isp

Results 1 - 25 of 860Sort Results By: Published Date | Title | Company Name
By: Hitachi Vantara     Published Date: Aug 16, 2018
In this infographic, we are going to show you the possibilities with modernized, optimized data infrastructure. In doing so, we aim to bring you ideas about how you can bring your own data-driven business vision to life, focusing on the outcomes that matter most to you. In essence, we will be discussing five main industries and the possibilities for modernized data infrastructure. We will be displaying how Banking and Financial Services, Telecommunications, Manufacturing, Healthcare and Retail can use data, analytics and automation to optimize their business, therefore bringing about a competitive edge which previously appeared unimaginable. Using data correctly, most importantly building proper data infrastructures, can be the driving force behind obtaining a competitive edge. Data is your story. And it’s our story, too.
Tags : 
     Hitachi Vantara
By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
     Juniper Networks
By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
     Polycom
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
     Limelight
By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : shutterfly, images, growing, reliability, performance, storage, dispersal, networking, business technology
     Cleversafe
By: SAS     Published Date: Apr 25, 2017
Your company’s culture is indispensable in informing the right way to govern data, a point we hope to drive home in this white paper. When you review the mistakes that otherwise earnest companies have made in their quests to apply rigor to their data, you’ll see why our mantra is: There is no template for data governance. And hopefully, you’ll realize what you need to do now.
Tags : 
     SAS
By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
     Cyveillance
By: Aternity     Published Date: Dec 30, 2011
EMA provides research and analysis of today's End User Experience (EUE) and Application Performance Management (APM) technologies along with a thoughtful presentation on the Top 10 Myths to dispel before purchasing any monitoring tool. Guest speakers include Julie Craig, EMA Research Director, and Trevor Matz, President and CEO of Aternity.
Tags : technology, aternity, eue, user experience, apm, application performance, application management
     Aternity
By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage
     Mimecast
By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
     Datawatch
By: Druva     Published Date: Sep 27, 2017
The public cloud’s reliability, security, and scalability offers the transformational potential to move disparate workloads to a single cloud platform for greater efficiency and agility. Discover 20 real-world benefits gained when moving backup, archival and disaster recovery to a single, native cloud platform.
Tags : backup recovery, disaster recovery, public cloud, security cloud, native cloud
     Druva
By: SAP     Published Date: May 18, 2014
This paper explores the results of a survey, fielded in April 2013, of 304 data managers and professionals, conducted by Unisphere Research, a division of Information Today Inc. It revealed a range of practical approaches that organizations of all types and sizes are adopting to manage and capitalize on the big data flowing through their enterprises.
Tags : sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
     SAP
By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for Digital Marketing Hubs, and find out why Marketo was named a leader based on completeness of vision and the ability to execute. As a digital marketing hub, Marketo allows marketers to think beyond email campaigns and address customers personally and consistently as individuals through a variety of contexts and formats. Digital marketing hubs, like Marketo, unify disparate marketing data and processes to drive acquisition, engagement, conversion and transaction across complex customer journeys. The full report includes: Market evaluation and analysis of 22 vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying digital marketing hubs Download the report to learn about these topics and more.
Tags : digital marketing hub, email campaigns, customers, disparate marketing data, vendor selection, gartner
     Marketo
By: Curalate     Published Date: Aug 16, 2017
Digital technology has completely changed how we discover products, engage with brands and share our experiences with others. Amazon revolutionized customer feedback and product reviews. Social media transformed the way people share word-of-mouth recommendations, connecting shoppers to off-the-cuff opinions, compelling visual content and real-life experiences from peers and influencers they follow and admire. Sure, TV, radio and print ads are still part of the mix but they hardly carry the same weight as they did in years passed. This statistic speaks volumes: 92% of consumers trust peer recommendations over branded advertising. With the advent of social media and digital technology, brands have a powerful new tool at their disposal that brings word-of-mouth to the masses: usergenerated content (UGC).
Tags : ugc, user generated content, revenue, curalate, social media, millenials
     Curalate
By: Dell Server     Published Date: Aug 24, 2018
La computación periférica pronto se convertirá en la nueva norma, a medida que entramos en una era de zettabytes y miles de millones de dispositivos conectados. Los servidores PowerEdge de Dell EMC están diseñados de forma única para cumplir las exigencias de la computación periférica con seguridad integrada, escalabilidad sin concesiones y automatizado inteligente.
