cad

Results 301 - 325 of 764Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Dec 15, 2015
If one technology has changed how companies have done business over the past decade, it’s server virtualization. Virtualization has allowed IT to “run faster and jump higher,” offering IT capabilities that are not available with physical servers. While server virtualization is continuing to advance, organizations are still not embracing virtualization whole-heartedly—perhaps not fully convinced that the benefits outweigh the challenges.
Tags : 
    
Red Hat
Published By: AppDynamics     Published Date: Sep 21, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet-accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
    
AppDynamics
Published By: Amazon Web Services and Intel     Published Date: Oct 07, 2015
Research teams can spend nearly a decade looking for new biological targets. Then years more creating and testing new molecules that offer improved ways to fight the world’s viruses, bacteria and diseases. These processes are usually long and and require an immense amount of computing power. However, it doesn’t need to be this difficult. Download this case study to see how high performance cloud computing can accelerate pharmaceutical breakthroughs while still retaining a simplistic structure that is cost-effective to scale computer resources.
Tags : 
high performance cloud computing, cost-effective structure, computer resources, computing power
    
Amazon Web Services and Intel
Published By: Harvard Business School Executive Education     Published Date: Mar 09, 2015
For decades, large companies have been wary of corporate venturing. So why are more and more smart companies going VC to find their next breakthroughs? With corporate R&D units under pressure to focus on a narrow range of projects, companies often lack a good way to sniff out competitive threats beyond their main areas of expertise. A corporate venture capital fund for investing in outside startups can help a company see, understand, and respond rapidly to changes in the business landscape. But the parent company’s processes tend to bog down these funds.
Tags : 
private equity, venture capital, investment expertise, growth equity, buyouts, negotiation, organizational structure, portfolio management, asset management, financial strategy, investment opportunities, competitive advantage
    
Harvard Business School Executive Education
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: athenahealth     Published Date: Jun 08, 2015
We convened top academic medical center leaders for our AMC Advisory Roundtable in October of 2013. We also conduct regular discussions with a wide array of health care executives, including leaders of health systems, medical groups, insurance companies, and academic institutions. This whitepaper shares some of the key themes that have emerged from those meetings.
Tags : 
academic medical center, clinical activities, research activities, education
    
athenahealth
Published By: MuleSoft     Published Date: Apr 13, 2016
Since it first emerged more than a decade ago, Service Oriented Architecture (SOA) has been both widely praised as a modern, agile approach to software development and infrastructure architecture as well as dismissed as a colossal waste of time and money. Missed expectations for many SOA projects led one analyst in 2009 to declare, “SOA is dead.” Far from being dead, however, service oriented architecture is in fact more relevant than ever.
Tags : 
service management, enterprise applications, best practices, business management, business strategy
    
MuleSoft
Published By: MuleSoft     Published Date: Sep 08, 2016
The organization as we’ve known it is barely clinging to life support. Increasingly, the calcified, creaky business systems and processes that have been embedded in organizations for decades are being swept away by more agile digital disruptors. Online and app-based companies powered by cloud, open APIs, data analytics, mobile, social, and connected to the Internet of Things are redefining markets and raising consumer expectations.
Tags : 
mulesoft, forbes, api, cloud, data analytics
    
MuleSoft
Published By: IBM     Published Date: Jul 05, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselve
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization
    
IBM
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
Tags : 
palo alto, exploit kits, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Juniper Networks     Published Date: May 17, 2017
Download this whitepaper to learn how to navigate the future of brocade.
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Nov 14, 2017
Data is the hottest topic in business today. In discussions that range from understanding performance to predicting future outcomes, data is at the core. However, data has a bad reputation. Because businesses have been collecting data for decades, the amount that we must analyze can seem insurmountable. Simply saying “data” is enough to conjure images of someone poring over a thick stack of spreadsheets, manually going through row after row to identify performance, trends and figure out what to do with them. This intimidating view is all too common.
Tags : 
data, ibm, data insight, data analytics
    
