tag once

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name
By: McAfee APAC     Published Date: Jun 25, 2019
i. How automation and integration can work together to unify people, process, and technology. The security community has begun to embrace automation as a solution to handling tedious, repetitive tasks, allowing skilled staff to focus on more strategic and advanced endeavors. As destructive threats continue to increase, automation balances machine-based analysis with human-based domain knowledge to help organizations achieve optimal workflows in the face of staff shortages and alert fatigue. This SANS survey explores some of the misconceptions and facts around automation and how it can become a natural extension of individuals and teams trying to do their day jobs more effectively.
Tags : 
     McAfee APAC
By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml
     IBM Business Analytics
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management
     K2
By: ADTRAN     Published Date: Jun 16, 2011
Small and medium enterprises are increasingly upgrading to a UC system, which can improve customer service, streamline product development and speed response to new opportunities. Learn the key steps of UC adoption.
Tags : adtran, telecomm, communication, uc adpotion, ivr application, response time, roi, infrastructure, competitive advantage, networking, unified messaging, voip, roncelli, productivity, operational expenses, business process, admin, uc systems
     ADTRAN
By: Anaplan     Published Date: Sep 19, 2019
Réalisée par Mint Jutras, cette étude analyse la plateforme de planification intégrée d’Anaplan, sa proposition de valeur et ce qui la différencie des solutions du marché. « Le moteur de planification en mode cloud d’Anaplan peut conjuguer les avantages de deux mondes : il est déployé en tant que plateforme suffisamment souple pour s’adapter à vos besoins spécifiques. Mais au delà d’un outil technique, c’est une plateforme métier dont la facilité d’utilisation permet aux utilisateurs dépourvus de compétences techniques de concevoir, de modéliser et de configurer des applis… Cette plateforme métier dispose d’un plan vivant et dynamique qui s’adapte à l’évolution des objectifs et des conditions du marché. L’analyse prédictive renforce cette approche, ce qui permet non seulement d’adapter les plans aux changements lorsqu’ils surviennent, mais également d’anticiper au mieux les évolutions qui se profilent. Voulez-vous en savoir plus ? Téléchargez le rapport dès maintenant.
Tags : 
     Anaplan
By: TIBCO Software     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
     TIBCO Software
By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : siemens, arc defense, fault-resistant, medium voltage, electrical emergency
     Siemens
By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
     AWS
By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
     Microsoft Office 365
By: Dell EMC     Published Date: Nov 02, 2015
A new IDG Research study reveals that IT professionals are already seriously considering converged systems. The advantages of converged systems are clear. Still, some reticence remains due to concerns about cost and ROI. Learn how converged systems bring value to the enterprise today and tomorrow. And see how Dell PowerEdge FX solutions smooth the road to convergence.
Tags : 
     Dell EMC
By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
     Mimecast
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
     Hewlett Packard  Enterprise
By: SAS     Published Date: Aug 03, 2016
No matter the vintage or sophistication of your organization’s data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. That’s because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : best practices, technology, data, business technology
     SAS
By: IBM     Published Date: Mar 29, 2017
No matter the vintage or sophistication of your organization’s data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. That’s because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : data, warehouse, modernization, ibm, cloud
     IBM
By: Infinidat EMEA     Published Date: Oct 10, 2019
Maintenant que les données sont devenues un levier de business et aussi un vecteur d’avantage compétitif, la disponibilité permanente des données, Always On, se pose en exigence stratégique attendue de l’organisation IT. Confrontées à plusieurs points de défaillance potentiels, les organisations IT s’eff orcent depuis des années de concevoir leur infrastructure de données de façon à tenir l’objectif Always On, ce qui induit des coûts élevés et une certaine complexité. Pour qu’une solution soit toujours Always On, elle doit avoir un objectif de point de reprise RPO (Recovery Point Objective) de 0 et un objectif de temps de reprise RTO (Recovery Time Objective) de 0. Mais ces conditions certes élémentaires d’une solution Always On ne sont en aucun cas suffi santes.
Tags : 
     Infinidat EMEA
By: Polycom     Published Date: Sep 24, 2014
There are many ways to take advantage of the rich set of collaboration tools provided with Microsoft Lync. IT leaders should consider a cap-and-grow strategy where investment dollars in legacy systems are capped and the financial and IT resources are reallocated to grow Lync. Once the company has a cap-and-grow Lync strategy, IT leaders should consider retirement of legacy infrastructure and how Lync can be leveraged as a replacement technology. Forward-looking IT leaders will consider Lync a strategic UC platform upon which to build a companywide collaboration strategy, rather than just a replacement for a legacy phone system. Get this report to read best practices for a Lync deployment.
Tags : grow, strategy, cap, best practices, lync, deployment, advantage, rich, collaboration, tools, investment, dollars, legacy, system, financial, resources, strategic, infrastructure, platform, software development
     Polycom
By: HP and Intel® Xeon® processor     Published Date: Feb 11, 2012
Leveraging deduplication in backup environments yields significant advantages. HP StoreOnce deduplication simplifies the deployment of deduplication technology across the IT infrastructure.
Tags : intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
     HP and Intel® Xeon® processor
By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
     CrowdStrike
By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
     Panasonic Business Mobility Solutions
By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship, marketing management, marketing strategy
     IBM
By: Trimble     Published Date: May 02, 2019
Involvement in early-stage construction projects can deliver big wins for savvy contractors. By helping to materialize the vision for the project, you can position yourself as the best team to bring that vision to life. But for some estimators, developing a conceptual construction estimate is more labor-intensive than producing a final one. You could spend days or weeks working on it, yet have very low confidence in the numbers you present. If your conceptual estimates are: ? Too time-consuming to produce.. ? Based more on guesswork than actual data... ? Not helping you win more projects… You’re making things harder than they need to be. Claim your FREE eBook to learn how you can produce fast and accurate conceptual estimates.
Tags : 
     Trimble
By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
     Ricoh
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com