share

Results 1326 - 1350 of 1373Sort Results By: Published Date | Title | Company Name
By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
     Tyco Integrated Security
By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
     Tyco Integrated Security
By: CA Technologies     Published Date: Jun 04, 2015
Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
     CA Technologies
By: Acrolinx     Published Date: Jan 28, 2015
Watch Your Tone! offers valuable advice on how you can create your own corporate voice — a unique, instantly recognizable style for all your content, that lets you speak with one voice and stand out from the crowd. This must-read resource for content professionals shares deep insights from industry experts and takes you step-by-step through the process of developing your perfect tone of voice.
Tags : tone of voice, corporate voice, platform, style, content
     Acrolinx
By: NetApp     Published Date: Jun 27, 2016
“Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.”
Tags : 
     NetApp
By: NetApp     Published Date: May 29, 2018
Read the IDC research report Shared Storage Offers Lower TCO than Direct-Attached Storage for Hadoop and NoSQL Deployments and learn how to: Unify insights across various data sources and multiple cloud deployments Reduce compute, capacity and operational costs Increase security and prevent data loss Plus, learn about the NetApp in-place analytics solution for your existing NAS data and how it can reduce infrastructure costs
Tags : 
     NetApp
By: IBM     Published Date: Apr 16, 2015
How effective is your mobile app development process when it comes to understanding customer needs and delivering the right apps at the right time? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift” and the competitive reality of “mobile moments.” We also invited our customer, Bank of Montreal, to share their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction (see what happened for the Bank of Montreal). And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : mobile app development, mobile apps, ibm, forrester, mobile mind shift, brand satisfaction, mobile
     IBM
By: Ayla Networks     Published Date: Jul 24, 2015
Winning Market Share.
Tags : market share, data intelligence, platforms, applications, security
     Ayla Networks
By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : unitrends, microsoft office 365, backup, recovery, data loss, it management, enterprise applications
     Unitrends
By: Polycom     Published Date: Feb 16, 2017
"The traditional office workspace is dead. It used to be that you’d track your career based on the location of your office. From fresh-faced junior in a dimly-lit interior cubicle, you would progress to a private office, then a window, and finally that prized corner office. But that paradigm has left the building. Chased out by the coalescing forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Download the white paper now to learn about the trends that are shaping workplace collaboration.."
Tags : polycom, business technology, workplace collaboration
     Polycom
By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : arbor network, ddos, service provider, biannual report, security
     ArborNetworks
By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant.
Tags : emc documentum capital projects, document management, share information, share documents
     EMC
By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
     MuleSoft
By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
     MuleSoft
By: HP Software     Published Date: Jan 07, 2016
Each year we explore the major trends and issues that consume IT and QA leaders' attention and then share the results to help you put the changes into context and plan how to respond.
Tags : 
     HP Software
By: Microsoft Office 365     Published Date: Oct 14, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate and share more easily, and your IT team only has to deal with implementation from one vendor, not dozens. But, in case you’re still pondering, here are five reasons a collaboration suite makes sense: 1.Saved time and increased productivity 2.Lower costs and less complexity 3.End-to-end security compliance 4.Scaling at your pace 5.Control over the back end Download the Better Together eBook for complete details.
Tags : productivity, enterprise, complexity, compliance, employees, security
     Microsoft Office 365
By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
     Microsoft Office 365
By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
     Akamai Technologies
By: IBM     Published Date: Oct 27, 2016
The benefits of modernization are compelling, but more than half of these projects fail. Most businesses lack the expertise, time and resource to undertake successful modernization efforts. How can you ensure you avoid these common mistakes? Find out the 4 top reasons why modernization fails in our Slideshare.
Tags : ibm, leadership, innovation, modernization, enterprise applications
     IBM
By: Hewlett Packard Enterprise     Published Date: Apr 01, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the insight Kawalec and Marshall Heilman of FireEye Inc. share in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
     Hewlett Packard  Enterprise
By: Oracle     Published Date: May 03, 2018
More than 75% of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. To help you navigate your own journey to modernization, we’ve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : guide, erp, operation, data, organization, company
     Oracle
By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : opentext, manufacturing, retailer, distributor
     OpenText
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
     AWS
Start   Previous    41 42 43 44 45 46 47 48 49 50 51 52 53 54 55    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com