growing

Results 301 - 325 of 1177Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Feb 19, 2015
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
     NetApp
By: Dell EMC     Published Date: May 15, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : emc, storage all-flash, architectures, workload, data center, scale, storage, hybrid, vendor profiles, data management, business technology
     Dell EMC
By: Zoom     Published Date: Mar 29, 2016
BAYADA was finding it hard to scale their expensive video conferencing hardware with their growing company. Read more to learn how Zoom software and Logitech hardware helped BAYDA see higher adoption rates, increased efficiency and lower cost of ownership with integrated solutions.
Tags : zoom, bayada, home health care, video conferencing software, logitech hardware, integrated solutions, video conferencing, online collaboration, networking, it management, wireless, business technology
     Zoom
By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : bci information, security and data protection, security report, data protection
     Mimecast
By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
     FICO
By: SilkRoad Technology     Published Date: Feb 24, 2016
It’s a new day for corporate training and those who manage learning functions. Today, traditional training programs aren’t enough to meet growing demands for better company performance, consistent compliance, changing employee expectations, and cost control.
Tags : silkroad, human resources, learning, development
     SilkRoad Technology
By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : management, bot, security, credential, akamai
     Akamai Technologies
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
The retail market is growing, presenting employees with more opportunities to find jobs that provide training, development and career progression-something today’s workforce demands. With improvement in the retail sector comes increased pressure to win the war for talent. This three-step checklist will help you identify your talent management strengths and weaknesses so you can recruit and retain the best people.
Tags : 
     Oracle HCM Cloud
By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : personal device, byod, survey
     Citrix ShareFile
By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
     Lookout
By: Google Analytics 360 Suite     Published Date: Sep 05, 2017
Today’s meandering customer journeys take place over multiple channels and devices. Each interaction creates a stream of digital information, leaving marketers with a growing pile of data. But, with data seemingly everywhere, why are so many marketers still feeling like there’s not a drop to drink? Leaders Have a Data Strategy and Enable More Teams with Data In this research report from June 2017, Econsultancy surveyed more than 700 marketing and analytics executives at consumer brands to better understand how data factors into marketing strategy — and daily decision making. Two-thirds of leading marketers — those who outperformed their top business goal — say they currently have a documented data and analytics strategy. In this report, you’ll also learn how leaders have built data-driven cultures and why they are more likely to use: digital analytics to optimize user experience in real time audience-level data to personalize customer experience customer-level data to segment and r
Tags : 
     Google Analytics 360 Suite
By: Google     Published Date: Aug 09, 2017
The business world’s focus on machine learning (ML) may seem like an overnight development, but the buzz around this technology has been steadily growing since the early days of big data.
Tags : machine learning, big data, analytics, data analytics
     Google
By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
     Fiserv
By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
     Schneider Electric
By: Carbon Black     Published Date: Oct 10, 2018
According to ESG Research, 65% of organizations believe the skill level of their security team could be improved, and 48% are using more than 25 security products. This leads to more overworked staff and, ultimately, less effective security. Download the Replace AV Buyer's Guide to learn what your team should look for when replacing legacy AV with an endpoint security solution that is easy to manage and deploy, and can cost-effectively protect your growing business. In this buyer's guide you'll find: A core evaluation checklist for replacing AV. Guiding questions to frame your evaluation to replace AV. How to run a test of next-generation AV solutions. Learn more about replacing your traditional AV in the Replace AV Buyer's Guide.
Tags : 
     Carbon Black
By: Cohesity     Published Date: May 09, 2018
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
     Cohesity
By: Abacus Labs     Published Date: Jan 11, 2019
Artificial intelligence is no longer the stuff of science fiction. Led by advances being made in academia and Silicon Valley, computing power is growing at an unprecedented and accelerating rate. As AI becomes more prevalent in finance software, the question facing you, the finance leader, isn’t whether it will change your job, but how to prepare for its arrival. This paper is a primer designed to help you develop an AI strategy for your finance team. You’ll understand key concepts about this revolutionary technology, including how it works, why finance specifically stands to benefit, and how to apply AI in a way that returns the most value to your team.
Tags : 
     Abacus Labs
By: Turbonomic     Published Date: Oct 02, 2018
Microsoft Azure is a public cloud platform featuring powerful on-demand infrastructure and solutions for building and deploying applications workloads as well as a wide variety of IT and application services. You can use Azure as a public cloud provider and as a hybrid extension to existing on-premises infrastructure. Organizations that use Microsoft solutions on-premises are able to extend their infrastructure and operational processes to Azure. With the growing popularity of Azure, today’s systems administrators need to acquire and strengthen their skills on this fast-growing public cloud platform. In this guide we explore the Azure public cloud platform with a focus on the Infrastructure-as-a-Service (IaaS) features. We cover general architectural features of the Azure cloud including geographic regions, availability zones, and Service Level Agreements (SLAs) attached to the core Azure IaaS infrastructure.
Tags : 
     Turbonomic
By: HSBC     Published Date: Feb 27, 2019
So, you want to take your company global? For many organizations, forward growth means international expansion. While you may recognize the need for this growth, making it happen is another matter. In order to expand into new markets, you’ll need to identify your growth strategy, navigate unclear rules and regulations, understand cultural differences, and so much more. There are many complex considerations when growing your business globally – many of which you didn’t need to address in order to grow domestically. ____ The materials contained in this website are not intended for audiences located outside of the United States. This site does not intend to collect personal information about persons located outside the US and no marketing or services are directed at individuals located in the European Union. Content is Sponsored by HSBC
Tags : 
     HSBC
By: IBM APAC     Published Date: May 14, 2019
Digital transformation (DX) continues to headline business initiatives as companies look to remain competitive in the rapidly changing IT landscape. Organizations are increasingly investing in and implementing next-generation applications and architectures such as software-defined IT and hybrid IT to drive higher levels of efficiency and agility. These modern technologies and architectures, however, also require organizations to evolve their underlying infrastructure to support new capabilities and demands. Recent strength in the server market, which continues to operate in a marketwide refresh cycle, illustrates the growing demand for new infrastructure. 1Q18 marked the server market's fifth consecutive quarter of both shipment and revenue growth and represented a fourth consecutive quarter of year-on-year ASP growth, as customers continue to replace aging server infrastructure with more powerful and efficient systems that leverage the latest platform developments from processor supp
Tags : 
     IBM APAC
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
     Stratoscale
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to “Day One” challenges of deploying, managing and monitoring PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. An effective monitoring and logging strategy is critical for maintaining the reliability, availability, and performance of database environments. The second section of this eBook provides a detailed analysis of all aspects of monitoring and logging PostgreSQL: ? Monitoring KPIs ? Metrics and stats ? Monitoring tools ? Passive monitoring versus active notifications
Tags : 
     Stratoscale
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to “Day Two” challenges of accelerating large-scale PostgreSQL deployments. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. After a PostgreSQL deployment is live, there are a variety of day-two scenarios that require planning and strategizing. The third section of this eBook provides a detailed analysis of all aspects accelerating large-scale PostgreSQL deployments: ? Backups and Availability: strategies, point-in-time recovery, availability and scalability ? Upgrades and DevOps: PostgreSQL upgrade process, application upgrades and CI/CD
Tags : 
     Stratoscale
By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to deploying, managing and scaling PostgreSQL in various environments, in the public cloud and on-premises. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. The eBook provides a detailed analysis of planning, day-one, and day-two challenges of PostgreSQL deployments, in the context of potential operating environments: ? Public cloud ? Private cloud ? Private DC (bare metal / VM)
Tags : 
     Stratoscale
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com