Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

stack

Results 251 - 275 of 322Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Persicope Data     Published Date: Mar 07, 2018
SQL is a critical skill for business intelligence. From accessing to transforming to reporting on data, SQL gives you the power to get the job done. It can help you discover exactly how your company is performing, what your customers are doing, or how people have reacted to your marketing campaigns. Unfortunately, while SQL can tell you what has happened, it can’t tell you what will happen. What if you have questions like: • How valuable is a lead based on company attributes and their behavior on our website? • How much MRR will we generate in the next 30 days? • Which customers are likely to churn next month?
Tags : 
    
Persicope Data
Published By: Juniper Networks     Published Date: Aug 08, 2017
As the business turns to IT to enhance operational efficiency across the enterprise network—spanning the campus, data center, and branch—no organization can afford for its network to serve as the weak link. This IP Networking Comparison Guide examines four key aspects of the comprehensive enterprise network and looks at key factors within each area. This document will give you a clear perspective on how the various options stack up on the most important features and capabilities necessary to empower innovation.
Tags : 
    
Juniper Networks
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Tealium     Published Date: Feb 20, 2015
Marketing Complexity Got You Down? Download our new guidebook: “How to Tame the Digital Marketing Beast™.”
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital, cloud computing
    
Tealium
Published By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : 
backup, data deduplication, deduplication, sepaton, tco
    
SEPATON
Published By: Cloudian     Published Date: Feb 15, 2018
We are living in an age of explosive data growth. IDC projects that the digital universe is growing 50% a year, doubling in size every 2 years. In media and entertainment, the growth is even faster as capacity-intensive formats such as 4K, 8K, and 360/VR gain traction. Fortunately, new trends in data storage are making it easier to stay ahead of the curve. In this paper, we will examine how object storage stacks up against LTO tape for media archives and backup. In addition to a detailed total cost of ownership (TCO) analysis covering both capital and operational expenses, this paper will look at the opportunity costs of not leveraging the real-time data access of object storage to monetize existing data. Finally, we will demonstrate the validity of the analysis with a real-world case study of a longstanding network TV show that made the switch from tape to object storage. The limitations of tape storage go way beyond its lack of scalability. Data that isn’t searchable is becoming
Tags : 
    
Cloudian
Published By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : 
workforce management, streamline hr, workforce management solutions, sumtotal
    
SumTotal
Published By: Adobe     Published Date: Nov 10, 2015
This report reveals how well each vendor fulfills our criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals select the right partner for their digital experience platform needs.
Tags : 
top ten software providers, software providers, top ten vendor, digital experience, adobe
    
Adobe
Published By: Adobe     Published Date: Oct 30, 2014
This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help customer insights (CI) professionals select the right partner for their campaign management needs.
Tags : 
cross channel campaign management, top vendors for cccm, adobe, marketing software
    
Adobe
Published By: Red Hat     Published Date: Jan 06, 2014
Growing business demand for new applications has put a strain on IT organizations leading to the need for an effective PaaS to accelerate app development processes. Explore PaaS market trends, benefits and an in-depth look at OpenShift Enterprise by Red Hat in this IDC Technology Spotlight.
Tags : 
enterprise, paas, openshift, openshift online, red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing
    
Red Hat
Published By: Cisco     Published Date: Jan 05, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Not long ago Gartner released an oft-quoted statistic: 95% of private clouds fail. According to Tom Bittman, VP Distinguished Analyst at Gartner, of 140 customers polled, 95% reported “something was wrong” with their private cloud. Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Identifying a shortcoming and labeling it a “failure” might be a bit of hyperbole, but it still leaves enterprises wondering if there is a place for private cloud in their strategy. This paper will attempt to answer this question, and will focus on the role of OpenStack in particular as a private cloud solution.
Tags : 
    
Cisco
Published By: Brandwatch     Published Date: Nov 03, 2016
Learn how social media intelligence can fill gaps in your research mix. We provide six unique benefits of social media research, four key layers of the social intelligence stack and eight core applications of social media data for modern businesses.
Tags : 
social media, consumer insights, market research, b2b marketing, consumer market insights, social data, social insights, social listening, social intelligence, business intelligence, voice of the customer, social intelligence platforms, social listening platforms
    
Brandwatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.