Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

row based

Results 176 - 200 of 241Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : 
mssp, idc, idc marketscape, global managed security services, ibm, security, it management
    
IBM
Published By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : 
ibm, b2b, cloud, b2b integration, cloud computing
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Companies rely on an expanding set of applications to compete in today's rapidly evolving business environment: - They rely on a fast-growing array of applications and devices (email, collaboration tools, and smartphones/tablets) to communicate and conduct business with customers and business partners. - They are creating, collecting, and repurposing large, unstructured data sets in life sciences, geophysics, media, and manufacturing. - They are collecting, storing, and analyzing more social and sensor-generated data about environments, products, customers, and transactions. The promise of better and faster data-driven decision making based on all this information is pushing big data and analytics (BDA) technology to the top of executive agendas. To succeed, CIOs must place a laserlike investment focus on datacenter solutions that allow them to deliver scalable, reliable, and flexible infrastructure for fast-growing BDA environments. Read more to learn how!
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Cloud adoption is growing, but relatively few organizations have advanced cloud strategies. Achieving greater levels of cloud adoption allows organizations to materially improve strategic allocation of IT budgets, lower IT costs, reduce time to provision IT services, increase revenue, and improve ability to meet SLAs. Private cloud adoption is greater than public cloud. Additionally, private cloud/OpenStack adopters are more likely to expect better business outcomes. IDC sees web-scale public cloud making way for enterprise-class “provider-based cloud”.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I be most concerned with? The point is, not all data deserves equal protection. A more effective approach is to understand: • Which data is most critical (also known as “crown jewels”)? • Where does that data reside? • How is it exposed to security risks? • What potential impact would a security breach to this data have on your organization? • What are the appropriate steps to take based on the data’s criticality?
Tags : 
ibm, data, it security, data analytics
    
IBM
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak
Published By: IBM     Published Date: Sep 27, 2013
The challenges faced by midsize businesses remain daunting. An uncertain economic outlook, slow market growth and cost pressures continue to affect most industries. Yet, in most geographies, IT spending by midsize businesses is increasing. This report deals with this cost/benefit equation. Specifically, it compares the IBM i 7.1 operating system deployed on Power Systems with two alternatives: use of Microsoft Windows Server 2008 and SQL Server 2008, and use of x86 Linux with Oracle Database 11g, both deployed on Intel-based servers.
Tags : 
ibm, ibm i 7.1, power systems, it solutions, it costs, risk management, software solutions, it management, enterprise applications
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : 
cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization, infrastructure, internetworking hardware, quality of service, data center design and management
    
Cisco
Published By: Epicor     Published Date: Sep 25, 2014
Companies now need to evolve quickly, which means being able to move some or all business operations to an existing or new ERP instance quickly and inexpensively, anywhere in the world. Small companies are increasingly likely to become multi-national as emerging markets take on larger roles in revenue growth. Larger companies continue to optimize and innovate through organic development, as well as through mergers and acquisitions. In this increasingly competitive environment, the ERP deployment choice is a signi?cant advantage for companies seeking an agile response to constantly changing and often-volatile market conditions. In particular, cloud-based ERP systems are increasingly seen as an effective means for companies to economically deploy new ERP or expand IT operations as their commercial reach broadens globally.
Tags : 
business operations, erp, emerging markets, optimization, innovation, organic development, it operations, it management
    
Epicor
Published By: Epicor     Published Date: Mar 19, 2015
By utilizing an ERP solution that is available as on-premise or cloud-based, your organization can leverage choice for agile response in today’s rapidly changing business environment. What this means for today’s businesses: • The ability to deploy ERP on-premise, in the cloud, or in any combination • Greater adaptability in fluid, dynamic, and always evolving value networks • Faster deployment of solutions, faster upgrades of implemented solutions, staying current with technological advances • Enhanced support of business growth; improved ability to scale up or out to meet emerging opportunities and minimize risk • Powerful yet intuitive tools for easy configuration to specific business needs Flexible deployment, much of it cloud-based, will be the hallmark of ERP systems in the immediate and near future.
Tags : 
erp deployment, cloud-based erp systems, it operations, commercial reach, it management, enterprise applications, telecom
    
Epicor
Published By: Storiant     Published Date: Mar 16, 2015
This Technology Spotlight examines the issues that are driving organizations to replace older archive and backup-and-restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloudbased pricing model.
Tags : 
storiant, data growth, data center, online data, data storage, storiant, big data, analytics implementations, cloudbased pricing model, long-term storage services solution, long-term storage market, cloud computing, data center design and management
    
Storiant
Published By: Calpont     Published Date: Mar 13, 2012
In this white paper you will find insight as to how the Calpont InfiniDB database performs far beyond the abilities of a row-based database.
Tags : 
data warehouse, warehouse, benhcmark, infinidb, calpont, row-based, warehouse, mpp, parallel processing, columns, rows, column, row
    
Calpont
Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, servers, network, pos, ecommerce
    
Comcast Business
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is growing, but relatively few organizations have advanced cloud strategies. Achieving greater levels of cloud adoption allows organizations to materially improve strategic allocation of IT budgets, lower IT costs, reduce time to provision IT services, increase revenue, and improve ability to meet SLAs. Private cloud adoption is greater than public cloud. Additionally, private cloud/OpenStack adopters are more likely to expect better business outcomes IDC sees web-scale public cloud making way for enterprise-class “provider-based cloud”.
Tags : 
cisco, cloud adoption, productivity, open stack, private cloud, public cloud, networking, software development, it management, wireless
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app
    
Citrix Systems, Inc.
Published By: Citrix     Published Date: Jul 25, 2014
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
app, mobile, smartphones, tablets, mobile, email, windows-based, networking
    
Citrix
Published By: Wheelhouse     Published Date: Aug 13, 2013
Changes in a number of areas are transforming business telephony. These changes have varying causes: advances in IP communication technology, the explosion of mobile communication, the growth of cloud-based services, and the proliferation of video conferencing, to name a few. The changes have affected small companies in big ways. In particular, they have given SMBs access to communication capabilities formerly reserved for large companies. But they also have growing potential to affect enterprises. Thus the failure to keep on top of them can leave even the biggest companies at risk of falling behind.
Tags : 
cio, playbook, telphony, video, ip technology
    
Wheelhouse
Published By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when it’s time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers, broadband, it management, wireless
    
Cisco
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics, security
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.