adoption

Results 1 - 25 of 765Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: May 04, 2018
Multicloud Storage for Dummies consists of five short chapters that explore the following: - How the multicloud storage model aligns with modern business and IT initiatives - Common barriers to cloud adoption and how a multicloud storage model addresses them - How to build a multicloud data center - What to look for in multicloud storage services - Real-world multicloud use cases
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Dell PC Lifecycle     Published Date: May 22, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: Workday     Published Date: May 09, 2018
Wellesley College has a lot of success stories to share following its strategic deployment of Workday. Increased internal adoption and collaboration between finance and HR are just the start of a long list of benefits the college now enjoys. Watch the webinar replay with Wellesley’s Ravi Ravishanker, CIO and associate provost; Nephellie Dobie, director of Project Management and Business Analysis; and Veronica Brandstrader, associate CIO, to learn about its: • Evaluation and deployment • Technology transformation • Benefits realized • Lessons learned
Tags : 
    
Workday
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management.
Tags : 
idc, marketscape, agile, ppm, vendor, assessment
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
This whitepaper looks to address the Top 3 challenges your team faces when building in the cloud and what it means for your business. Although the capabilities and cost of select SecOps solutions have kept pace with the widespread adoption of the Amazon Web Services (AWS) Cloud, many organizations try to protect their expanding cloud workloads without the proper support.
Tags : 
    
Trend Micro
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration
    
ASG Software Solutions
Published By: DocuSign     Published Date: Apr 24, 2018
At DocuSign, we understand that deploying new technology and processes in your organization can be a challenge. Based on our experience with on-boarding real estate offices across the country, we have found that there are several key factors that contribute to successful deployment and adoption. Within this guide, we have outlined critical change management principles and supporting materials that will help you successfully manage your organizations transition to DocuSign.
Tags : 
    
DocuSign
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: SAP     Published Date: May 18, 2014
The technology market is giving significant attention to Big Data and analytics as a way to provide insight for decision making support; but how far along is the adoption of these technologies across manufacturing organizations? During a February 2013 survey of over 100 manufacturers we examined behaviors of organizations that measure effective decision making as part of their enterprise performance management efforts. This Analyst Insight paper reveals the results of this survey.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, it management, knowledge management
    
SAP
Published By: SAP     Published Date: May 18, 2014
Over the course of several months in 2011, IDC conducted a research study to identify the opportunities and challenges to adoption of a new technology that changes the way in which traditional business solutions are implemented and used. The results of the study are presented in this white paper.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
Published By: SAP     Published Date: May 18, 2014
Forrester conducted in-depth surveys with 330 global BI decision-makers and found strong correlations between overall company success and adoption of innovative BI, analytics, and big data tools. In this paper, you will learn what separates the leading companies from the rest when it comes to exploiting innovative technologies in BI and analytics, and what steps you can take to either stay a leader or join their ranks.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
Published By: HPE Intel     Published Date: Jan 11, 2016
The world of storage is being transformed by the maturing of flash arrays, an approach to storage that uses multiple, solid state flash memory drives instead of spinning hard disk drives. An all-flash array performs the same functions as traditional spinning disks but in a fraction of the time required and in more compact form factors. Given its superior performance in certain contexts, all-flash arrays are experiencing strong industry adoption. However, best practices and a true understanding of key success factors for all- flash storage are still emerging. This paper is intended to educate you on best practices based on real user experience drawn from ITCentralStation.com. We offer all-flash user advice in selecting and building the business case for a flash array storage solution.
Tags : 
    
HPE Intel
Published By: Oracle     Published Date: Apr 03, 2018
xxx
Tags : 
    
Oracle
Published By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : 
mobile adoption, customer loyalty, customer engagement, increase revenue
    
Akamai Technologies
Published By: Dell EMC     Published Date: Oct 13, 2016
Dell EMC is the world market leader in converged infrastructure and converged solutions. Through Dell EMC Converged Infrastructure and Solutions Dell EMC accelerates the adoption of converged infrastructure and cloud-based computing models that reduce IT costs while improving time to market. Dell EMC delivers the industry’s only fully integrated and virtualized cloud infrastructure systems, allowing customers to focus on business innovation instead of integrating, validating, and managing IT infrastructure. VCE solutions are available through an extensive partner network.
Tags : 
converged solutions, it transformation, infrastructure systems, operations software, intel, network management, network performance
    
Dell EMC
Published By: HPE     Published Date: Mar 02, 2016
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT.
Tags : 
    
HPE
Published By: HPE     Published Date: Mar 14, 2016
Productivity gains are related to the rapid adoption and optimization of applications and software. HP helps small and midsize businesses increase the productivity of their application investments through the use of the HP ProLiant Gen9 servers.
Tags : 
    
HPE
Published By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : 
storage, data, sql, architecture, storage management, data integration, data protection, database security
    
Dell EMC
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Read our eBook, which will reveal the top 6 challenges that can slow your adoption of all flash technology, and show you how to overcome them.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.