bi applications

Results 1 - 25 of 1319Sort Results By: Published Date | Title | Company Name
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
     F5 Networks Singapore Pte Ltd
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
     CloudHealth by VMware
By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
La combinaison de Citrix Networking et de Google Cloud aide le service informatique à relever plusieurs défis pour la fourniture et la gestion des applications. Voici comment: Gérer un cloud hybride Déplacer les charges de travail sur site et héritées Fournir une mise en réseau native sur le cloud pour les microservices et les applications de conteneur Améliorer les performances pour l'accès à distance aux ressources du cloud Fournir un accès utilisateur intégré
Tags : 
     Cisco and NVIDIA Corporation
By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
Le Big Data et les charges analytiques constituent une nouvelle frontière pour les entreprises. Les données collectées émanent de sources inexistantes il y a 10 ans. Les données des smartphones, celles générées par des machines et par les interactions avec les sites web sont collectées et analysées. De plus, dans un contexte où les budgets IT sont déjà sous pression, les empreintes Big Data s’étendent et posent d’énormes problèmes de stockage. Ce livre blanc délivre des informations sur les problématiques liées aux applications Big Data pour les systèmes de stockage et explique en quoi le choix de la bonne infrastructure de stockage peut rationaliser et consolider les applications d’analyse du Big Data sans faire sauter la banque.
Tags : 
     Infinidat EMEA
By: Alert Logic     Published Date: Oct 25, 2019
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host. Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include: • Planning for maximum portability • Setting permissions for users and system resources • Creating an action plan based on log monitoring and IDS data
Tags : 
     Alert Logic
By: SDL     Published Date: Sep 20, 2019
Component Content Management: A New Paradigm in Intelligent Content Services While technology has changed the world, the way that companies manage information has inherently stayed the same. The advent of near-ubiquitous connectivity among applications and machines has resulted in a data deluge that will fundamentally alter the landscape of content management. From mobile devices to intelligent machines, the volume and sophistication of data have surpassed the ability of humans to manage it with outdated methods of collection, processing, storage, and analysis. The opportunity afforded by the advent of artificial intelligence (AI) has stimulated the market to search for a better way to capture, classify, and analyze this data in its journey to digital transformation (DX). The paradigm of document-based information management has proven to be a challenge in finding, reusing, protecting, and extracting value from data in real time. Legacy systems may struggle with fragmented information
Tags : 
     SDL
By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
     MicroStrategy
By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills. Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
     MicroStrategy
By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
     MicroStrategy
By: MicroStrategy     Published Date: Nov 08, 2019
Mobile devices are part of nearly everything we do in life. Two-thirds of the world's population is connected via one of these devices; in 2020 there will be 6.95 billion mobile users worldwide, according to Statista forecast. Apple iOS and Google Android mobile devices provide on-the-go access to the vast array of applications and information that people have come to rely on. In the next decade the use of mobile devices gain intelligence likely will significantly change how an organization does its work.
Tags : 
     MicroStrategy
By: Masergy     Published Date: Nov 04, 2019
Driven by the need to save money, improve agility, and take rapid advantage of emerging technologies to improve internal collaboration and customer engagement, organizations are quickly adopting Unified Communications-as-a-Service (UCaaS) and Contact Center as a Service (CCaaS). UCaaS and CCaaS enable businesses to deliver a modern communications environment, without large capital investment, and in a manner that provides for rapid scaling, easy expansion into new sites and geographies, and deployment flexibility. Unfortunately, many enterprise networks are not optimized to deliver the performance and reliability required to support cloud-based applications, including UCaaS and CCaaS. As a result, IT leaders are rapidly adopting Software-Defined Wide-Area Network (SD-WAN) technologies. With SD-WAN’s ability to virtualize underlying network services and to build enterprise-grade WANs using both public (Internet) connectivity and private WAN connectivity, IT leaders can leverage it to su
Tags : 
     Masergy
By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : cloud computing, technology, virtela, device management, christian kane, mobility management, research
     Virtela Communications, Inc.
