Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

leverage

Results 1 - 25 of 953Sort Results By: Published Date | Title | Company Name
Published By: SimpliVity     Published Date: Jan 07, 2016
The Gorilla Guide To Hyperconverged Infrastructure Implementation is a how-to guide for IT professionals which focuses on evaluating and implementing hyperconverged infrastructure. Download today and learn: How to leverage key use cases driving hyperconvergence; Ways hyperconvergence can stretch IT budgets; How to overcome perceived roadblocks to transforming the data center with hyperconverged solutions."
Tags : 
hyperconverged, datacenters, it management, it management, simplivitydcd, networking, convergence, data center design and management, data center
    
SimpliVity
Published By: Citrix     Published Date: Jul 14, 2016
This White Paper goes some way to finding a solution to your Data Center security problems. Citrix Netscaler, is the latest application delivery controller for building enterprise cloud networks. Today's enterprises can leverage their infrastructure to establishand extend a robust cost-effective for Nex Gen security. Download FREE today.
Tags : 
citrix_uk/eu, security, data center, cost effective, networking, it management, telecom
    
Citrix
Published By: Server Technology     Published Date: Aug 03, 2016
Learn how Sentry Power Manager can help with capacity planning & power management & monitoring or Learn how to use Sentry Power Manager to plan for increased capacity in your data center.
Tags : 
networking, security, data center
    
Server Technology
Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
    
Schneider Electric
Published By: Intel     Published Date: Apr 11, 2019
Robots play a major role in making manufacturing processes more efficient and less labor intensive. They can help control costs and improve quality, as well as increase productivity. The complexity of robotic system design, however, creates obstacles for many manufacturers, and this is made more difficult by the need to identify and integrate subsystems from multiple vendors. NexCOBOT, a NEXCOM company, offers a flexible, modular robotics solution integrating artificial intelligence (AI) with machine vision and powered by the new Intel® Vision Accelerator Design products. The solution brings together the insight of artificial intelligence, the mobility of robotics, and the capabilities of machine vision, providing a new level of precision and optimization for manufacturing and industrial implementations
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
    
Intel
Published By: Rackspace     Published Date: May 28, 2019
Established organizations around the world are grappling with the dawn of the digital transformation (DX) economy as they find themselves disrupted by digital natives. In the digital age, traditional organizations risk being disrupted if they keep the status quo. For resource-constrained IT organizations, cloud services will be the foundation for their DX journey. This IDC InfoBrief takes a closer look at the new infrastructural requirements of transforming organizations and how managed cloud services are enabling their DX journey – with three key industries in the spotlight: • Retail – Retailers are expected to be significantly more mature in their cloud adoption in two years, and the next 12 months will see more deployments of hosted private cloud to support their business goals. • Travel and Hospitality – Enterprises will invest in hosted private cloud and IaaS, and adopt cloud-based applications to gain positive business outcomes from supply chain, enhanced guest experience and p
Tags : 
managed cloud services, digital transformation, retail, travel, hospitality
    
Rackspace
Published By: Here Technologies     Published Date: Mar 29, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2018.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"Nothing kills attacks earlier than DNS-layer security. Protection both before and during the attack Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains.
Tags : 
    
Cisco Umbrella EMEA
Published By: CheckMarx     Published Date: Jun 07, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
Published By: Uberflip     Published Date: Jun 11, 2019
B2B marketing teams rely on content to fuel their campaigns and generate pipeline for their organizations. As such, every year marketing teams spend hundreds of thousands of dollars creating exponentially more content in an effort to reach and influence their buyers. But even with this proliferation of content, marketers everywhere still struggle to leverage their content to win and retain customers.
Tags : 
    
Uberflip
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As your organization grows and new branch sites need to connect to your network, you need a holistic security program that can leverage the latest advances in IT and cloud while still supporting greater productivity and collaboration. Download our eBook to learn about the three types of security that every new internet-connected site needs to have.
Tags : 
    
Forcepoint
Published By: MuleSoft     Published Date: Apr 23, 2019
In today’s competitive landscape, businesses need to make decisions quickly in order to respond to rapidly changing customer preferences and nimble competitors; whether it’s a new business strategy, a new business process, or a new market offering, businesses are competing on speed and agility. The overwhelming majority of today’s business and IT leaders understand digital transformation is necessary to maintain leverage amid constantly changing customer preferences. They also have a clear picture of their desired end state—exemplified by leaders like Amazon, Google, and Microsoft. However, only a small minority of have a clear understanding of the path they need to lead the market. In this paper you’ll learn: How to build digital transformation into the root of your company with a practical, natural, and tested blueprint. Best practices from over 1,600 enterprises to transform your strategy, organization, and technology from the ground up. Actionable next steps to start your journ
Tags : 
    
MuleSoft
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, networking, it management, enterprise applications, human resource technology
    
Adlib Software
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking, twitter, youtube, rich media
    
StrongMail
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
    
StrongMail
Published By: AWS     Published Date: Jun 07, 2019
Respond to customer feedback faster Organizations are demanding greater flexibility from the software they use. Yet, most line-of-business applications are built on top of rigid commercial databases that make them difficult and expensive to deploy. By building applications on top of Amazon Aurora, a cost-effective database solution from Amazon Web Services (AWS), independent software vendors (ISVs) can get away from commercial databases and the hassles they create for end customers. In this webinar, AWS Partner Network (APN) Premier Consulting Partner Onica will show you how to leverage Amazon Aurora to make it easier for customers to operate your software, in turn increasing sales. You will also learn how to leverage the breadth and depth of AWS services to improve developer productivity and become more responsive to customer feedback as a result.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 11, 2019
Some organizations are reluctant to migrate to the cloud because they believe they will be forced to learn new skills, start using new tools, and adopt new processes. However, by deploying VMware Cloud on AWS, your organization can continue to leverage existing, familiar VMware investments. This on-demand service delivers a powerful hybrid cloud solution, combining an industry leader in virtualization, VMware, with the largest cloud provider, Amazon Web Services (AWS). One of the first solution providers to achieve the VMware Solution Competency and a participant in the AWS Partner Initiative for VMware Cloud on AWS, RoundTower is uniquely qualified to help your organization adopt and optimize VMware Cloud on AWS. Watch this webinar to see how they can extend your on-premises data center to AWS, enabling you to gain increased flexibility, a rapidly scalable environment, and faster time to innovation. Download our webinar to learn How to take advantage of flexible consumption models t
Tags : 
    
AWS
Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: SuccessFactors     Published Date: Jun 21, 2012
Discover how you can leverage talent management processes to drive business execution.
Tags : 
human resources, talent management, business execution
    
SuccessFactors
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.