Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

all ict

Results 51 - 75 of 356Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Jun 25, 2013
Large gaps and loss of productivity challenge the value, agility and cost of IT across the globe. “Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, productivity, it support, customer satisfaction, technology, it management, enterprise applications
    
BMC Software
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : 
traffic, virtualization, it infrastructures, bandwidth management, infrastructure, local area networking, monitoring, network architecture, network management, network performance, network performance management
    
Riverbed
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence, network management, network performance
    
SolidFire_NetApp
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Pure Storage     Published Date: Apr 18, 2018
Massive amounts of data are being created driven by billions of sensors all around us such as cameras, smart phones, cars as well as the large amounts of data across enterprises, education systems and organizations. In the age of big data, artificial intelligence (AI), machine learning and deep learning deliver unprecedented insights in the massive amounts of data. Amazon CEO Jeff Bezos spoke about the potential of artificial intelligence and machine learning at the 2017 Internet Association‘s annual gala in Washington, D.C., “It is a renaissance, it is a golden age,” Bezos said. “We are solving problems with machine learning and artificial intelligence that were in the realm of science fiction for the last several decades. Natural language understanding, machine vision problems, it really is an amazing renaissance.” Machine learning and AI is a horizontal enabling layer. It will empower and improve every business, every government organization, every philanthropy
Tags : 
    
Pure Storage
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services.
Tags : 
market, idc, lifecycle, service, dell intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services. Learn more about Dell solutions powered by Intel®. Dell PC as a Service (PCaaS) vereint Hardware, Software, Lebenszyklusservices und Finanzierung in einer umfassenden Lösung, die einen einzelnen, vorhersehbaren Preis pro Arbeitsplatz pro Monat bietet und von Dell Financial Services bereitgestellt wird.
Tags : 
idc, studie, dell, intel
    
Dell PC Lifecycle
Published By: Dell Storage     Published Date: Apr 17, 2012
A scale-out storage architecture helps organizations deal with demands for growing data capacity and access. Dell engineers put DellT EqualLogicT scale-out storage through its paces to demonstrate its scalability in both file and block I/O scenarios.
Tags : 
    
Dell Storage
Published By: Red Hat     Published Date: Jun 23, 2016
The traditional technical and cultural challenges that large, hierarchical IT organizations face become more visible during times of IT transformation, such as the adoption of cloud technologies, DevOps practices, and agile methodologies. Persistent organizational culture is organic, and it can be extremely difficult for IT leaders to dictate it effectively from the top down. IT leaders can, however, use technology to encourage proper incentive structures in all levels of the organization. This paper explores the role of OpenShift by Red Hat in creating an atmosphere where creative and passionate developers can succeed frequently and quickly. Their success means decisionmakers can impact organizational culture and more rapidly achieve their goals. In this way, IT leaders can harness the efficiency and persistence of spontaneous organization, despite the inherent limitations of hierarchical systems.
Tags : 
technology, productivity, red hat, best practices
    
Red Hat
Published By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
    
CA Technologies
Published By: NetApp     Published Date: Jan 03, 2017
All-flash arrays deliver faster, more predictable performance than legacy systems, are simpler to operate, and provide greater IT flexibility. Discover how these benefits translate into business results.
Tags : 
vmware, all-flash, cloud, quality of service, virtualization
    
NetApp
Published By: Carbonite     Published Date: Apr 09, 2018
The core technology behind Disaster Recovery as a Service (DRaaS) has evolved for decades. More recently, DRaaS has linked to the cloud, and finally hit its stride. Today it can provide unprecedented availability options to companies who don’t have secondary data centers dedicated to business continuity. Before now, only IT teams with additional IT budget, staff and geographic locations could effectively hedge against downtime, and disasters. But today’s DRaaS means that businesses of all sizes have the peace of mind that comes with knowing a replica of their data and systems is hosted at a remote site that they can fail over to—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the DRaaS provider. And the technology ensures that a replica is not only available, but always current and immediately available. This attractive value proposition led Gartner to predict that global DRaaS revenue will rea
Tags : 
    
