bing

Results 1 - 25 of 127Sort Results By: Published Date | Title | Company Name
By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business. This competition may be good for the customers (i.e., the patients) who are demanding higher levels of care and a better overall experience. This could mean better access to new diagnostic tests, test results, and specialists who may be located far from the patient’s location. Healthcare providers need to work toward providing the same care and experience to customers in their main facilities as they do in distributed clinics, ur
Tags : 
     VMware SD-WAN by VeloCloud
By: Global Payments     Published Date: May 02, 2019
We live in an age of unrivaled ecommerce opportunity. The number of new internet users is climbing by 248 million each year, equating to 7% annual growth. That figure in turn is dwarfed by booming ecommerce rates, which average out at 14% globally. This report offers an overview of ecommerce markets across the globe, summarizing the current situation, and identifying the most effective ways to nurture business - and the customer experience - on a local and global scale.
Tags : ecommerce growth, global payments, local language, localization, retail, mobile payments, alternative payment methods, chinese wallets, alipay, wechat pay, global commerce, international payment solutions
     Global Payments
By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business.
Tags : healthcare, patient experience, sd-wan
     VMware SD-WAN by VeloCloud
By: Location3     Published Date: Feb 07, 2019
Your Local Business Listings are part of the foundation of your online presence. Ensuring that all of your brick-and-mortar business locations are accurately represented on directories like Google My Business, Facebook Places, Bing Places, Apple Maps and more requires a hands-on, managed approach to local data optimization.
Tags : marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, local business listings, listing management, store visits
     Location3
By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : model, ddos, protection, solutions
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : strategy, ddos, spam, technology, solutions
     F5 Networks Inc
By: IBM     Published Date: Aug 01, 2018
Your customers aren't the only ones who can benefit from advancing artificial intelligence (AI) support — your employees can, too. Chatbots help employees who service customers, and you can build them with mature AI components. But success requires a focus on tasks rather than job replacement as well as a cyborg-like division between human and machine tasks. This report helps infrastructure and operations (I&O) pros determine which tasks are best executed by people and which are best left to machines, with use cases describing how that looks.
Tags : 
     IBM
By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
     CyberSource EMEA
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
     Centrify Corporation
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Focus on Value. “The benefits of agile are multidimensional. But the most important change is that it focuses the entire organization on meaningful delivery to the customer. Instead of relying on indirect metrics describing degrees of our software’s quality and progress ... we ask, ‘What percent of critical functionality is included in this release?’ This emphasis on customerperceived value impacts our entire project life cycle pretty significantly.” Vice President of Infrastructure Management BMC Software.
Tags : 
     CA Technologies EMEA
By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
     Optimizely
By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
     Selligent Marketing Cloud
By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
     TE Connectivity
By: Oracle     Published Date: Feb 21, 2018
The customers featured in this book include those who have migrated their existing applications (Oracle, third-party, and custom) and those who have deployed new applications. We also describe customers who have benefited from subscribing to a single IaaS service to meet their more tactical needs, such as low-cost and high-reliability archive storage. The motivations for IaaS adoption discussed in this book are organized into four key categories: Moving applications to the cloud Managing DevTest in the cloud Building performance-intensive workloads Using cloud-based archive storage
Tags : 
     Oracle
By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
     Schneider Electric
By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
     Dell EMC
By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
     Dell
By: Staples Business Advantage     Published Date: Jan 22, 2018
When Maine-based tubing manufacturer Genplex wanted to cut costs without sacrificing quality, Staples Business Advantage accepted the challenge. Watch this video to see the solution and results.
Tags : 
     Staples Business Advantage
By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
     Adobe
By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : dns, provider, global, anycast, network, customer, pop, business
     Oracle Dyn
By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : dns, provider, global, anycast, network, customer, pop, business
     Oracle
By: NetApp     Published Date: Sep 21, 2017
The five architectural principles guiding the development of a next generation data center are provided in this paper, describing key market influences leading a fundamental enterprise IT transformation.
Tags : netapp, database performance, flash storage, data management, cost challenges, data
     NetApp
By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : cloud security, cloud solutions, data analysis, cyberattacks
     Akamai Technologies
By: Intel     Published Date: Aug 17, 2017
Describing Intel and AT&Ts partnership to help AT&T drive towards a software-centric, cloudified approach improve agility and become more responsive to customer demands.
Tags : 
     Intel
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com