Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

over the top

Results 226 - 250 of 350Sort Results By: Published Date | Title | Company Name
Published By: Zilliant     Published Date: Apr 08, 2010
Learn how downstream value-chain players scoop-up margin-dollars manufacturers leave on the table through sub-optimal pricing and discover how technology enables "leapfrogging" to the more-advanced pricing capabilities that can stop it from happening.
Tags : 
zilliant, manufacturing, pricing capabilities, pricing capability matrix
    
Zilliant
Published By: IBM     Published Date: Jul 25, 2012
As it has been the trend over the last decade, organizations must continue to deal with growing data storage requirements with the same or less resources. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more Service Level Agreements that are difficult to fulfill without IT administrators spending ever longer hours in the data center. Many organizations now expect their capital expense growth for storage to be unstoppable, and see operating expense levers - such as purchasing storage systems that are easy to manage - as the only way to control data storage-related costs.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management
    
IBM
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation, demographic, visitor identification, campaign tracking, lead scoring, progressive profiling, lead qualification, social engagement, multiedvice, multilingual, multisite support, traffic management
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications
    
E-SignLive by Silanis
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters
Published By: HP     Published Date: Oct 01, 2014
Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. Over the next 12 months, more than half of enterprises will prioritize building internal private clouds. Today, the most common approach is through the purchase of commercial software to layer atop existing infrastructure resources. Regardless of the approach you choose, there’s no shortage of tools to support your efforts.
Tags : 
wave, private, cloud, solutions, application, templates, catalogs, services, capabilities, complex, infrastructure, virtual, private, management, pervasive, tools, it management, cloud computing
    
HP
Published By: WayUp     Published Date: Dec 22, 2015
There are a number of misconceptions floating around about college students that may cause employers to pass over their applications. Pop culture depicts college students as lazy, irresponsible, and unreliable, yet we have found they’re an extremely beneficial addition to any growing business. Download this whitepaper to learn the top four reasons college students are the best hires for part-time positions.
Tags : 
college students, part-time workers, part-time hires, recruitment, technology, millennials
    
WayUp
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
The insurance industry generates nearly $2 trillion a year in revenue- yet still runs on paper-based processes. Read the report and discover the top 10 reasons why Insurance Companies choose DocuSign for their Digital Transaction Management and eSignature solution. DocuSign is revolutionizing digital transaction management for all players in the insurance sector.
Tags : 
    
DocuSign
Published By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why it’s captured the attention of top executives across the globe. It’s intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: Jun 22, 2018
Businesses like yours rely on e ective internal and external connections between employees to operate e ciently. But you might be discovering that the old ways of conveying important business messages are no longer enough for your sta . Relying only on telephone calls, email, and face-to-face meetings alone could be now considered a competitive disadvantage. It also makes it more di cult to attract top talent, and inhibits the communication speed most enterprises now require.
Tags : 
    
Epson
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free IDC analyst report, discover why coordinating the activities of marketing and sales—from day one of the revenue cycle—is essential for profitability. Learn how to stop the revenue loss that occurs during a prospect handoff; how to give sales the freedom to target more efficiently, while enabling marketing to build better prospect relationships; and how to choose software that tightens the marketing/sales alignment. Download your copy of this insightful report now.
Tags : 
marketing, sales, alignment, coordination, software, leads, sales leads, demand generation, marketing automation, sales quota, sales training, sales roi, marketing roi, sales efficiency, sales-marketing integration, sales-marketing coordination, crm, customer relationship management, lead nurturing, lead recycling
    
Marketo, INC.
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
    
Webroot
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this survey for an overview of the priorities and needs of the top search marketers around the globe. With over 500 search algorithm changes in the past year, this survey seeks to offer guidance on how leaders continue to stay ahead in the competitive search marketing industry.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment, seo platform, seo platform software, seo software, seo success stories, seo white paper, seo white papers, seo case study, seo case studies, seo technology, seo tool, seo tools, seo tracking
    
BrightEdge
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data center
    
Intralinks
Published By: Panorama     Published Date: Jan 22, 2014
To help organizations evaluate their Business Intelligence needs, Panorama Software has built a vendor agnostic multi-vendor evaluation work sheet. Organizations can rank as many vendors as they wish in a spread sheet that contains over 150 features. All data is then aggregated into a results sheet, displaying your top options.
Tags : 
panorama, business intelligence, bi vendors, free tools, bi matrix, intelligence, buyers guide, data management, business analytics
    
Panorama
Published By: VMware AirWatch     Published Date: Dec 09, 2016
To streamline the process of maintaining desktop environments, many IT managers are turning to mobile-cloud first approaches to application and desktop delivery. And if your business is in a similar transition, due to trends in BYOD, changing application delivery models, and worker mobility, your end-user computing environments could be becoming overly complex. To combat this rising complexity, you need to consider implementing hybrid consumption models that work at scale and address security threats. Read this white paper that details how the next generation of desktop architectures is taking mobility into account and how IT strategies are shifting from managing devices to managing users.
Tags : 
    
VMware AirWatch
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.