pervasive

Results 76 - 100 of 125Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 10, 2013
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : technology trends, pervasive technology, data center, resilient infrastructures, collaboration and analytics, mobile technology, ibm, accurate strategies
     IBM
By: IBM     Published Date: Feb 27, 2014
Learn about the new trending technologies that are shaping the data center and see how your organization can implement these technologies to have the most agile and efficient infrastructures possible.
Tags : pervasive technology, technology trends, business, data center, infrastructure, analytics, mobile technology, social collaboration
     IBM
By: IBM     Published Date: Oct 14, 2014
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : it trends, data center strategies, cloud computing, mobile technology, it management, data management
     IBM
By: IBM     Published Date: Jan 09, 2015
Four technology trends—cloud computing, mobile technology, social collaboration and analytics—are shaping the business and converging on the data center. But few data center strategies are designed with the requisite flexibility, scalability or resiliency to meet the new demands. Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : it trends, mobile technology, social collaborition, data analytics, big data, data center strategy, it management, enterprise applications
     IBM
By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : data center, predictive analytics, data center strategy, resilient infrastructure, cloud computing, social collaboration, business analytics, emerging technologies
     IBM
By: Polycom     Published Date: Jul 30, 2014
Video conferencing is rapidly moving out of the conference room and onto the desktop, smartphone, and tablet. Thanks to inclusion of video as a core UC component, enterprise technology leaders are increasingly deploying video to individuals as part of their unified communications initiatives, while integrating personal video into room systems, and enabling conferencing beyond the enterprise.
Tags : pervasive, video, collaboration, conference room, desktop, smartphone, tablet, communication
     Polycom
By: SmoothWall     Published Date: Jun 03, 2009
Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.
Tags : smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering
     SmoothWall
By: Hewlett Packard Enterprise     Published Date: Feb 08, 2017
With HPE Just Right IT, you can keep your business running with pervasive network security and data protection that’s easy to implement and manage. Download now to learn more.
Tags : 
     Hewlett Packard Enterprise
By: IBM     Published Date: Jul 02, 2018
In today’s threat landscape, organizations need to consider a new security paradigm - one with data at the center.
Tags : 
     IBM
By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : ibm, resilience, cloud, design, sustain, enterprise applications
     IBM
By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
     Gigamon
By: MuleSoft     Published Date: Sep 27, 2017
As one of the most popular integrated enterprise resource planning (ERP) solutions on the market, SAP has enabled organizations to optimize many of their most essential business functions in finance, human capital management, enterprise performance management, and supplier relationship management. One of the most pervasive challenges for SAP shops is integrating SAP to other applications within their organization. Without proper integration between SAP and these systems, organizations fail to fully automate and optimize their business processes. This whitepaper provides an overview of some of the most common challenges faced when integrating SAP, a brief overview of SAP interfaces and integration points, various approaches for SAP integration and a suggested best architecture for solving the SAP integration challenge.
Tags : 
     MuleSoft
By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
     EMC Corporation
By: Cisco     Published Date: Jan 06, 2015
Discover how a comprehensive, network-enabled approach to information security can help protect you against today's increasingly pervasive cyberthreats by giving you unprecedented visibility across your entire network.
Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, networking
     Cisco
By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
     Gigamon
By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why security needs to be as pervasive as the IoE itself.
Tags : internet of everything, ioe, security, cloud, digital business models, network infrastructure, networking, it management
     Cisco
By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
     Group M_IBM Q418
By: IBM     Published Date: Aug 26, 2019
Cyberspace is extremely difficult to secure. The basic approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon. In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
Tags : cryptocurrency, bitcoin, blockchain
     IBM
By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
     Quocirca
By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
     Gigamon
By: Topsy     Published Date: Jul 16, 2013
Marketing today is real-time, always-on, pervasive, and constant—but following these 5 simple rules guarantees that you’ll stand out from the crowd.
Tags : twitter, advertising, real-time, realtime marketing, real-time marketing, social marketing, social strategy, social listening
     Topsy
By: SAS     Published Date: Mar 01, 2012
Michael Lock of the Aberdeen Group focuses on the effect of end user adoption, pervasiveness, and engagement of business intelligence on business performance. Learn the necessary steps to establishing self-service business analytics.
Tags : it management
     SAS
By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
     Group M_IBM Q2'19
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com