connection

Results 26 - 50 of 445Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Aug 17, 2017
Digital experiences on mobile connections suffer from performance issues, and impatient users compound the challenges that slower, intermittent mobile connections raise. Firms need to build a new discrete delivery tier to improve users’ perception of mobile performance and drive conversion and engagement. By dynamically adjusting to context, this new delivery tier can adaptively send the right assets, optimize the sequence, and modulate streaming rich media. this report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace. this is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : mobile performance, technology, digital experience, media
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 12, 2017
The modern digital experience is very much a visual experience. It's through images that we tell our stories, market our products, impart news, and entertain — and forge an emotional connection with our customers. However, delivering today's increasingly image-rich experiences is fraught with complexity. It requires dozens of renditions to optimize an image for all the devices that customers are using, not to mention their current network connection. Without an automated system, it's a daunting task. Dynamic imaging technology is the solution.
Tags : digital experience, imaging, imaging solution, system automation, customer experience
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 14, 2018
Delivering a hit PC game isn’t easy. You’ve got to worry about frictions like slow downloads, unstable connections, and security flaws — any of which can cause players to abandon for good and doom your game to failure. Akamai’s Quick Start Guide: Global Game Launch, PC Edition can take some of the complexity— and anxiety— out of your next game launch. You’ll learn how Akamai can help you succeed at each of the four key steps of game release — Develop, Promote, Deliver, and Play — so you can keep your players engaged with a seamless, secure game experience.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
     Akamai Technologies
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
     Amazon Web Services
By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
     Amazon Web Services
By: AMD     Published Date: Jul 20, 2012
Server virtualization falls within the domain of IT operations but it can very much be a business matter with a measurable impact on the bottom line. Esoteric as it may seem from a business perspective, the server platform, powered by the processor.
Tags : virtualization, cloud connection, public cloud, private cloud, private/public hybrid, virtual power equation, data processing, virtual machine density, silicon, system management, scalability, networking, it management
     AMD
By: AMD     Published Date: Jul 23, 2012
Virtualization and the cloud have effectively become mandates for IT. Though we are still somewhat early in the virtualization and cloud lifecycles, it's quite clear that these two technologies are going to become major, if not dominant models of IT.
Tags : cloud computing, virtualization, scalability, memory management, server density, maintainability, workload management, network connections, processor connections, business agility, server consolidation, business continuity, amd, it management, data center
     AMD
By: Anaplan     Published Date: Sep 07, 2018
Innovate the supply chain, improve the business For many companies, supply chain performance affects 100 percent of company revenue but only part of the income statement. Supply chain problems have significant impact across the rest of the business, as do supply chain successes. If you could improve the health and visibility of your supply chain and your business, wouldn’t you? Together with Supply Chain Management Review (SCMR), Anaplan surveyed dozens of supply chain leaders about the effectiveness of their supply chain management strategies. Survey data capturing trends in supply chain challenges and opportunities Practical tips on improving supply chain performance Insight on the important connection between supply chain and business performance
Tags : 
     Anaplan
By: ArborNetworks     Published Date: Sep 16, 2015
Don't ignore DDoS; instead, take preventive action. With that in mind, IDC believes that hybrid defense scenarios (on-premises equipment married with cloud services) will continue to grow as organizations seek to parry advanced application and large-scale volumetric attacks and as solution providers and product vendors work to deliver joint solutions.
Tags : networking, security, it management
     ArborNetworks
By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce
     ASG Software Solutions
By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
     Astrocom
By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : dsl, cable, internet, internet connection, connection, connectivity, data line, at&t, att, connection speed, isp, networking
     AT&T
By: athenahealth     Published Date: Sep 05, 2013
Lacking a method to share clinical data across 70+ providers, Carolina Health Specialists® needed an EHR to stay current, improve visibility, and achieve Meaningful Use.
Tags : healthcare, healthcare providers, carolina health specialists, health specialists, ehr, meaningful use
     athenahealth
By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office – like mobile phones, wearables, tablets, and even desktop phones – and the need becomes even greater.
Tags : atlantic broadband, transmit, data, payroll, cloud, data
     Atlantic Broadband Business
By: AtTask EMEA     Published Date: Mar 11, 2014
Work chaos is the fiend that plagues enterprise teams. It emerges as a result of serious work mismanagement and can take a variety of forms. Understand the mismanagement and how to slay your work chaos dragons for good.
Tags : enterprise, efficiency, disconnection, chaos, management, best practices, technology
     AtTask EMEA
By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail, networking
     Aventail
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, enterprise applications
     Bitium
By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : predictive, advantage, cylance, protect, cloud, connect
     BlackBerry Cylance
By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : bluevolt, extended enterprise, lms, learning management system, channel, training
     BlueVolt
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com