cem

Results 1 - 25 of 480Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
     CA Technologies
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
À l’heure où les entreprises traditionnelles s’emploient à copier les pionniers d’Internet sur le terrain de l’agilité et de l’innovation, le développement d’applications devient de plus en plus complexe. Tout d’abord, les codes source monolithiques sur lesquels reposent traditionnellement les applications d’entreprise ralentissent le lancement de nouveaux services. Quant au cloisonnement et à la dispersion des équipes opérationnelles et de développement, ils provoquent un manque de coordination des actions de chacun en interne. Et pour couronner le tout, les utilisateurs sont plus exigeants que jamais sur les questions d’expérience et de performance. Les entreprises doivent donc assurer une scalabilité efficace et un suivi attentif de leurs environnements. Le tout, bien entendu, sur fond de disponibilité à 100 % des services.
Tags : 
     AstuteIT_ABM_EMEA
By: Mimecast     Published Date: Feb 07, 2018
Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder where your IT peers are headed with their cybersecurity plans and how they prioritize their initiatives? Recent HIMSS survey results reveal these insights and more, plus the 5 steps to improve your email security’s prognosis. This E-book contains startling facts and important cybersecurity insights every healthcare IT security leader needs to know. *HIMSS Analytics survey conducted on behalf of Mimecast, December 2017
Tags : himss, email security, email, healthcare, cybersecurity
     Mimecast
By: VMware     Published Date: Dec 05, 2017
"Are you planning a migration off Citrix XenApp or XenDesktop? Or looking for ways to make them run as good as you thought they should? Then this is the session for you. Come hear from the architect of VMware's Citrix migration and enhancement strategies as he explains how key VMware technologies such as Horizon, App Volumes, Instant Clone and NSX can help. We will dive deep on how to evaluate the state of the Citrix environment, assess project requirements and review real world scenarios. By the end of the session you will know all about the best-practices, tools and services available to ensure your project is a complete success. Download the webinar to learn how VMware technologies can help solve your Citrix problems!"
Tags : vmware, citrix, app volumes
     VMware
By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : application modernization, forrester consulting, apo, asg, application portfolio optimization
     ASG Software Solutions
By: OnSIP     Published Date: Apr 10, 2012
When investing in a phone system replacement, edcuational institutiones have two main options: an on-premise PBX or a hosted VoIP services.
Tags : business technology, telecom
     OnSIP
By: Patriot Capital     Published Date: Oct 06, 2011
There are significant tax benefits in the Stimulus Act that are about to expire at midnight on December 31st, 2011. Take advantage of them now!
Tags : 
     Patriot Capital
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Entry-level package options For organizations looking for protection with more basic functionality, we have three additional Umbrella packages designed for entry-level use cases.
Tags : performance, protection, enforcement, visibility, management, platform package exclusive
     Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
     Cisco EMEA Tier 3 ABM
By: Akamai Technologies     Published Date: May 08, 2017
While the shift from disk to digital offers tremendous potential opportunities, it also presents a host of new challenges for gaming companies. As the online channel grows increasingly complex and the pace of innovation accelerates, many companies struggle to keep up. Not only are there websites and storefronts to manage, but also real-time gaming servers, large software downloads, and live-streamed competitions and events. Games are transforming from fixed, boxed products to dynamic, ongoing services – with frequently updated content, in-game micro-transactions, virtual goods and social interactions. Mobile adds another dimension to the trend, as consumers increasingly look to play on smart phones and tablets – or on multiple screens across devices. To successfully navigate this complex and changing landscape, gaming companies need an agile, high- performance infrastructure that allows them to turn the Internet into a reliable and effective online distribution channel. This requires f
Tags : akamai, akamai gaming, infrastructure, distribution channel, technological advancements
     Akamai Technologies
By: Cisco     Published Date: Feb 23, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : wireless management, wireless, communications, business practices
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
     Cisco
By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : quantum computing, quantum, computing, browser encryption. encryptionm
     F5 Networks Inc
By: Adobe     Published Date: Mar 21, 2017
Il suffit de se promener en ville ou de se rendre dans une entreprise pour constater que le mobile est devenu le nouveau système d’exploitation de l’humanité. Le téléphone envahit nos vies. Il nous réveille le matin, nous propose des itinéraires de remplacement pour éviter les bouchons ou nous permet d’obtenir un bon de réduction dans la queue d’un fast?food.
Tags : 
     Adobe
By: Lenovo and Intel     Published Date: Jan 20, 2017
It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content—and that makes huge demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions. Download the white paper and read more.
Tags : lenovo, it challenges, body camera, data center
     Lenovo and Intel
By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Enterprises are leveraging advancements in what IDC calls “3rd Platform” technologies — cloud, Big Data, mobility, and social — to create new business opportunities and gain competitive advantage. These trends are putting more pressure on IT organizations to transform their datacenter operations to better support business initiatives aimed at reducing costs, increasing revenue, and strengthening customer relationships. This has driven increased demand for converged or integrated systems that provide the tools needed to reduce capital costs, improve operational efficiencies and, ultimately, increase agility within the datacenter.
Tags : 
     Cisco
By: SAP SME     Published Date: May 09, 2017
Para atender a essas demandas, empresas de todos os tipos — não apenas gigantes digitais e concorrentes com bolsos cheios — certamente precisam de acesso instantâneo a dados relevantes. Elas ambém precisam, entretanto, da capacidade de esponder imediatamente aos insights que esses dados revelam. Em utras palavras, as organizações precisam fazer negócios “no calor do momento”. Isso é tão verdadeiro para as pequenas e médias empresas (PMEs) quanto para empresas de qualquer outro tamanho hoje em dia. Todas as empresas — e as que crescem rapidamente em especial — precisam de insights operacionais, de cadeia de suprimentos, de vendas e de nventário na ponta dos dedos para tomar as melhores decisões, garrar oportunidades ocultas, antever problemas e satisfazer clientes.
Tags : 
     SAP SME
By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada à mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com respaldo da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade –decorrente das comunicações a qualquer hora e lugar. » Poder computacional ilimitado, disponibilizado pelas diversas plataformas. » Computação em nuvem, com acesso facilitado a softwares e serviços hospedados. » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las. » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades internas e externas.
Tags : 
     SAP SME
By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada com a mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com suporte da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade – decorrente das comunicações em qualquer tempo e lugar » Poder computacional ilimitado, disponibilizado pelas diversas plataformas » Computação em nuvem, com acesso facilitado a software e serviços hospedados » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades interna e externa
Tags : 
     SAP SME
By: SAP SME     Published Date: May 09, 2017
As informações descritas abaixo são úteis para compreender o conteúdo deste white paper de proposta de valor. Elas fornecem detalhes sobre o objetivo e o escopo do artigo. As principais definições também são dadas para as seções selecionadas do artigo a fim de fornecer esclarecimentos adicionais.
Tags : 
     SAP SME
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com