oss

Results 451 - 475 of 4631Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014
Advanced analytics strategies yield the greatest benefits in terms of improving patient and business outcomes when applied across the entire healthcare ecosystem. But the challenge of collaborating across organizational boundaries in order to share information and insights is daunting to many stakeholders.
Tags : ibm, ecosystem
     IBM
By: Adobe     Published Date: Jun 29, 2012
The volume of customer data that marketing departments possess continues to grow at explosive rates. But new research from the Aberdeen Group finds that less than 40% of marketers use this information to optimize and target their campaigns. This "data rich, insight poor" phenomenon is examined in their new white paper, which identifies common analytics challenges-and shows how you can rise above them.
Tags : adobe, cmo, analytics, marketing, aberdeen, optimize, campaign, optimization
     Adobe
By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : anaplan, architecture, security, controls, geographically, regional, global
     Anaplan
By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
     Oracle Linux
By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion.i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
     LogRhythm
By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : security, technology, best practices, information technology, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
     LogRhythm
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : hack, malware, intellectual, property, compliance
     LogRhythm
By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : email security, email fraud, whaling, mimecast, loss prevention
     Mimecast
By: Tealium     Published Date: Jun 15, 2015
Marketing nirvana is all about driving consistent, real-time customer interactions across all digital touch points. See how Ancestry.com is using Tealium to make this long-held goal a reality.
Tags : tealium, marketing, technology, cloud, tag management, stack, data, advertising, digital, fragmented data, unification
     Tealium
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
     Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
     Zebra Technologies
By: Coupa     Published Date: Aug 10, 2016
Manual work in accounts payable is a large source of costs that can be cut relatively quickly through automation. With AP automation it's possible to reduce the cost of processing a single invoice by as much as $10. Learn how you unlock the strategic value of accounts payable with the Coupa AP Automation Success Kit. Discover how to transform your AP invoicing processes to realize significant savings that directly impact the bottom line while improving governance and compliance.
Tags : business management, finance, accounts payable, best practices, governance and compliance
     Coupa
By: AdRoll     Published Date: Jul 11, 2017
AdRoll surveyed 350 marketers across Australia, New Zealand and Singapore this year to dive into how they're thinking about the latest performance strategies across every stage of the marketing funnel. The survey explored: • The challenges marketers are tackling when creating mobile campaigns • The attribution models marketers are moving toward • The key performance indicators marketers are using to measuring to determine the success of their campaigns • The channels marketers are using to run programmatic advertising • And more! See how your campaigns compare to those of 350 other marketers.
Tags : marketing, programmatic advertising, performance marketing, adaptation
     AdRoll
By: MuleSoft     Published Date: Sep 27, 2017
Key Challenges • Companies must embrace digital transformation in order to stay relevant to their customers, else risk ceding market share to competitors who are able to adapt more quickly. • At its core, digital transformation is driving companies to reframe their relationships with their customers, suppliers and employees through leveraging new technologies to engage in ways that were not possible before. • These new technologies - SaaS, mobile, and the Internet of Things (IoT) - demand a new level of connectivity that cannot be achieved with yesterday’s integration approaches.
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Jul 13, 2018
"Businesses are currently experiencing a generational shift in competitive and operational environments due to a convergence of technological, social, and economic forces. A single characteristic is emerging as the key factor that determines a company’s success: speed. API-led connectivity is the integration approach that will provide the speed organizations are looking for. It provides an approach for connecting and exposing assets. With this approach, companies can deliver today’s projects faster than ever before while also building an infrastructure to increase productivity on future projects and an enterprise ready for change. In this paper, you'll learn: -How to adopt an API-led connectivity approach that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks, exposed by APIs. -How to structure these building blocks across distinct systems, process and experience layers, to achieve both greater organizational agility and
Tags : 
     MuleSoft
By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
     CA Technologies EMEA
By: Oracle     Published Date: Mar 09, 2017
En este estudio, IDC trata el tema de las dificultades inherentes asociadas a los planes tradicionales de copia de seguridad de los datos y la dinámica cambiante de las estrategias de protección de datos.
Tags : 
     Oracle
By: Riverbed     Published Date: Sep 05, 2014
As enterprises have embraced IT trends like cloud computing and virtualization, their operational needs have evolved to make application performance more important than ever before. But operating applications at peak performance is challenging in the cloud. That's why many enterprise IT departments now have Applications Operations groups tasked with ensuring that applications run efficiently across these complex IT stacks. But, most tools designed to address these application performance management (APM) issues were never designed for this dynamic environment. To achieve smooth delivery of applications at all times, Applications Operations groups need APM solutions that can give them insight and analytics to manage their apps. This SlashGuide gives IT managers a scorecard to identify APM solutions that will deliver more efficient application performance.
Tags : apm, applications, operations, enterprise, stacks, dynamic
     Riverbed
By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance, security hardware, appliance, reactivity, software development
     Reactivity
By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
     Avi Networks
By: F5 Networks Inc     Published Date: Jan 22, 2009
Hundreds of organizations around the world use Microsoft® SharePoint® with  over 80 million implementations, allowing them to develop intelligent portals that seamlessly connect users, teams, and knowledge. With the release of Microsoft Offi ce SharePoint Server 2007, F5 has specifi cally developed and tested a comprehensive Application Ready infrastructure that enhances the security, availability and performance of SharePoint deployments, whether it’s over the LAN or across a global WAN.
Tags : application ready network guide, microsoft office sharepoint 2007, sharepoint deployments. wan, tcp, roi, sharepoint, portal, microsoft, big-ip, application, networking, it management
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of joint solutions including their Maximum Availability Architecture (MAA). By taking advantage of F5’s Application Ready Network for Oracle Application Server 10g, an integral part of Oracle Fusion Middleware, organizations can achieve an secure and optimized platform for delivering Oracle applications across the LAN and WAN.
Tags : application ready network guide, application server, oracle, maximum availability architecture, internet-enabled enterprise software, application delivery networking, oracle applications, networking, enterprise applications
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : oracle, bea, weblogic applications, weblogic deployments, optimized architecture, networking, platforms
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 has designed and painstakingly tested a comprehensive Application Ready Network infrastructure for PeopleSoft Enterprise applications, ensuring your organization achieves maximum ROI with the minimum amount of work. F5 provides all of the tools to help organizations optimize, secure, and deliver PeopleSoft Enterprise applications across the LAN and WAN.
Tags : application ready network guide, application server, maximum availability architecture, internet-enabled enterprise software, application delivery networking, peoplesoft enterprise applications, peoplesoft, networking, enterprise applications
     F5 Networks Inc
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com