Carbonite
Published By: VMware     Published Date: Oct 12, 2018
With nearly 20% of midmarket firms using Hyper Converged Infrastructure (HCI) and another 46% actively investigating and planning to adopt HCI solutions over the next 12-18 months, there has never been a more critical time to get ahead of your competition. Midsize businesses face the same need to modernize IT and embrace digital transformation as much as their larger competitors, but are typically restricted by resource and money. HCI enables midsize organizations to address these challenges with a solution that can grow as the business grows, without the financial burden or requiring to choose between on premise or public cloud solutions. The investments you make in IT technology and selecting the right HCI platform will impact your ability to evolve, grow and compete effectively in the future. Submit the form to read our latest whitepaper and discover how you can modernize IT and improve your midsize business operational efficiencies with vSAN.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
There’s plenty of room in the digital economy for traditional retailers, as long as they shift focus from the products they offer to the experiences they provide, blending the physical and digital worlds to offer distinct and personalized shopping experiences and unleashing the untapped power of emerging new ecosystems. At the heart of retail’s ongoing transformation is a shift in focus from the point of sale to the point of experience. Retailers that will thrive and prosper in the digital economy will be those that think beyond the products they sell to providing hyper-personalized shopping experiences that surprise and delight the consumer at each interaction, regardless of channel or touchpoint. This white paper illuminates these strategic imperatives and delivers actionable recommendations to established retailers seeking to convert challenge into opportunity amid growing concern that they should merely concede victory to digitally-native companies.
Tags : 
cognizant, digital economy, retail
    
Cognizant
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: Kaminario     Published Date: Aug 23, 2016
Successful businesses are nimble and built to scale. At times you might need to grow your sales capacity by bringing more people on board. Other times you might simply need them to get more active, boosting performance. Sometimes you need to do both. To support the ebb and flow of your business your storage should be capable of scaling up capacity while increasing performance. Yet you might be surprised to know that only one All-flash vendor can do so, while keeping costs predictable. Read on to learn about 3 scalabity benefits that will transform your storage purchasing experienc
Tags : 
kaminario, flash, performance, storage, application performance, scalability, networking, security, enterprise applications
    
Kaminario
Published By: IBM     Published Date: May 02, 2013
The explosion in IT demand has intensified pressure on data center resources, making it difficult to respond to business needs, especially while budgets remain flat. As capacity demands become increasingly unpredictable, calculating the future needs of the data center becomes ever more difficult. The challenge is to build a data center that will be functional, highly efficient and cost-effective to operate over its 10-to-20-year lifespan. Facilities that succeed are focusing on optimization, flexibility and planning—infusing agility through a modular data center design.
Tags : 
modular, data center, efficient, optimization, flexibility, cost-effective
    
IBM
Published By: WNS     Published Date: Jun 21, 2017
The US retail industry has had an interesting holiday season, marked by high expectations, volatility and distractions, and a reassuringly strong end. While it saw high sales growth - a 4 percent growth over last year, the best in some time - the results have not brought cheer all around. In many respects, the 2016 holiday sales data emphasizes the disruption patterns impacting the retail industry, and validates several predictions about the changing face of retail. Online and mobile sales continue to grow unabated, at 17 and 44 percent respectively, while in-store traffic saw the highest decline in two years. While none of this is surprising in itself, it helps to highlight the role omni-channel retail will play in the coming years.
Tags : 
retail industry, online sales, mobile sales, analysis, store traffic, branding
    
WNS
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications
    
Teradata
Published By: BMC Software     Published Date: May 28, 2014
Learn how BMC Control-M for for Hadoop allows IT to extract value from big data, with clear visibility, predictability and increased productivity and efficiency.
Tags : 
it management, enterprise applications
    
BMC Software
Published By: LifeLock     Published Date: Mar 02, 2015
Mobile devices enable workers to take care of business from virtually anywhere, at any time. But, what’s the catch? Mobile, social media-savvy employees and customers may be more likely to become identity fraud victims.
Tags : 
    
LifeLock
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.