romi

Results 201 - 225 of 764Sort Results By: Published Date | Title | Company Name

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

Published By: Citrix NetScaler     Published Date: May 06, 2013
The Mobile future is here now and a network infrastructure that supports mobile initiatives needs to be flexible and scalable, while delivering uncompromised performance and security. With Citrix XenMobile MDM and Citrix NetScaler, IT can address the full range of enterprise mobility requirements. Here’s a guide to help ensure your enterprise mobile workers are empowered with the full mobility their work requires as well as the ability to use the device of their choice. Take advantage of a complete, robust platform that addresses the full range of mobile business requirements—simply and securely.
Tags : 
citrix xenmobile, citrix netscaler, mobility, delivery enterprise mobility, citrix, mobility, knowledge management, enterprise applications
    
Citrix NetScaler

Deliver Scalable VoLTE and Agile Rich Communications Services

Published By: Intel     Published Date: May 22, 2017
While holding the promise of HD quality, enriched services, and the benefits of a common packet switched access infrastructure, the adoption of infrastructure-based voice over LTE (VoLTE), along with rich communications such as video and real-time messaging, has stalled over the last few years with concerns around quality, security, and cost. During that time, the value of the phone number as a globally significant user ID and key services such as SMS and MMS have been relegated by phone manufacturers, over the top (OTT) services, and even the subscribers themselves as “technologies of last resort.” Finally, the proliferation of 4G, together with the emergence of network functions virtualization (NFV), powered by Intel®, Hewlett Packard Enterprise* (HPE), and Metaswitch*, is allowing network operators to take charge of the consumer’s communications experience, once more.
Tags : 
    
Intel

Delivering Information Faster: In-Memory Technology Reboots the Big Data Analytics World

Published By: SAP     Published Date: May 18, 2014
In-memory technology—in which entire datasets are pre-loaded into a computer’s random access memory, alleviating the need for shuttling data between memory and disk storage every time a query is initiated—has actually been around for a number of years. However, with the onset of big data, as well as an insatiable thirst for analytics, the industry is taking a second look at this promising approach to speeding up data processing.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP

Delivering on Promise of Digital Transformation

Published By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management, data center
    
BMC Software

Delivering on the Promise of a Great Customer Journey

Published By: Progress     Published Date: Jan 22, 2019
Immersive, engaging customer journeys have become competitive differentiators among today’s enterprises, with modern digital experience platforms powering these efforts. The right platform enables businesses to deliver highly personalized, omni-channel experiences and empowers organizations to craft the journeys customers want.
Tags : 
    
Progress

Delivering on the Promise of Virtualization

Published By: Cisco     Published Date: May 21, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
virtualization, cisco, data center, applications, private cloud, cloud computing, infrastructure, design and facilities
    
Cisco

Delivering on the Promise of Virtualization: Cisco Unified Computing System

Published By: Cisco     Published Date: Apr 08, 2014
The Cisco Unified Computing System™ (Cisco UCS®) delivers on the promise of virtualization with a single unified system that integrates a unified fabric, embedded management, and powerful servers with intelligent Intel® Xeon® processors.
Tags : 
cisco, virtualization, cisco inified computing system, best practices, customer interaction service, project management
    
Cisco

Delivering on the Promise of Virtualization: Cisco Unified Computing System

Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco

Delivering on the Promise of Virtualization: Cisco Unified Computing System

Published By: Cisco     Published Date: May 14, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
cloud computing, erp, productivity, applications, efficiency, unified computing, cisco, application integration, best practices, virtualization, infrastructure, design and facilities
    
Cisco

Delivering ROI with Data Protection, Challenging Times Demand ROI Focused Vendors

Published By: InMage     Published Date: Feb 18, 2009
During challenging economic times, companies are increasingly questioning every budget dollar they spend. Furthermore, companies are reviewing their core vendor relationships to assess which partnerships have lived up to their expectations vs. which have overpromised and under delivered.
Tags : 
inmage, roi, data protection, it spend management, drscout, storage replication, downtime, universal data protection, udp, continuous data protection, cdp, enterprise applications, data management, database development, data quality, database security
    
InMage

Dell EMC: Future-Proof Infrastructure

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
As IT demands mount, IT organizations simply no longer have the luxury of spending resources to verify every vendor promise. Systems just need to work, while delivering a future free from costly data migrations. As a response, IT vendors have begun to offer guarantees in performance, guarantees in data reduction rates, guarantees in data deduplication, or free upgrades. These programs, however, are often limited to a single storage or data protection product offering, typically with all-flash technology. Dell EMC solutions, powered by Intel® Xeon® processor goes one step further with a program that delivers a future-proof infrastructure promise that extends to its larger storage, hyperconverged, and data protection portfolio and provides support across both generational and architectural transitions.
Tags : 
    
Dell EMC Storage

Des experts en Sécurité Jouent Franc Jeu : le Compromis entre la Sécurité et les Performances du Rés

