pervasive

Results 51 - 75 of 125Sort Results By: Published Date | Title | Company Name
By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
     Gigamon
By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
     SAS
By: SAS     Published Date: Apr 04, 2018
“Fixing health care” is an urgent and pervasive priority for governments, businesses and citizens alike. Within many countries, costs are out of control, resulting in reduced access to quality care for those who need it, higher taxes and/or insurance costs for companies and citizens – and unfortunately, poorer health outcomes.
Tags : 
     SAS
By: IBM     Published Date: Aug 26, 2019
By choosing the right enterprise platform and pervasively encrypting data, your bank can deliver data security more effectively. For this reason, you should be aware of the best available encryption solutions for your organization. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position. Know five encryption questions to ask your CIO today
Tags : cryptocurrency, bitcoin, blockchain
     IBM
By: Rosetta Stone     Published Date: Jul 05, 2017
In global, multicultural organizations, simply expecting all employees to speak one common language, such as English, marginalizes the potential impact of international talent and leaves monolingual staff ill-equipped to help the organization compete effectively in a globalized environment. In an increasingly global economy, U.S. companies will perform better by hiring individuals who can communicate in foreign languages and helping current employees develop language skills. Forbes Insights, in conjunction with Rosetta Stone, surveyed more than 100 executives at large U.S. businesses (annual revenues of more than $500 million) and found that language barriers have a broad and pervasive impact on business operations. The survey found that foreign language skills will be even more vital in the future and that language abilities can help executives advance their careers, speed overseas expansion, and boost corporate—as well as personal—success.
Tags : 
     Rosetta Stone
By: Blue Jeans Network     Published Date: Oct 17, 2013
Learn how to conduct effective and engaging meetings with easy, interoperable video conferencing that is enabled with the Cloud and is always accessible for all employees no matter the location.
Tags : video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
     Blue Jeans Network
By: Blue Jeans Network     Published Date: Oct 17, 2013
Learn how to conduct effective and engaging meetings with easy, interoperable video conferencing that is enabled with the Cloud and is always accessible for all employees no matter the location.
Tags : video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
     Blue Jeans Network
By: Blue Jeans Network     Published Date: Oct 17, 2013
Learn why video conferencing will create more effective meetings, allowing for collaboration and communication, which will ultimately create value, spur innovation, and drive up efficiency while driving down costs.
Tags : video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
     Blue Jeans Network
By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview
     Extreme Networks
By: IBM APAC     Published Date: Sep 30, 2019
Companies that are undergoing a technology-enabled business strategy such as digital transformation urgently need modern infrastructure solutions. The solutions should be capable of supporting extreme performance and scalability, uncompromised data-serving capabilities and pervasive security and encryption. According to IDC, IBM’s LinuxONE combines the advantages of both commercial (IBM Z) and opensource (Linux)systems with security capabilities unmatched by any other offering and scalability for systems-of-record workloads. The report also adds LinuxONE will be a good fit for enterprises as well as managed and cloud service provider firms. Read more about the benefits of LinuxONE in this IDC Whitepaper.
Tags : 
     IBM APAC
By: F5 Networks Inc     Published Date: Jan 22, 2009
The pervasiveness of load balancing technology does not mean it is universally understood, nor is it typically discussed other than from a basic, network-centric viewpoint. This White Paper thoroughly explains load balancing and strips away some of the mystery and magic from basic load balancing practices.
Tags : load balancing technology, load balancing, networking
     F5 Networks Inc
By: IBM     Published Date: May 30, 2008
The productivity and bottom line of most businesses have benefited greatly from the increasing pace and pervasiveness of technological support. In the process, the community that characterizes and supports businesses of all sizes has been given short shrift. In this Clipper Group paper, read about IBM Lotus connections, the tool that will help your team to collaborate as efficiently as possible.
Tags : ibm, ep campaign, ibm ep, productivity, lotus, lotus connections, desktop management, collaboration
     IBM
By: DocuSign     Published Date: Aug 09, 2016
Emails would go unanswered, social posts unseen, movie times and tickets unpurchased, our favorite sports teams ignored, pictures untaken you get the idea. Now add tablets and the growing interest in wearable. All have become vital and pervasive appendages to helping us live our lives to the fullest.
Tags : docusign, secure cloud storage, mobile device management, smartphones, internet
     DocuSign
By: Emulex Corporation     Published Date: Nov 07, 2013
An intelligent, searchable recording fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? We all know intuitively that there are substantial bottomline benefits to reducing unplanned network downtime and improving the management of corporate risk. It follows that it also pays dividends to free up highly skilled Tier 1 and Tier 2 engineers to handle resolving the most difficult and costly network issues while using less expensive personnel to handle easier ones. But justifying a network investment on a soft, intuitive argument like this alone doesn’t usually suffice. And, depending on what industry you are in, the cost savings potential will vary. At the high end, in many financial and brokerage institutions, a minute of downtime can cost the company millions of dollars. So being able to shave even a single minute off network downtime with a pervasive monitoring tool represents an immediate recovery of the fabric investment.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
     Meru Networks
By: Cisco     Published Date: Jan 16, 2014
How Cisco Web Security enables better data and brand protection for today’s enterprises.
Tags : cisco, security, web threats, pervasive security, cisco web security, data access
     Cisco
By: Cisco     Published Date: Jun 12, 2014
How Cisco® Web Security enables better data and brand protection for today’s enterprises.
Tags : web security, cisco, brand protection, security
     Cisco
By: Cisco     Published Date: Jun 16, 2014
How Cisco® Web Security enables better data and brand protection for today’s enterprises.
Tags : web security, cisco, brand protection, security
     Cisco
By: Cisco     Published Date: Jun 16, 2014
How Cisco® Web Security enables better data and brand protection for today’s enterprises.
Tags : web security, cisco, brand protection, security
     Cisco
By: IBM     Published Date: Mar 04, 2014
Download this Whitepaper by Jerry Cuomo, Vice President and Chief Technology Officer, IBM WebSphere, to understand more about how you can leverage JavaScript pervasiveness to simplify radically the life cycle of applications that are interactive, web facing and transactional.
Tags : ibm, mobility, mobile applications, mobile app, mobile app development, javascript, apis, app servers
     IBM
By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : mobile phones, mobility, it management
     HP - Enterprise
By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
     AWS
By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
     McAfee
By: SAP     Published Date: May 13, 2010
Aberdeen Group defines "Pervasive BI" as the existence of an information environment where access to and usage of business intelligence capabilities is available to all stakeholders in an organization when, how, and where they work. Read this research to learn more about "Pervasive BI."
Tags : sap, business intelligence, performance, aberdeen pm, performance management, pace
     SAP
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com