Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

providers

Results 526 - 550 of 959Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
5G services will place greater demands on the network in terms of peak data rates, connection density, and more. Learn how CoSPs are getting ready for 5G and how Intel® architecture is helping accelerate network transformation.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
Gartner predicts that the public cloud market will surpass USD 300 billion by 2021 . With the big players (Amazon, Google, Microsoft and IBM) taking home 63 percent of the market share , how will next wave CSPs stand out from the crowd? Download Intel's latest whitepaper, Differentiating for Success: A Guide for Cloud Service Providers' to discover how to offer unique services, including: - Providing workload-specific optimizations, for example machine learning or high-performance computing - Targeting a particular geographical area - Focusing on an industry, such as financial services - Delivering emerging technology, such as virtual reality, in-memory databases, and containerization
Tags : 
    
Intel
Published By: Intel Corp.     Published Date: Apr 25, 2012
Security technologies built into Intel® Xeon® processor-based servers give cloud solution providers tools for security challenges.
Tags : 
cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Download this guide, which is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed by three cloud infrastructure providers.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
To put it carefully, certain technology decisions at the federal level since 2002 have been questionable. But citing new “Cloud First” policies for implementations in government contact centers, data centers, and federal agencies, cloud initiatives are now showing value by way of cost reductions and broader functionality. Abdo Rabadi of Blue Kite Consultants and Mechele Herres of Interactive Intelligence say even more benefits of the cloud await. Read how the federal government can best achieve them.
Tags : 
interactive intelligence, cloud communications, cloud, cloud solutions, government, cloud providers, business process automation, contact center
    
Interactive Intelligence
Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security
    
Intermedia
Published By: Internap     Published Date: Mar 30, 2015
In this white paper, Cloud Spectator reveals the results from a normalized comparison of performance between two cloud providers’ services, Amazon Web Services (AWS) EC2 and Internap AgileCLOUD. The analysis considered each provider’s IaaS functionality, price, and performance in typical cloud-hosted workloads.
Tags : 
internap, agile, iaas, public cloud, infrastructure, storage, cloud, agile
    
Internap
Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and up-time, and the availability of reporting and audit trails.
Tags : 
intralinks, technology, saas, confidential data, dada cloud computing, security, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
The findings of this report provide a fascinating insight into the repercussions of the changing relationship between consumers and banks. Whereas the majority of people were once unwaveringly loyal to their banking provider of choice, they now take advantage of the latest technologies to proactively seek the best deals available and switch providers without thinking twice.
Tags : 
creative, relationship, customer, banks, research, consumer
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Technology offers the opportunity for brands to compete - and win - on a rising standard of customer service delivery. Changing cornerstones of engagement: consumers may seem like they stick with their service providers no matter what, but marketers can’t be complacent. To stop their valued customers adding services elsewhere, organizations need to fulfill a new set of standards.
Tags : 
management, call center, website, mobile, app
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: ipoque     Published Date: Feb 14, 2019
Area of business ? Leader in virtualized mobile networks, providing virtualized network solutions to top-tier CSPs Challenge ? vEPC helps CSPs transform their network architecture in order to move to SDN/NFV, reducing overall costs ? Providers of virtualized network solutions have to create a market differentiator to assert their position successfully in an increasingly competitive marketplace Solution ? By embedding the easy-to-implement highperformance DPI-engine R&S®PACE 2 from Rohde&Schwarz, the vEPC vendor can focus on their core competencies in NFV and gain a competitive advantage in the rapidly growing NFV market Benefits ? The strong partnership between the vEPC vendor and Rohde&Schwarz ensures the high performance of the vEPC solution ? Sourcing R&S®PACE 2 guarantees a rap
Tags : 
    
ipoque
Published By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : 
ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
Ipswitch
Published By: Jamf     Published Date: Jan 18, 2018
At Jamf we help organizations succeed wit Apple. The Jamf Pro is the leading iOS Mobile Device Management (MDM) tool for organizations to configure, secure, and inventory iPads and iPhones.
Tags : 
    
Jamf
Published By: Jive Software     Published Date: Feb 24, 2014
Providing healthcare is a global, multi-level proposition that transcends single providers. The stakeholders in Cerner’s world are not only clinicians, hospitals, and medical device partners but another whole world of consultants, researchers, and industry experts. Cerner leverages Jive Social Business Software to address a number of their key social business imperatives, including accelerating innovation and providing community-based support. They put Jive to work not only to make their own business operations more productive but to connect priorities and people outside of Cerner to solve broad healthcare issues for the greater good.
Tags : 
jive, cerner, healthcare technology, social business software, collaboration, social networking platform, software solutions, workforce management
    
Jive Software
Published By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
Published By: Juniper Networks     Published Date: Oct 20, 2015
This paper will explore ways that carrier-class routers, previously the domain of telecommunications service providers, can help future-proof data center infrastructure while dramatically improving application delivery, availability, and manageability right now.
Tags : 
juniper, data center, innovation, investment, routers, infrstructure, it management, enterprise applications
    
Juniper Networks
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.