Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

analysis

Results 1 - 25 of 1365Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: May 05, 2016
This white paper provides a quantitative TCO analysis of the two architectures, and illustrates the key drivers of both the capex and opex savings of the improved architecture.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 05, 2016
In this paper, we focus on quantifying the capital cost differences of a prefabricated vs. traditional 440 kW data center, both built with the same power and cooling architecture, in order to highlight the key cost drivers, and to demonstrate that prefabrication does not come at a capex premium.
Tags : 
datacenters, tco, capacity, modular design, load, cost, architecture, networking
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 01, 2016
Earlier this year, Schneider Electric launched its preconfigured edge datacenter resources with its SmartBunker and SmartShelter products. In developing these products, Schneider closely examined the requirements for successful, secure, rapid edge deployments in support of the explosion of edge data. The result is a standardized solution that can be customized as required and deployed virtually anywhere.
Tags : 
data center, idc, schneider, iot schneider_uk
    
Schneider Electric
Published By: Schneider Electric     Published Date: Aug 21, 2017
This white paper explains how micro data centers take advantage of existing infrastructure and demonstrates how this architecture reduces capital expenses by 42% over a traditional build.
Tags : 
edge computing, data center, micro data center, iot, bandwidt, data center, architecture
    
Schneider Electric
Published By: FNT     Published Date: Feb 09, 2018
Download this white paper to learn how you can best integrate and capitalize on a combination of data center resources.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it, fnt_white_papers
    
FNT
Published By: BeyondTrust     Published Date: Jul 29, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
    
BeyondTrust
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Building on the popular Threat of the Month series, Cisco researchers looked at notable 2018 cybersecurity incidents with a fresh perspective: what do they reveal about future adversary tactics? With this lens, they chose threats that best embody what defenders should expect in the year ahead. The report contains in-depth analysis, best practices, and trends to watch.
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Global producer of polycrystalline silicon for semiconductors, Hemlock Semiconductor needed to accelerate process optimization and eliminate cost. With TIBCO® Connected Intelligence, Hemlock achieved centralized, self-service, governed analysis; revenue gains; cost savings; and more. Fueled by double-digit growth in the markets it serves, Hemlock Semiconductor is adapting to the increasing commoditization within the polysilicon industry and better positioning itself to compete. A key factor in this plan is to equip process-knowledgeable personnel with the skills and tools to accelerate delivery of process optimizations and associated cost elimination. Hemlock turned to a TIBCO® Connected Intelligence solution to address the challenges. By implementing TIBCO Spotfire® and TIBCO® Streaming analytics, TIBCO® Data Science, and TIBCO® Data Virtualization, the company created more self-service analytics. Adding TIBCO BusinessWorks™ integration let the company realize the vision of connect
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
According to the latest research from Gartner, SOAR solutions are gaining visibility and real-world use driven by early adoption to improve security operations centers (SOCs). The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their ability to prioritize security operations activities, formalize triage and incident response, and automate response.
Tags : 
    
Group M_IBM Q4'19
Published By: PatSnap     Published Date: Sep 27, 2019
Out-of-box tools that use AI, machine-learning, and real-time intelligence are driving the commercialization of IP today. However, IP professionals are faced with a dizzying array of offerings on the market. What features are must haves for IP teams in 2019? What processes will streamline the commercialization process? This eBook works as a clear guide in identifying the tools IP teams need to commercialize with confidence, in 4 easy-to-action workflow tips: 1. Confirming patent novelty easily 2. Deciding on ideas that are worth pursuing 3. Collating key data via analysis and patent landscaping faster 4. Mitigating bottlenecks through interdepartmental collaboration
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: Adobe     Published Date: Sep 23, 2019
IDC surveyed users of Adobe Experience Manager Sites and found substantial ROI WHY SHOULD THE TARGET AUDIENCE CARE? A modern digital experience management platform is essential for any organization hoping to make digital experience delivery a core competency. SUPPORTING CONCEPTS: According to IDC's analysis, AEM Sites enables organizations to realize on average annual business value of $3.92 million per organization over three years and a 348% three-year ROI by: — Making the creation and delivery of digital experiences more consistent and streamlined and accelerating time to market for new experiences — Empowering - and increasing the productivity of - employees responsible for digital experiences — Improving the digital customer experiences organizations deliver, thereby increasing engagement levels and generating additional business
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 23, 2019
Across every industry, many of the world's best and fastest-growing brands are using Adobe Experience Manager to deliver personalised content accurately and on time. Why should the target audience care? 86% of buyers will pay more for a better customer experience. What’s more, customer experience will overtake price and product as the key brand differentiator among consumers by 2020. Supporting Concepts: With Adobe Experience Manager, high levels of customer experience personalization, workflow efficiency, and data analysis are no longer cost- and resource-prohibitive dreams for only the biggest players. Brands featured include Silicon Labs, Morningstar, Swisscom, Raiffeisen, Hyatt, Nissan, Sony, SAS, Informatica, Jefferson Health.
Tags : 
    
Adobe
Published By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
    
Gigaom
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Virtuant Corp.     Published Date: Oct 29, 2011
A benchmark report to provide IT decision makers with a fair comparison of two of the most popular application server products on the market today.
Tags : 
    
Virtuant Corp.
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
Artificial intelligence (AI) has become the buzzword du jour for endpoint protection platform (EPP) vendors struggling to remain relevant in a rapidly changing threat landscape. Why does one EPP prevent breaches while another only facilitates incident response? BlackBerry Cylance’s new eBook cuts through the noise with a concise analysis of AI’s role in cyber defense and the four key criteria for evaluating EPP investments. Read the BlackBerry Cylance eBook to learn more.
Tags : 
    
BlackBerry Cylance
Published By: SurchSquad     Published Date: May 19, 2010
Register to speak with a professional SEO consultant about improving your site's search engine visibility. A consultant will follow-up to schedule your free, no-obligation consultation.
Tags : 
surchsquad, search engine, seo, consultant
    
SurchSquad
Published By: Wheelhouse Enterprises     Published Date: Jul 14, 2010
Quickly see differences between brands like Avaya, Mitel, Cisco, ShoreTel, 8x8, Panasonic, etc and compare over 94 phone systems by 52 brands for small to big business. Our latest Spring 2010 edition of the chart also compares PBX and Business VoIP systems side by side so you can make an educated comparison of your options. This analysis is prepared in an easy to use Excel spreadsheet so you can edit and add information to suit your analysis and presentation needs.
Tags : 
compare, compare business products, wheelhouse, avaya, mitel, cisco, shoretel, 8x8, voip, pbx
    
Wheelhouse Enterprises
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.