Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

wave

Results 151 - 175 of 392Sort Results By: Published Date | Title | Company Name
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the viability and importance of cloud computing now widely accepted by IT and business leaders alike, the focus of planning, discussion and implementation has shifted to the best approaches for using cloud computing to achieve the all important business goals of agility, flexibility and efficiency. From an architectural standpoint, most organizations have embraced some combination of public and private clouds — sometimes in isolation, other times in concert. But increasingly, large and small organizations alike are taking steps toward the next wave of cloud architecture: hybrid clouds.
Tags : 
private cloud, public cloud, hybrid cloud, cloud computing
    
Dell & Microsoft
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn more about how to capture, analyze and manage a tidal wave of structured and unstructured data, turn this data into operational intelligence, And how to overcome the limitations of databases and data management tools that weren’t designed for a world of big data with Dell.
Tags : 
    
Dell EMC
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: Dell SB     Published Date: Jan 24, 2019
Whether we choose to or not , our businesses are undergoing a rapid digital transformation. To ride this technology wave successfully, we need a modern IT infrastructure. At the heart of this modern IT infrastructure is the server. Choosing the right server that fits both the current and future needs is critical. PowerEdge is introducing its new line of award winning servers that is custom - built for the modern IT infrastructure. Since b usiness face fierce competition and dynamic customer needs, the Scalable Business Architecture from PowerEdge enables an enterprise to scale efficiently and adapt quickly to address this dynamic business & workload needs. With Intelligent Automation in new PowerEdge , you can automate more routine tasks and free up skilled resources for business - critical tasks. Finally, w e all know how important security is for all operations. PowerEdge protects businesses and their customers with its sophisticated Integrated Security fea
Tags : 
    
Dell SB
Published By: Docker     Published Date: Feb 21, 2019
Why Read This Report In Forrester’s evaluation of the emerging market for enterprise container platform (ECP) software suites, we identified the eight most significant providers in the category — Docker, IBM, Mesosphere, Pivotal, Platform9, Rancher Labs, Red Hat, and SUSE — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Enterprise architects can use this review to select the right partner for their enterprise container platform needs.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker
Published By: DocuSign     Published Date: Mar 23, 2016
Customer Relationship Management (CRM) platforms have been around for more than a decade, but they are no longer just for big enterprises selling expensive technology. Now companies of all sizes and industries are enjoying the power of CRM systems to improve sales effectiveness and customer loyalty. The key to this new wave of adoption are the many valuable add-ons and integrations, like DocuSign, that can greatly augment the user experience. This ebook explores ways to improve your CRM productivity and usability.
Tags : 
    
DocuSign
Published By: Dynatrace     Published Date: Apr 16, 2018
Application performance management (APM) is an IT discipline that continues to evolve as new technologies appear. The new wave of microservices architecture and containerization has led to what is referred to as cloud-native development, and this approach has one of the fastest adoption rates of any new technology we have witnessed. With cloud-native environments there is the need to monitor and manage these new types of applications, but the challenge is that they are quite different from traditional monolithic systems. This report delves into what the differences are, how these affect how they are monitored, and how a new generation of vendors have stepped up and introduced novel solutions to meet these challenges. We also examine the incumbent leaders in the APM market that have transformed their solutions to expand and cover cloud-native environments.
Tags : 
    
Dynatrace
Published By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : 
virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits, servers, data center
    
Eaton
Published By: Echelon     Published Date: Feb 19, 2015
Parking lot, area, and pathway lighting that burns all night represents a significant source of energy waste and contributes to needless sky glow and light pollution. Learn how that can be avoided with this whitepaper.
Tags : 
outdoor lighting, commercial lighting, wireless outdoor lighting, rf outdoor lighting, lighting controls, outdoor lighting controls, outdoor lighting solutions, lumewave, echelon, public safety, energy savings, light pollution, energy savings, pole spacing, sensor coverage, safety, public safety
    
Echelon
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave
Published By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation, filtering, filter, demands, short-term, long term security
    
EdgeWave
Published By: EdgeWave     Published Date: Oct 15, 2011
In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.
Tags : 
web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email, cyber crime, criminals, threats
    
EdgeWave
Published By: Endace     Published Date: Dec 28, 2012
In the same way that our 2011 monitor explored the impact of 10gbps networking on large organizations, our 2012 Network Visbility Monitor explores the impact that the latest wave of network-centric technologies.
Tags : 
endace, network visibility survey, network, visibility, 2012, technology, network centric, it management, data center
    
Endace
Published By: Engagio     Published Date: Jun 28, 2018
ooking for an Account Based Marketing solution? Read The Forrester New Wave™: ABM Platforms, Q2 2018 2018 Forrester Wave Report to learn why Engagio was named a strong performer. Customers praised Engagio’s ability to orchestrate marketing and sales motions as well as the breadth and depth of its analytics and assessment capabilities. Read to discover: - The 14 ABM providers that matter the most and how they stack up - How to select the right technology partner for your ABM needs - The Forrester ABM platform evaluation criteria used - Why Engagio was named a Strong Performer
Tags : 
    
Engagio
Published By: Equinix     Published Date: Mar 26, 2015
Connections are great. Having a network to connect to is even better. Humans have been connecting, in one form or another, throughout history. Our cities were born from the drive to move closer to each other so that we might connect. And while the need to connect hasn’t changed, the way we do it definitely has. Nowhere is this evolution more apparent than in business. In today’s landscape, business is more virtual, geographically dispersed and mobile than ever, with companies building new data centers and clustering servers in separate locations. The challenge is that companies vary hugely in scale, scope and direction. Many are doing things not even imagined two decades ago, yet all of them rely on the ability to connect, manage and distribute large stores of data. The next wave of innovation relies on the ability to do this dynamically.
Tags : 
data center, interconnectivity, mobile, server clusters, innovation, data storage
    
Equinix
Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC
Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the information you need to help you make better decisions before purchasing and deploying 802.11ac Wave 2.
Tags : 
extreme networks, 802.11ac wave 2, 802.11ac, networking, wireless, wireless wlan, wireless lan network, wifi standards, enterprise wireless network, wireless infrastructure, wireless network design
    
Extreme Networks
Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the 5 key justifications required to build a winning business case for your upgrade to the 802.11ac Wave 2 standard.
Tags : 
extreme networks, networking, wireless, wireless networking, 802.11ac wave 2, 802.11ac, networking, wireless, wireless wlan, wireless lan network, wifi standards, enterprise wireless network, wireless infrastructure, wireless network design
    
Extreme Networks
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats, threat vectors, service platforms, mitigation, network architecture, network management, network security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: FICO     Published Date: May 11, 2017
Competing in telecommunications markets is becoming extremely complicated. Responding to disruptive change from many directions, telecom companies are experimenting with new business models and offering new types of services. With this comes the potential to draw new waves of regulatory oversight, further complicating the picture.
Tags : 
customer experience, customer management, telecom, customers
    
FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.