before. Consumers are getting used to buying, communicating and interacting with service providers whenever and however they want. Downtime is unacceptable and as a result broadband and telco providers are constantly put to the test with regards to customer service. There is an enormous disconnect between what customers expect and what broadband and telco providers are actually providing. All customers want to be understood as individuals, but this need is not always being met. Moving forward, broadband and telco providers need to differentiate themselves and provide innovative solutions in order retain as well as gain new customers. It is no surprise that nearly half of broadband/Telco providers believe customer service is a critical competitive differentiator. Download this research study and learn how broadband and telco providers can improve customer service.
Tags : 
    
Pega
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.