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security, anti spam, anti spyware, anti virus
    
McAfee

Design and Simulate without Compromise

Published By: AMD FirePro     Published Date: Apr 18, 2012
A comprehensive overview of the AMD FirePro and Solidworks relationship, highlighting the key selling points, benchmarks, case studies, customer references, and much more.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization, it management, knowledge management, enterprise applications, data management
    
AMD FirePro

Desktop Modernization eBook

Published By: VMware     Published Date: Oct 04, 2011
This eBook looks at the challenges involved in delivering and managing desktops, today and in the future. Its goal is to demonstrate how VMware desktop virtualization can deliver a solution to address the requirements of IT and end-users without compromise.
Tags : 
desktop management, technology, vmware, end-user, virtualization, data management, application integration, business intelligence, data protection, data quality, project management
    
VMware

DETECTING COMPROMISED CREDENTIALS WITH UEBA

Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam

Developing Inclusive Leaders

Published By: BetterUp     Published Date: Aug 14, 2018
"Company cultures that value and celebrate diverse perspectives not only support, engage and advance underrepresented groups, but also benefit by making better decisions and achieving broader innovation. We believe inclusion is a hallmark of strong leadership and should be a core skill for all leaders. Download our paper to learn: - Why most diversity and inclusion programs fall short on their promises - How to developing skills for inclusive workplace with BetterUp coaching - How BetterUp unlocks the potential of emerging leaders with career coaching to build leadership behaviors at scale"
Tags : 
human resource technology
    
BetterUp

Developing Inclusive Leaders

Published By: BetterUp     Published Date: Dec 05, 2018
Company cultures that value and celebrate diverse perspectives not only support, engage and advance underrepresented groups, but also benefit by making better decisions and achieving broader innovation. We believe inclusion is a hallmark of strong leadership and should be a core skill for all leaders. Download our paper to learn: - Why most diversity and inclusion programs fall short on their promises - How to develop skills for inclusive workplace with BetterUp coaching - How BetterUp unlocks the potential of emerging leaders with career coaching to build leadership behaviors at scale
Tags : 
    
BetterUp

Developing Software in a Multicore & Multiprocessor World

Published By: Klocwork     Published Date: May 11, 2011
This technical white paper looks at the issues of developing for multicore and multiprocessor environments in detail, explains how static analysis can be used to address them, and walks through two examples of these issues in prominent open source projects.
Tags : 
klocwork, software development cycle, multiprocessor, open source, processor architecture, database development, software outsourcing, web development
    
Klocwork

Developing, Deploying, and Delivering Web API's

Published By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web API’s provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing, mobile data system, wireless application software, content integration, application integration, content delivery, edi, networking
    
StrikeIron

DEVOPS AND SECURITY: TOO LITTLE, TOO LATE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard

Die Herausforderung „Endgerätesicherheit“ meistern

Published By: McAfee EMEA     Published Date: Mar 20, 2018
Bedrohungsvektoren entwickeln sich stetig weiter. In dieser Situation müssen IT-Sicherheitsentscheider effektive Lösungen für die Sicherheit von Endgeräten finden. Bei mehr als zwei Drittel der Unternehmen wurden im vergangenen Jahr sensible Daten kompromittiert. Die Reaktion auf solche Vorfälle ist mit großem Zeit- und (manuellem) Arbeitsaufwand verbunden – und selbst damit lassen sich die Probleme häufig nur für einen Teil der Endgeräte lösen. Sicherheitsentscheider wünschen sich deshalb integrierte Lösungen, die bei allen eingesetzten Endgerätetechnologien für mehr Effizienz, Übersicht und Schutz sorgen. Im Januar 2017 beauftragte McAfee Forrester Consulting, gängige Tools und Strategien für das Endgeräte-Sicherheits-Management sowie deren wahrgenommene Effektivität zu evaluieren.
Tags : 
    
McAfee EMEA

Digital Marketing's Creative Promise

Published By: Adobe     Published Date: Feb 10, 2016
This whitepaper reveals the strategies can help you channel digital marketing creativity into business revenue. Use it as a guide for building your brand’s creative dividends, and discover new ways to win your customers’ hearts, minds and wallets.
Tags : 
digital marketing, marketing creativity, creativity and innovation, customer relationship management, customer satisfaction, customer experience management
    
Adobe

Digital Marketing’s Creative Promise

Published By: Adobe     Published Date: Feb 08, 2016
Digital Marketing’s Creative Promise, a new Adobe white paper, shows you the link between creativity and profits. Learn how to make your brand’s creativity shine and business revenue soar.
Tags : 
adobe, marketing, creative, digital, profit, brand identity, roi, enterprise applications, business technology
    
Adobe

Discovering Vulnerable Web Applications

Published By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : 
qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime, hacking breaches, security, application security, web application security, risk management, robustness, scanning, cloud platform, hacker detection, internet security, security management, cloud computing
    
Qualys

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.