high

Results 1 - 25 of 3042Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprisesbut with fewer technical and budget resources to draw from. Thats why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within higher education can be a challenge with so many uses and options today. This use case guide takes into consideration higher education needs regarding form factor and key features. Take a look at this guide to learn how the computing choices made can facilitate the student learning environment whether in computer labs, in interactive learning spaces, or if learning takes place on the go via academic-related activities with digital signage located in the hallway. Read this paper today to find out the best desktop and display solutions to meet the needs of university and college students.
Tags : 
    
Dell
Published By: Dell     Published Date: Dec 12, 2017
Workers expect a high-quality workplace and the ability to be productive anywhere. As people increasingly prefer tablets and laptops, organizations are reassessing their continued investment in traditional PCs. Download "Security and Productivity Benefits Drive Increased Micro PC Adoption" for the latest research how business and IT leaders are rethinking the role of PCs.
Tags : 
    
Dell
Published By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although were presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether its for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, its crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Univera Healthcare     Published Date: Sep 07, 2017
Its all about minimizing surprises. This handy resource provides a high-level, high deductible health plan crash course, some basic tips for getting started, and a worksheet to help you be sure youre using your plan in the best way possible.
Tags : 
health plans, medical expenses, financial planning, insurance, healthcare, deductible
    
Univera Healthcare
Published By: HP Inc.     Published Date: Dec 06, 2017
HP transforming manufacturing with breakthrough 3D printing technology. Our white paper uncovers one the 4th Industrial Revolution's most disruptive technologies. Reinvent your business with Multi Jet Fusion Technology. HP is ushering in a new era for manufacturing with Multi Jet Fusion technology. In this white paper, see how innovations such as high-speed synchronous architecture that builds parts layer-by-layer and HPs Multi Jet Fusion Open Platform are poised to redefine 3D printing.
Tags : 
printer, technical, hp3d, platform, manufacturing
    
HP Inc.
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction
    
Oracle Dyn
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Workday     Published Date: Jun 05, 2017
Todays banks, credit unions, asset management firms, lending companies, and other financial services businesses operate in a highly competitive and regulated environment. Servicing clients, introducing new products and channels, and opening new markets as well as having insight into your loans, investments, and deposits is critical to your bottom line. At the same time, employing the right people is what drives your future. Workday provides financial management, human capital management, and planning/ budgeting in a single cloud-based system to support your needs.
Tags : 
    
Workday
Published By: Workday     Published Date: Aug 09, 2017
Higher education and technology work well together. To meet the ever-evolving needs of todays colleges and universities, technology is advancing and innovating at a record pace to both overcome new challenges as well as to unlock exciting possibilities across the institution. Watch the webinar On the Leading Edge of Higher Education Innovation: A CIOs Perspective to discover: Top tech trends and issues in higher education for 2017 How CIOs can leverage information technology for success Key insights and observations from leading CIOs
Tags : 
    
Workday
Published By: Workday     Published Date: Nov 27, 2017
Higher education must make changes to best prepare students for the shifting economy. This whitepaper outlines the skills needed in the workplace of tomorrow and strategies colleges and universities might consider to ready their students for whats to come.
Tags : 
    
Workday
Published By: Workday     Published Date: Nov 28, 2017
In this episode of In Good Company, Meredith Coughlin, assistant dean of enterprise systems at Indian River State College, and Sean Hanna, analyst of student systems at the University of Rochester, discuss the current challenges higher education institutions face as the traditional path to degree completion has evolved. What measures can schools take today to help students of all backgrounds achieve academic success and prepare for productive careers, and what role can technology play? Watch to find out.
Tags : 
    
Workday
Published By: Lookout     Published Date: Aug 30, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions.This whitepaper highlights some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
mobile threats, mobile security, mobile protection, enterprise mobility management, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Androids 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apples app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
We dont have a BYOD programme. This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they arent actually subject to cyber-threats from mobile devices because, simply, they dont currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Ubiquitous connectivity and mobile devices have changed everything, opening up markets to millions of new consumers across the globe. Within the past few years, nimble upstarts have created mobile apps that have converted banking customers, cab riders and hotel guests at unprecedented rates. Large, established brands are scrambling to transform their businesses in order to maintain market share. To compete in this application economy, you must adapt or be left behind.
Tags : 
testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, database development
    
Black Duck Software
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novelsartificial intelligence, digital currency, and self-driving cars to name a fewhave become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprisesits the price required to transform into a digital business.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novelsartificial intelligence, digital currency, and self-driving cars to name a fewhave become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprisesits the price required to transform into a digital business.
Tags : 
    
AppDynamics
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.