connection

Results 326 - 350 of 435Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Mar 05, 2018
Download the IDC Analyst Connection report to learn how to address your challenges around: infrastructure costs, data placement, and data analytics.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to find out how Managed File Transfer ensures your data flow is secure and speedy.
Tags : seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
     SEEBURGER, Inc.
By: Cisco     Published Date: Jan 12, 2016
This white paper will discuss the challenges currently facing local educational entities, describe 10 exemplary local alliances that enabled connection to CalREN in California, and finish with a set of recommendations for other local entities wishing to create a successful local consortium that could duplicate this success for themselves and for their local educational ecosystems.
Tags : cisco, byod, connectivity, education, networking environment, networking, security, it management
     Cisco
By: Citrix Systems     Published Date: Nov 13, 2018
Explore the benefits of combining Citrix SD-WAN and Citrix Virtual Apps and Desktops to deliver apps to every user, everywhere. Software-defined WAN (SD-WAN) technology makes it possible to deliver a great user experience, regardless of how great your connection is. Citrix SD-WAN delivers an integrated solution that optimizes the value of Citrix Virtual Apps and Desktops virtual app and desktop delivery. This integrated solution lets you: provide more bandwidth over available connections, optimize performance for real-time network conditions, and ensure always-on connections with a quality experience. Download the eBook: Supercharging your Citrix Virtual Apps and Desktops user experiences with Citrix SD-WAN and learn: -Why WANs have trouble keeping up -How Citrix SD-WAN ensures reliability and optimal experiences -How real customers are utilizing this solution
Tags : 
     Citrix Systems
By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
     Quocirca
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: HP     Published Date: May 05, 2014
Performance testing solves application issues potentially impacting revenue, productivity, and brand recognition: Discover how Telus has reduced the number of performance issues introduced by IT releases and saved well over $10M in business impact costs (revenue loss/workaround expenses/impact on brand name) since 2011 using HP Performance Center. TELUS is a leading national telecommunications company in Canada, with $10.9 billion of annual revenue and 13.1 million customer connections.
Tags : it management, enterprise applications
     HP
By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : .net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development
     DataDirect Technologies
By: SAP     Published Date: Jul 17, 2012
Striving for employees to be able to collect, update, and access data anytime anywhere, organizations are leveraging smartphones and tablets to extend HR data and processes, creating new thresholds of efficiency, decision-making, and competitive advantage. Read this research report for new insights and examples on how mobility is impacting enterprise applications, data and processes, with a particular focus on HR applications.
Tags : technology, white paper, employees, smartphones, tablets
     SAP
By: SAS     Published Date: Aug 04, 2016
Machine learning and the Internet of Things (IoT) are two of the hottest terms out there today for utilities. Both have the power to create an increasingly autonomous grid that can eventually handle billions of endpoints on utility networks, but the industry may not be maximizing the benefit of these disruptive innovations, nor adequately leveraging the connection between the two of them.
Tags : best practices, networks, utility network, autonomous grid, innovation, competitive advantage
     SAS
By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool, remote access trojan, carberp, carbanak
     Vectra Networks
By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Becoming a high-performing team or organization is more than implementing a new process or initiative. Simply launching another program without vision, purpose, connection, meaning, communication, and belief —is just another program, and people see it for just what it is—and the chances that you will be able to move the organization forward are pretty slim. As an organization, how do you make sense of technology, culture, innovation, performance, the talent marketplace, demographics, and the need to deliver results?
Tags : 
     Oracle HCM Cloud
By: SAS     Published Date: Jan 17, 2018
The Connected Customer is an individual who is intimately connected to the data, outcomes, decisions, and staff associated with any relationship to an organization. This intensely personal connection is not just a matter of the most recent transaction, but represents a combination of connected data, connected analytics, and collaborative decisions associated with improving the customer’s relationship with the organization over time. In this report, Blue Hill explores the key traits associated with supporting the Connected Customer through the Internet of Things, and provides guidance on why the Internet of Things will be essential across the general business landscape.
Tags : 
     SAS
By: Oracle     Published Date: Nov 30, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : dns, digital, business, geographically, server, online, retailers
     Oracle
By: Oracle Dyn     Published Date: Dec 06, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : dns, digital, business, geographically, server, online, retailers
     Oracle Dyn
By: Visier     Published Date: Jan 25, 2019
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations—these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to people analytics in order to uncover the important connections and patterns in their data that lead to better workforce decisions.
Tags : 
     Visier
By: Visier     Published Date: Jul 08, 2014
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations – these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to analytics, surfacing the important connections and patterns in their data to make better workforce decisions.
Tags : visier, workforce analytics, hr metrics, planning
     Visier
By: Smarp     Published Date: Feb 22, 2019
By definition employee advocacy is the promotion of a company’s messages by its employees. Today, employee advocacy happens increasingly online, social media being the main medium for brand ambassadors. Employees have extensive networks of friends, followers, and connections on social media, and nowadays they can be reached and influenced with a click of a button. When empowered to act as brand ambassadors on social media, employees can share valuable content to their networks and build their professional brand all while increasing the company’s reach and credibility by generating meaningful conversations about the business.
Tags : employee advocacy, employee engagement, social media, social media visibility
     Smarp
By: Mentor Graphics     Published Date: Sep 04, 2009
This paper looks at the issues, materials and current processes being researched to create this integrated Opto-Electronic Circuit Board by European, Japanese and North American organizations.
Tags : mentor graphics, high density interconnect (hdi), high speed applications, opto-electronics, photonics, pcbs, opto-electronic circuit board, eobc-optofoil, univ. of ulm, fraunhafer inst, daimler-chrysler, siemens, truemode, terahertz, polyguide, dupont, topcat, nist, goodyear, jiep
     Mentor Graphics
By: IBM     Published Date: Jun 09, 2015
Making sound security decisions in today’s environment is of paramount importance. This infographic highlights the connection between economic vitality and security and how both can be achieved.
Tags : ibm, government, cyber, security, intelligence, information, vulnerability, fraud, threat, predictive
     IBM
By: Monetate     Published Date: Jun 15, 2018
Personalisation for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. not only are consumers expecting hyper-personalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalisation from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalisation technology and what companies can expect to gain with implementation. • Four myths about personalisation that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalisation roadmap for your company. • Eight questions to ask when shopping for a personalisation partner that will help you ensure you are getting the right tools a
Tags : 
     Monetate
By: Monetate     Published Date: Apr 06, 2018
Personalization for retail customers has advanced well beyond segmentation to include real one-to-one connections made in real-time. Not only are consumers expecting hyperpersonalized experiences across all touches, but companies who are able to implement them are seeing unprecedented growth and a new level of customer loyalty. This essential guide walks you through personalization from the nuts and bolts of what it can do, through 5 levels of implementation that businesses can use to benchmark their path to increased revenue. In the guide you’ll learn: • The latest advancements in personalization technology and what companies can expect to gain with implementation. • Four myths about personalization that may be holding your company back. • Tips for getting started and 5 benchmarking levels to help you create a personalization roadmap for your company. • Eight questions to ask when shopping for a personalization partner that will help you ensure you are getting the right tools and expe
Tags : 
     Monetate
By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
     Spectrum Enterprise
By: Adobe     Published Date: Jun 06, 2013
An enterprise's digital properties must be more than one-way broadcasts of information: today's customers desire connection, conversation, and interaction.
Tags : customer experiences, web content, content management, web design
     Adobe
By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management
     CDW
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com