Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

location

Results 226 - 250 of 822Sort Results By: Published Date | Title | Company Name
Published By: Equinix     Published Date: Oct 20, 2015
In real estate, the most important factor is location, location, location! Your services are not quite as sensitive to the physical position of your technology, but location certainly can be a pivotal factor in optimizing your service design and service delivery. Ideally, location shouldn’t matter; however, it does have an e?ect on customer experience. When technology services were simpler, location was largely irrelevant, but now the complexity of new services demands a strategy more in line with your BT agenda than your former IT agenda. The e?ects of regulatory, cost, risk, and performance factors will vary based on the physical location of your technology resources. Colocation providers, cloud service providers, and even traditional hosting services o?er plenty of evolving options to help infrastructure and operations (I&O) professionals balance these factors to optimize service design and delivery.
Tags : 
data center, optimizing service, infrastructure and operations, service design and delivery, cloud service, hosting services, enterprise applications
    
Equinix
Published By: Equinix     Published Date: Oct 20, 2015
Colocation has evolved from simple space and power to become a key element in enterprise networking. Beyond simply connecting compute assets to the enterprise, colocation networking can enable new business models, support the move to hosting and the cloud, and reshape the enterprise WAN.
Tags : 
colocation, enterprise wan, enterprise networking, networking, business model, enterprise applications
    
Equinix
Published By: Equinix     Published Date: Sep 28, 2015
Interconnected Commerce: A Revolution in Value Creation, commissioned by Equinix and produced by Aite Group, discusses the state of the global payments ecosystem and its evolution into a core component of commerce enablement.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Equinix     Published Date: Sep 28, 2015
This paper summarises the main observations extracted from the Interconnected Commerce: A Revolution in Value Creation whitepaper.
Tags : 
mobile payments, mobile wallets, digital wallets, online payments, e-commerce, payment gateways, payment technologies, payment trends
    
Equinix
Published By: Evariant     Published Date: Sep 07, 2016
Marketers face a unique challenge to allocate resources across a variety of tactics to target key audiences that need their product or service – with limited information on what combination of products or services will have the optimum impact, which target audience members are ideal fits, and what allocations will provide the best return on investment to the organization. Healthcare has its own myriad of challenges, including many local, regional, and national options for consumers, service line variations, and disparate demographics. The good news is that there is an emerging understanding of digital and multichannel marketing, and ample opportunity to define best practices, systematically calculate marketing effectiveness and return on marketing investment (ROMI), and use technology and data to create great business outcomes.
Tags : 
evariant, multi-channel marketing, hospital, patient engagement, digital marketing
    
Evariant
Published By: ExpertVoice     Published Date: Jun 17, 2019
I’m not sure if you’ve heard, but people keep talking about how we’re in the midst of a retail apocalypse. It’s this thing where lots of brick-and-mortar locations close down, and even entire companies go out of business. There’s quite a bit of blame to go around: The Great Recession, and Amazon, and private equity, and shifting consumer spending behaviors. In spite of the doomsday headlines, some brands continue to succeed, and a lot of those brands seem to be focusing on one thing: the customer experience. A good retail experience for a customer can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, according to this recent panel surveying retail employees, only 35% of retail employees feel as though training is effective. That’s a scary number for both retailers and brands, because without a well train
Tags : 
    
ExpertVoice
Published By: Extreme Networks     Published Date: Aug 30, 2016
The goal of a Cloud-Managed Network is to make deployment, management and control over network infrastructure devices very easy, offset the need for trained IT staff at remote locations or for geographically dispersed organizations, and it provides both OpEx and CapEx savings. This comprehensive white paper provides you with information needed to successfully guide you through the decision-making process of determining the right network for your business.
Tags : 
extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Feb 24, 2010
Learn how accurate geolocation data can provide greater business value and insight through enhanced visibility.
Tags : 
geolocation, application delivery, unified application, data delivery platform, data integration, content delivery network, cloud balancing, cloud computing
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Because of its location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both function and finance. This paper explores elements to evaluate, like network performance, and security.
Tags : 
application delivery controller, load balancer, load balancing, adc, application delivery, application availability, application security, application scalability
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Feb 02, 2016
Let’s face it, your apps are everywhere. You have more to worry about than ever before: diverse services, cloud and datacenter locations, mission critical SaaS applications and new security threats.  In this report you’ll learn which app delivery services your peers have most broadly deployed, how they are approaching the cloud, and how they are addressing the growing sophistication of security attacks.
Tags : 
application delivery, datacenter locations, saas applications, security threats, app delivery service, it management, enterprise applications
    
F5 Networks Inc
Published By: FICO     Published Date: Sep 02, 2016
Behind FICO® Collections Optimisation is a sophisticated decision modeling capability that quanti es the impact of an organisation’s business decisions and actions on customer outcomes such as revenue, loss and profit.
Tags : 
loans, fico, fico collections optimization, collections and recovery, c&r, resource allocation, roll rate reduction, collector performance
    
FICO
Published By: Flashmaps     Published Date: Aug 16, 2011
Convert your databases into useful geospatial information in a snap! Interactive area maps of the world, USA, Canada, states, counties and more!
Tags : 
flash maps, interactive maps, real-estate maps, world map, city map, street map, us map, state map
    
Flashmaps
Published By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
    
Flexential
Published By: Flexential     Published Date: Jul 17, 2019
The benefits of colocation are well documented, making it easy for organizations to build a compelling business case. Once the decision is made to outsource some or all of your IT infrastructure, there’s plenty of work to do, including selecting the right colocation provider.
Tags : 
    
Flexential
Published By: FNT     Published Date: Jan 29, 2018
This report contains a holistic perspective on key emerging markets in the enterprise IT space.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it
    
FNT
Published By: FNT     Published Date: Jan 29, 2018
Download this edition of Pipeline examining the competitive advantages of Multi-Tenant Data Center and hosting providers.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it
    
FNT
Published By: FNT     Published Date: Jan 29, 2018
Explore how colocation providers can use connectivity to differentiate themselves in today’s saturated market.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it
    
FNT
Published By: FNT     Published Date: Feb 09, 2018
Download this white paper to learn how you can best integrate and capitalize on a combination of data center resources.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it
    
FNT
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.