capabilities

Results 1626 - 1650 of 1664Sort Results By: Published Date | Title | Company Name
By: TIBCO Software     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
     TIBCO Software
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
     Oracle + Dyn
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development
     Webroot
By: Platfora     Published Date: Aug 03, 2015
A survey of more than 395 C-level executives, sponsored by Platfora, shows that senior leaders are optimistic about the capabilities of big data, but many still struggle with big data applications.
Tags : platfora, big data, hadoop, data center, big data analytics
     Platfora
By: Enterprise Mobile     Published Date: Jul 14, 2014
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile management, device management, mobility planning
     Enterprise Mobile
By: Enterprise Mobile     Published Date: Dec 04, 2014
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications, mobile apps, application management, it management, enterprise applications
     Enterprise Mobile
By: Honeywell     Published Date: Feb 18, 2016
A revolution is taking place, and it’s happening in every corporate office across the globe. Mobile devices have completely transformed the way we work, and with the increasing capabilities of the next generation of devices, the need to incorporate mobility into your strategic planning is only going to increase.
Tags : managed mobility services, mobility-as-a service, enterprise mobile, honeywell enterprise mobility, mobility, enterprise mobility, mobile strategy, mobile management, device management, mobility planning, networking, it management, enterprise applications, platforms
     Honeywell
By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, enterprise applications
     BlackBerry
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     BlackBerry Cylance
By: CA Tech     Published Date: Jan 04, 2016
This white paper reveals the key capabilities of an application performance management solution.
Tags : customer experience, applications, application experience, user experience, software
     CA Tech
By: PWC EMEA     Published Date: Nov 14, 2019
The transition to New Energy is generating more and more investment opportunities than ever. Because New Energy M&A are often in areas which are either adjacent to the existing business, or completely new to it, the acquiring company will frequently need to build new capabilities and acquire new skill sets. This is where getting a grasp of culture is critical. To explore the role of culture in new energy and the critical part it has to play, we interviewed senior decision makers at both acquiring and acquired organisations. What do the findings tell us about culture? Culture should be treated with as much importance in a deal as the valuation multiples. Ultimately, it will be those who can fuse financial engineering with culture management who will emerge as winners in the New Energy space. Our report Creating Value Beyond the Deal: Why culture is critical in New Energy deal making found: 1. M&A is just as much about importing a new culture as well as acquiring new capabilities 2. A f
Tags : 
     PWC EMEA
By: 3D Systems     Published Date: Aug 29, 2019
As a mold maker, you have probably experienced challenges with your current software including working with multiple solutions, inefficient mold design capabilities, poor technical support and many more. By switching to an integrated CAD/CAM software that’s dedicated for mold design and manufacturing, you can reduce delivery times, improve tool quality and gain a competitive advantage. Download this whitepaper to learn more about why you need an integrated solution, as well as the key elements to look for in a CAD/CAM solution.
Tags : cad cam, cad/cam, cad/cam software, cad software, cam software, mold, mold design, mold design software, injection molding, injection mold, injection mould, injection moulding, injection mold design, plastic mold design, cad cam software, milling, machining, tooling, electrode, cimatron
     3D Systems
By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : talent management, employee enagement, human resources
     Achievers
By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need.
Tags : 
     Achievers
By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : endace, technology, white paper, network, network monitoring, network management, networks, reliability
     Endace
By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. It’s simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : ibm, technology, information technology, it management, data management, data center
     IBM
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
     Trend Micro SaaS
By: Datastax     Published Date: Aug 23, 2017
Relational databases had their day and are still viable for certain use cases, but the advent of the cloud and subsequent proliferation of cloud applications is putting an almost unmanageable burden on their capabilities. Read this eBook to learn why your RBMS fails at scale, and why it’s no longer a viable option for today’s distributed, super fast-paced, cloud-friendly world.
Tags : cloud, application, rbms
     Datastax
By: Datastax     Published Date: Aug 07, 2018
Relational databases had their day and are still viable for certain use cases, but the advent of the cloud and subsequent proliferation of cloud applications is putting an almost unmanageable burden on their capabilities. Read this eBook to learn why your RBMS fails at scale, and why it's no longer a viable option for today's distributed, super fast-paced, cloud-friendly world.
Tags : 
     Datastax
By: Jive Software     Published Date: Mar 11, 2013
There's a better way to manage deals -- For a sales organization, email and CRMs don't enable precise teamwork. Read this white paper to learn how social business tools bring critical deal management capabilities.
Tags : sales execution, sales effectiveness, social technology, sales tools, sales enablement, social business, enterprise applications
     Jive Software
By: Lumension     Published Date: Sep 18, 2012
Windows 7 AppLocker | Understanding its Capabilities and Limitations
Tags : intelligent white listing, limitations, lumension, windows 7 applocker
     Lumension
By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments
     Texas Instruments
By: Workday     Published Date: Mar 24, 2015
This Case Study illustrates the HC management, financial management, payroll, expenses and procurement solutions offered by workday.
Tags : workday solutions, business benefits of workday, tripadvisor, tripadvisor and workday, business case tripadvisor, workday human capital management, workday financial management, software, unified suite, global workforce, mobile capabilities
     Workday
By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : workday, workday technology, digital strategy, financial auditing
     Workday Nordics
Start   Previous    53 54 55 56 57 58 59 60 61 62 63 64 65 66 67    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com