Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

software

Results 1 - 25 of 5402Sort Results By: Published Date | Title | Company Name
Published By: DCD     Published Date: Apr 20, 2017
Contents Features - Automatic for the people - Let's aim for business defined! - Peace, love and SDN Opinion - SDDC has to get critical
Tags : 
data center, software-defined, sdn, networking
    
DCD
Published By: QTS     Published Date: Oct 12, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. The impact of data is being felt beyond the IT department; it is reverberating through every aspect of our lives.
Tags : 
data center, cloud computing, software-defined, it infrastructure, telecom
    
QTS
Published By: Raritan     Published Date: Oct 10, 2016
As our businesses become increasingly digital, we tend to think about technology in non-physical terms. Our IT infrastructure becomes “the cloud.” Our servers and storage become “virtual.” Our networks become “software-defined.”
Tags : 
data center, cloud computing, software-defined, it infrastructure, networking, security, it management
    
Raritan
Published By: Juniper supplement     Published Date: Sep 22, 2015
Web services An examination of those organizations using web services successfully and find that they have chosen their networking infrastructure carefully and taken advice about future upgrade strategies. SDN and NFV We look at whether software defined networking (SDN) or network functions virtualization (NFV) will solve the problem of the sheer volume of new applications, and when they are likely to fulfil their promise. 9 Infographic Inside information from Juniper Networks on how to avoid that cyberattack and if you can’t – how to neutralize it. 10 Internet of Things How will you deal with the 1.6 zettabytes of data the Internet of Things is preparing to throw your way? Get your smart spectacles out and read how! 14 Colocation We take a look at why the rapid growth in cloud Services could very well be a big help for co-location – a sector which is still growing very nicely thank you.
Tags : 
data center design and management
    
Juniper supplement
Published By: Eaton     Published Date: Sep 29, 2017
Exploiting the Software Advantage Lessons from Digital Disrupters
Tags : 
datacenter, cloud, technology, digital, datacenter, datacentre_strategy_and_evolution, networking, data center
    
Eaton
Published By: Nlyte     Published Date: Nov 17, 2017
How to cut down costs and manual labor from adopting a Nlyte DCIM solution?
Tags : 
software, dcim, nlyte, data center, data managment, nlyte_nam_case_studies
    
Nlyte
Published By: Nlyte     Published Date: Nov 17, 2017
Nlyte Energy Optimizer, a comprehensive solution, replaces outdated software to allow Mentor Graphics to easily and quickly monitor infrastructure in 18 countries.
Tags : 
    
Nlyte
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Wat is netwerkbeveiliging? Netwerkbeveiliging omvat elke activiteit die is bedoeld om de bruikbaarheid en integriteit van uw netwerk en gegevens te beschermen. Dit betreft zowel hardware- als softwaretechnologieën. Met effectieve netwerkbeveiliging wordt de toegang tot het netwerk beheerd. Hierbij worden diverse bedreigingen gestopt zodat deze zich niet verder kunnen verspreiden op uw netwerk en hackers geen toegang krijgen.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn about the HPE Intelligent Data Platform and the new IT realities it addresses. With digital transformation underway in many organizations, more dynamic business models are becoming the key to success. This means infrastructure modernization and the introduction of technologies such as solid state storage, artificial intelligence and machine learning, software-defined infrastructure, and the cloud. At the same time, it means IT infrastructure management becomes much more complex. Enter HPE’s Intelligent Data Platform. With comprehensive coverage and AI/ML-driven real-time optimization that enables intelligent management of the entire data life cycle, the HPE Intelligent Data Platform enables an organization to get the most out of its IT resources while also meeting its evolving needs over time.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
"Learn how to manage a software defined infrastructure SDI deployment and understand the benefit of composable versus traditional infrastructure. The white paper will also cover the definition of an SDI as well as what an IT organization should look for in an SDI solutions provider. Explore these questions in this white paper with a critical look at HPE’s software-defined and CI offering, HPE Synergy."
Tags : 
    
Hewlett Packard Enterprise
Published By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”
    
Kustomer
Published By: Kustomer     Published Date: Aug 27, 2019
The modern-day customer expects their needs to be met immediately, no matter the channel. Drive meaningful customer relationships, increase revenue streams and improve operational performance, with omnichannel support.
Tags : 
customer service, customer support, customer experience, customer service software, “conversational commerce, omnichannel support, omnichannel customer service, omnichannel customer support
    
Kustomer
Published By: Kustomer     Published Date: Aug 27, 2019
Your customers crave and deserve a stellar customer service experience. Learn three ways to deliver personalized support and earn lifelong brand loyalty.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “personalized customer service”, “customer service personalization”, “personalized customer support”
    
Kustomer
Published By: Kustomer     Published Date: Sep 13, 2019
To succeed in this new era of customer service, retailers must figure out how to personalize the way they connect with customers. Find out why personalizing your support strategy is crucial for your business — and how to do it.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”
    
Kustomer
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Workable     Published Date: Oct 09, 2019
Do you need an ATS? Broadly speaking, we’ve found three common scenarios driving the search for a better way to hire: Growing pains - companies with growing pains are typically looking for some predictability and structure across candidate sourcing and hiring. Drowning in email and spreadsheets - companies are looking for more efficient ways to manage candidates and collaborate as a team Outdated software - companies are looking for a modern, efficient approach to deliver on the original promise of an ATS A modern ATS, chosen with the right criteria, will relieve these common pain points. Take a step back and think about how your recruiting could be improved with the right tool.
Tags : 
    
Workable
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Cisco has been named in the first ever Gartner ‘Voice of the Customer’ report for the Secure Web Gateways (SWG) market for Cisco Umbrella. Gartner Peer Insights is a peer review and ratings platform designed for enterprise software and services decision makers. This document synthesizes Gartner Peer Insights’ content in the SWG market for 2018. Gartner states that ""this peer perspective along with the individual detailed reviews, is complementary to expert research and should play a key role in the customer buying process."" This report includes: - SWG Peer Reviews and Ratings - Vendor comparisons - Reviewer demographic"
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
In September, leading insurance professionals joined TIBCO for an exclusive and interactive roundtable dinner. During the course of the discussion, it became clear that while AI will significantly alter the customer journey, a lot still needs to be done in terms of both defining AI's capabilities as well as acknowledging where it best fits in an insurance business, how it will impact the workforce and reinvent the customer journey.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jun 14, 2019
Reinventing the Yellow Pages Directory: How YellowAPI Became an Engine for Digital Transformation
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.