Tags : 
     Dell Server
By: Pure Storage     Published Date: Jul 18, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
     Pure Storage
By: Pure Storage     Published Date: Jul 26, 2017
Les principales architectures de stockage traditionnelles ont été développées il y a plus de 20 ans pour répondre à un paradigme informatique différent. Si elles ont plutôt bien servi leurs clients pendant cette période, elles sont en train de devenir obsolètes, puisque de plus en plus d'organisations adoptent des modèles cloud ou de type cloud. Afin d'optimiser l'efficacité du cloud, le service informatique doit opter pour des architectures de stockage conçues pour le 100 % flash et développées de A à Z pour l'ère du cloud.
Tags : le cloud computing, améliorer la performance, disponibilité des applications, plateforme de stockage 100 % flash, pure storage
     Pure Storage
By: Pure Storage     Published Date: Feb 02, 2017
- Simplifier la gestion et l'administration de l'informatique - Améliorer la performance et la disponibilité des applications - Réduire le coût total de possession - Améliorer l'agilité informatique et de l'entreprise
Tags : stockage flash, applications cloud, coût, performance, gestion du système d’information, l'agilité en affaires
     Pure Storage
By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
     Mirror Image Internet
By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac va por buen camino para convertirse en el modelo para la próxima generación de Wi-Fi. La velocidad de transmisión de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalámbricas LAN son amplificadas ya que el número de usuarios de móviles y dispositivos, así como el uso de aplicaciones continúan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no está seguro de qué es lo siguiente que debe hacer, descárguese esta guía en cinco pasos que le ayudará a prepararse y planificar una migración exitosa a WLAN 802.11ac.
Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
     Aruba Networks
By: Aruba Networks     Published Date: Nov 15, 2013
L'802.11ac è sulla buona strada per diventare lo standard del Wi-Fi di nuova generazione. La velocità in gigabit, le migliori capacità e l'affidabilità che l'802.11ac conferisce alle reti LAN senza filo (WLAN) sono amplificate, mentre cresce a vista d'occhio l'utilizzo da parte di utenti, applicazioni e dispositivi. Sia che siate dei precursori che hanno già iniziato a pianificare o, come molte aziende, siate incerti sul da farsi, scaricando questa guida in cinque fasi potrete prepararvi e pianificare la corretta migrazione verso una rete WLAN da 802.11ac.
Tags : just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
     Aruba Networks
By: SubscriberMail     Published Date: Dec 12, 2008
The benefits of addressing the image suppression issue are significant. A recent controlled study by SubscriberMail demonstrated the response improvements gained by optimizing an email message to have impact even when images are not displayed. In this study, an email message that was not optimized for image suppression was sent to a test panel of approximately 50,000 subscribers. Simultaneously, a panel of similar makeup received a version of the same message optimized for non-graphical display. Compared to the non-optimized version, the optimized version saw an 87 percent increase in clicks.
Tags : subscribermail, image blocking, image suppression
     SubscriberMail
By: OnBase by Hyland     Published Date: Jun 29, 2015
Unstructured content annoys clinicians and staff. They have to find it. They have to wait for it. They have to worry about whether it’s been lost or misplaced. Turn that source of annoyance into a point of efficiency with enterprise content management (ECM) technology. Learn how to find your unstructured content, capture it and make it work for you.
Tags : user experience, enterprise content management, productivity, security, compliance, it management, enterprise applications
     OnBase by Hyland
By: Emarsys - APAC     Published Date: Jun 12, 2019
It’s time to look ahead. We have outlined 5 predictions that we believe marketers should be preparing for in the next 5 years. In this whitepaper, we’ll cover how: • Blockchain will become a greater core component of marketing. • Display advertising as we know it will finally die. • Cross-device identification will become a necessary part of omnichannel marketing. • Voice re-emerges as a distinct channel and internet interface. • All marketing will be done in real time.
Tags : 
     Emarsys - APAC
By: Mitel     Published Date: Apr 07, 2017
Une solution hyperconnectée. Disponible 24 heures sur 24, 7 jours sur 7. Activée en permanence. Tous les acteurs économiques ont des opinions très différentes au sujet de l'environnement commercial actuel. Cependant, quelle que soit leur perception, la rapidité du monde des affaires actuel exerce une pression sans précédent sur les entreprises. La réussite ou l'échec de votre entreprise dépend de votre capacité à identifier les bonnes personnes, à communiquer, à accéder aux données et à échanger des informations rapidement.
Tags : 
     Mitel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com