By: S & C Electric Company     Published Date: Jan 26, 2015
As discussion around development of a smart grid has steadily increased, so too has talk about smart microgrids. A critical ingredient for smart microgrids is energy storage. Energy storage can play a major role in facilitating use of renewable energy resources to power microgrids, while also protecting power stability and reliability within the microgrid. Energy storage technology has advanced significantly in recent years, and the latest technology holds many promising benefits for microgrid applications. In fact, these new energy storage technologies require a complete rethinking of what microgrids are capable of doing. This paper will review the impact of energy storage on smart microgrids, and will also look at a few real-world applications of energy storage within a microgrid.
Tags : 
     S & C Electric Company
By: MuleSoft     Published Date: Jun 27, 2019
As the leading CRM system, Salesforce can accelerate and increase sales, enhance customer loyalty, and grow marketing capabilities. But how can businesses extend Salesforce to streamline business processes and maximize services and solutions? Effective and efficient integration of Salesforce with adjacent enterprise systems — such as databases, ERP and CRM systems, and custom applications — is critical to enabling sales teams, increasing revenue, and better serving customers. Across the broad spectrum of Salesforce integration needs, patterns emerge for how to best address integration challenges. Integration patterns are the most logical sequence of steps to solving a specific type of integration problem. Learn how to synchronize CRM systems, migrate from legacy CRM systems, broadcast ERP data into your CRM system, and more. Download the whitepaper now.
Tags : 
     MuleSoft
By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
     ASG Software Solutions
By: Submittable     Published Date: Nov 06, 2019
Submission management software empowers organizations to utilize one platform for all their application and review needs. No matter the department, from marketing to development, it provides distinct advantages to teams collecting and processing any type of application. Today, users expect a smooth, intuitive submission experience, making it imperative for organizations to provide a streamlined process. All relevant parties should have the ability to submit the proper documents or materials, and all reviewers should be able to see applications in an organized and succinct manner. Choosing the right applicant is faster and easier if you have a strong, clear review process and the tools for reviewers to communicate with each other. When your reviewers are in order, you know your applicants are in good hands and the best submissions will be found. In this eBook you’ll learn how to: - Set up an excellent review team - Run an efficient review process - Effectively communicate with appl
Tags : 
     Submittable
By: Submittable     Published Date: Nov 07, 2019
Submission management software empowers organizations to utilize one platform for all their application and review needs. No matter the department, from marketing to development, it provides distinct advantages to teams collecting and processing any type of application. Today, users expect a smooth, intuitive submission experience, making it imperative for organizations to provide a streamlined process. All relevant parties should have the ability to submit the proper documents or materials, and all reviewers should be able to see applications in an organized and succinct manner. Choosing the right applicant is faster and easier if you have a strong, clear review process and the tools for reviewers to communicate with each other. When your reviewers are in order, you know your applicants are in good hands and the best submissions will be found. In this eBook you’ll learn how to: - Set up an excellent review team - Run an efficient review process - Effectively communicate with appl
Tags : 
     Submittable
By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing
     Harry lei
By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
     Endeavour Software Technologies
By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
The bar for success is rising in higher education.  University leaders and IT administrators are aware of the compelling benefits of digital transformation overall—and artificial intelligence (AI) in particular. AI can amplify human capabilities by using machine learning, or deep learning, to convert the fast-growing and plentiful sources of data about all aspects of a university into actionable insights that drive better decisions. But when planning a transformational strategy, these leaders must prioritize operational continuity. It’s critical to protect the everyday activities of learning, research, and administration that rely on the IT infrastructure to consistently deliver data to its applications.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
We’re in the era of hybrid cloud, an integrated combination of public and private cloud environments. Most organizations moving into the public cloud today are making strategic decisions about which applications should go to the cloud and which should stay on-premises. Get acquainted with hybrid cloud management strategies and solutions, and learn what critical components must be addressed as you plan your hybrid cloud environment.
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
     Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com