technologies

Results 101 - 125 of 3203Sort Results By: Published Date | Title | Company Name
By: Coupa     Published Date: Dec 14, 2018
Visibility remains a huge challenge for CFOs in today’s dynamic and ever-evolving business environment. A study of more than 500 CFOs and senior finance executives conducted by the Economist Intelligence Unit (EIU) and commissioned by Coupa, reveals that more than 60 percent of CFOs lack complete visibility into the transactions within their organization. Sound familiar? Read the report to learn how CFOs are responding in a rapidly evolving world where new technologies, uncertainty, and emerging threats abound. The report also includes five qualitative interviews with the CFOs from Ally Financial, Driftwood Acquisitions and Development, Hays, Micron Technologies, and Zendesk.
Tags : 
     Coupa
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
In this paper, Stratecast discusses the technologies that are disrupting how business is conducted— and how they impact and are impacted by your data center infrastructure. We define the ideal IT environment, and present ways to achieve it with flexible, composable infrastructure.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
When IT decision makers at midsized organizations are assessing the modern data protection options available to them, five key questions can help them uncover the technologies that might be most appropriate. The questions center on: What does the organization need to protect? What kinds of recoverability should it plan for? How can it reduce its costs? How long does it need to keep its data? Which cloud method or approach is best for the organization? Download this white paper to learn more.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
You’re likely fast-tracking hybrid cloud to increase agility and reduce cost. But it’s a challenge to define the right mix of private cloud, public cloud, and traditional IT that best drives your enterprise strategy. HPE has the right hybrid cloud expertise, technologies, and partners to get you there faster.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
     Hewlett Packard Enterprise
By: Cisco EMEA     Published Date: Mar 05, 2018
Advanced Technology is having a growing impact on our everyday lives. Adoption of advanced technologies and virtual assistants such as Amazon Echo and Google Home are becoming more mainstream in homes. Meanwhile organizations worldwide are increasingly looking at how to implement similar technologies to improve productivity, speed workflows, and increase collaboration among employees, business partners, and even customers. To date, little is known about perceptions of technologies such as artificial intelligence (AI) and virtual assistants in the workplace and how they will impact how we work in the future.
Tags : technology, customers, enterprise, business
     Cisco EMEA
By: Cisco EMEA     Published Date: Nov 08, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Cisco Meraki offers a comprehensive portfolio of cloud-managed IT solutions designed to work together to help deliver a modern network that is powerful, reliable, and easy to manage. This whitepaper discusses modern IT trends and explores how the Cisco Meraki portfolio of IT solutions work together to help deliver reliable, pervasive connectivity for the modern business.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Nov 08, 2018
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third party perspective is based on our own hands on testing as well as on interviews with customers who use these products in production environments.
Tags : 
     Cisco EMEA
By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : mobile applications, ebusiness, web design, web traffic, mobile websites
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Apps are taking over -- app usage represents more than 85% of total device time. But the app space is extremely competitive, and 20% of downloaded apps are opened just once. So, how do you separate your app from the pack? Performance is a key way. Download this infographic to learn how to overcome the complexity of app environments to deliver fast, engaging app experiences that count.
Tags : app, app experience, app environment, consumer engagement
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : mobile adoption, customer loyalty, customer engagement, increase revenue
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : cyber security, security, web linking, performance
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : cloud security, cyberattacks, cloud service, security
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : ddos, technical support, data security, application security
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Every cloud security vendor will give you impressive-sounding metrics for cloud security. But what do they really mean? Our infographic explains which metrics really matter, and what questions you need to ask to get them.
Tags : cloud security, cloud, security, cloud protection
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : cloud security, data, akamai
     Akamai Technologies
By: Akamai Technologies     Published Date: May 05, 2017
Web applications are valuable tools for businesses of all sizes. These applications enable businesses to communicate with customers, prospects, employees, partners, and other information technology (IT) systems. By definition, web applications must be open, interactive, and accessible at all times.. This report, authored by Frost & Sullivan analysts, takes a comprehensive look at the current Web Application Firewall (WAF) vendor landscape and analyzes the current web application threat landscape and how vendors will scale to face it.
Tags : web applications, waf, ips
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
In his time as Director of E-Commerce at Linen Chest, Riaz Faride was faced with a challenge right out of the gate. He found himself responsible for a site that had page load times ranging anywhere from 6 to 30 seconds. Linen Chest’s site was heavy, images were hosted on the origin, and code was never refactored and needed to be optimized. Riaz knew he needed to make some changes, and fast.
Tags : case study, linen chest, image hosting, image optimization
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
It’s more complex and expensive than ever to deliver seamless web experiences to any customer on any device, anywhere. Images are becoming the top obstacle to delivering high performing, responsive sites. View this infographic to see how you can solve the image management problem.
Tags : web image, responsive world, seamless delivery, customer experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
The ways in which the Internet supports our everyday lives have become richer, more engaging, and more mobile. This innovation is driven by the visionaries, designers, developers, and managers of the web experiences that users consume every day. By exploring new ways to solve challenges and improve products and services that enrich our lives, developers and business owners have stretched the Internet to support use cases for which it was never designed. In order to succeed, modern web experiences must seem simple to end-users, even though most ultimately require complex design and technology to deliver.
Tags : web experience, web design, mobile, internet supporters
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
In the face of changing consumer demands and expectations, publishers are seeking new ways to reach and engage their audiences. With this in mind, Akamai and Telegraph Media Group combined efforts to test a hypothesis: would the optimization of image display improve page load times enough to boost session lengths and ad impressions?
Tags : akamai, telegraph media group, image optimization
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : cloud image management, online images, web applications, devices, web experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
The modern digital experience is very much a visual experience. It's through images that we tell our stories, market our products, impart news, and entertain — and forge an emotional connection with our customers. However, delivering today's increasingly image-rich experiences is fraught with complexity. It requires dozens of renditions to optimize an image for all the devices that customers are using, not to mention their current network connection. Without an automated system, it's a daunting task. Dynamic imaging technology is the solution.
Tags : digital experience, imaging, imaging solution, system automation, customer experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : poneman, credential stuffing, it security, damage mitigation, research report
     Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com