Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

service

Results 1 - 25 of 6654Sort Results By: Published Date | Title | Company Name
Published By: FNT     Published Date: Jan 29, 2018
This report contains a holistic perspective on key emerging markets in the enterprise IT space.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it, fnt_white_papers
    
FNT
Published By: FNT     Published Date: Jan 29, 2018
Download this edition of Pipeline examining the competitive advantages of Multi-Tenant Data Center and hosting providers.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it, fnt_white_papers
    
FNT
Published By: FNT     Published Date: Feb 09, 2018
Download this white paper to learn how you can best integrate and capitalize on a combination of data center resources.
Tags : 
colo, colocation, datacenter, connectivity, cloud, multi-tenant data center, mtdc, hybrid it, fnt_white_papers
    
FNT
Published By: Trend Micro     Published Date: May 11, 2015
Read more about security solutions designed to protect your applications running on the AWS Cloud.
Tags : 
data center, cloud
    
Trend Micro
Published By: QTS     Published Date: Apr 09, 2015
There are no one-size-fits-all outsourcing solutions. IT organizations need granular customization and flexibility to architect systems that support their unique requirements. Download this report to find out more.
Tags : 
cloud infrastructure, choosing the right provider, data centers, cloud computing
    
QTS
Published By: Panduit     Published Date: Apr 21, 2015
DCIM tools support the diverse needs of colocation providers, large enterprises/managed service providers and midsize enterprises. This research provides data center managers with insight into seven DCIM tools and their ability to support these three uses cases.
Tags : 
dcim tools, data center infrastructure
    
Panduit
Published By: Trend Micro     Published Date: May 11, 2015
Read more about security solutions designed to protect your applications running on the AWS Cloud.
Tags : 
#cloud
    
Trend Micro
Published By: Juniper supplement     Published Date: Sep 22, 2015
Web services An examination of those organizations using web services successfully and find that they have chosen their networking infrastructure carefully and taken advice about future upgrade strategies. SDN and NFV We look at whether software defined networking (SDN) or network functions virtualization (NFV) will solve the problem of the sheer volume of new applications, and when they are likely to fulfil their promise. 9 Infographic Inside information from Juniper Networks on how to avoid that cyberattack and if you can’t – how to neutralize it. 10 Internet of Things How will you deal with the 1.6 zettabytes of data the Internet of Things is preparing to throw your way? Get your smart spectacles out and read how! 14 Colocation We take a look at why the rapid growth in cloud Services could very well be a big help for co-location – a sector which is still growing very nicely thank you.
Tags : 
data center design and management
    
Juniper supplement
Published By: Spectrum Enterprise     Published Date: Feb 27, 2018
H&S Ventures provides management services for the Anaheim Ducks hockey team and its home-ice venue—the Honda Center. This popular indoor arena hosts scores of events and concerts, and H&S oversees everything from ticket sales to marketing and finance. H&S’s performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans’ satisfaction and their average “spend.”
Tags : 
enterprise, digital, connection, revenues, marketing, tactics, technology
    
Spectrum Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
Now there's an innovative new way to move enterprise applications to the public cloud while actually reducing risks and trade-offs. It's called multi-cloud storage, and it's an insanely simple, reliable, secure way to deploy your enterprise apps in the cloud and also move them between clouds and on-premises infrastructure, with no vendor lock-in. Multi-cloud storage allows you to simplify your infrastructure, meet your service-level agreements, and save a bundle.
Tags : 
hpe, multicloud, storage, private cloud, public cloud, digital
    
Hewlett Packard Enterprise
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
The Cisco® Incident Response team is led by elite security specialists who can uncover the source of threats by analyzing and synthesizing intelligence from multiple sources. These sought-after specialists consistently deliver resolution in a shorter timeframe, returning businesses like yours to normal. Fast.
Tags : 
security, research, analyze, investments, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Businesses in every sector are increasingly reliant on applications to handle everything from back-end operations to the delivery of new products, services, and customer experiences. That is why infrastructure system availability and the elimination of unplanned downtime are more important than ever before. Recent research has shown that the average cost of an hour of downtime is about half-a-million dollars,1 and this will only increase with the continued digitization of industries.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Oracle     Published Date: Feb 16, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : 
iaas, business, legacy, infrastructure, oracle, organisations
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
There is no doubt that enterprise cloud is a new and improved IT strategy. Cloud services have proven to improve organizational agility and reduce the burden of IT infrastructure and cost. Moving to the cloud is no longer a question of “if” but “when” and “how.” Most enterprises we interviewed are moving to cloud in phases over time and matching workloads to their perceptions of a vendor’s cloud capabilities that will best support their objectives. Many will require the ability and flexibility to support multivendor cloud and multiple deployment choices (e.g., public cloud, private cloud, and hybrid cloud).
Tags : 
cloud, enterprise, scale, infrastructure
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Mar 23, 2018
Expectations for Customer Service continue to rise around the globe. Customers expect more from brands when it comes to convenience, resolution times, and agent expertise. Evolving customer preferences are tightly linked to innovations in digital technology, and brands must embrace both in order to keep pace with heightened expectations. The good news is that brands that can deliver on expectations are rewarded with higher rates of customer retention and loyalty. The Microsoft 2017 State of Global Customer Service survey polled 5,000 people from Brazil, Germany, Japan, the United Kingdom and the United States. We continue to find commonalities along with distinct differences between locals. And though people in all age groups are embracing new digital trends, millennials especially are shaping the way brands need to think about the future of customer service engagement.
Tags : 
    
Microsoft
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IDC, la agencia de inteligencia de mercados de TI, realizó un estudio global entre más de 3500 líderes de TI de todo el mundo y descubrió que empresas de todos los niveles están planteándose modelos de PC Lifecycle as a Service para reducir costes, acortar los ciclos de renovación y adquirir mejores equipos para sus empleados. Dell PC as a Service (PCaaS) combina hardware, software, servicios durante el ciclo de vida y financiación en una única solución todo en uno, a un único precio predecible por puesto al mes, proporcionada por Dell Financial Services. Obtenga más información sobre las soluciones Dell con tecnología Intel®
Tags : 
estudio, idc, service, experimentado, adopcion, dell
    
Dell PC Lifecycle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.