IBM
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Download this white paper to learn how plants can make strides in modern technology to get the most of their current systems investments and future-proof their operations for the IIoT.
Tags : 
stratus, cross-sector, scada, operations, iiot, downtime
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : 
stratus, operations, total cost of downtime, downtime, scada downtime
    
Stratus Technologies
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries — including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors — pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business — removing any “air-gaps” that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX — the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure — has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: HotSchedules     Published Date: Apr 25, 2018
Restaurant technologies have transformed drastically over the past decade, however there have been several misconceptions about the impact big data can have on restaurant operations. According to a Hospitality Technology study, only 23% of restaurants have confidence in overall tech innovation. When it comes to the state of technology many restaurants are still stuck with disconnected architecture, complex legacy systems, lack of visibility, and high maintenance costs. These challenges ultimately intimidate restaurant operators to outdated systems and processes that significantly limit their business growth. This ebook looks at the four pressing challenges and presents one unifying solution.
Tags : 
    
HotSchedules
Published By: HotSchedules     Published Date: Jan 17, 2019
Founded in 2011 by entrepreneurs Allen Reagan and Walt Powell, Flix Brewhouse is the world’s only first-run movie theatre and fully functioning microbrewery. The operation faced some challenges as the business grew including a lack of of structured training program and disengaged training sessions. With the help of Clarifi Talent Development Flix Brewhouse was able to turn it all around. With a fully functioning training program, Flix Brewhouse now has 71 custom training courses with increased sales and improved service times. With 660 active users in their online training academy, they are able to maintain high-quality service for their customers. Learn how they do it!
Tags : 
    
HotSchedules
Published By: Datastax     Published Date: Apr 08, 2019
For decades, organizations relied on traditional relational database management systems (RDBMS) to organize, store, and analyze their data. But then Facebook came along, and an RDBMS was suddenly not quite enough. The social giant needed a powerful database solution for its Inbox Search feature, and Apache Cassandra—a distributed NoSQL database—was born. Released as an open source project in July 2008, Cassandra—named after the mythological prophet who famously put a curse on an oracle—became an Apache Incubator project in March 2009. It graduated to a top-level project in February 2010
Tags : 
    
Datastax
Published By: Datastax     Published Date: Apr 08, 2019
We live in the age of “multi”. Everything is becoming more complex, more “intelligent”, and more distributed. Hybrid cloud isn’t really the new frontier—some companies have been operating in a hybrid cloud environment for nearly a decade—the new frontier is learning HOW to take full advantage of hybrid cloud without creating data silos or busting the IT budget. Enterprises are, of course, always looking for ways to make their computer systems faster, more highly available, more fault tolerant, and simpler to scale. But in the age of “multi,” this is becoming harder and harder to do. Imagine running a social network with millions of U.S.-based users and millions of European users. You could host all your servers and data in the United States, but then all of your European users would have a slower experience using your application than their U.S.-based counterparts. You could host all your servers and data in Europe, but then the U.S.-based users would have a slower experience. An obvio
Tags : 
    
Datastax
Published By: Datastax     Published Date: May 20, 2019
Data management challenges have evolved drastically over the last decade, leading most companies to rethink how they manage their data. The need for more powerful and far more flexible databases resulted in the birth of the NoSQL database Apache Cassandra™. Read this white paper to learn how Cassandra has evolved and how it works.
Tags : 
    
Datastax
Published By: Fiserv     Published Date: Mar 02, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations. In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: • Global payment initiatives • Open Banking standards • Artificial intelligence and machine learning • Consumer demand for real-time fraud prevention and detection
Tags : 
cyber crime, financial crime, financial security, customer experience, financial crime risk management, global payments, open banking standards, artificial intelligence, machine learning, fraud prevention, fraud detection
    
Fiserv
Published By: Fiserv     Published Date: Mar 13, 2018
The right kind of insurtech can modernize the financial close, freeing up time, money and resources so businesses can focus on strategic efforts and specific customer needs. Reconciliation of transactions and accounts across large organizations is one area where automation and digitization can have a major impact on the balance sheet. In the article, Not Ready for Insurtech? Here’s Proven Automation You Can Use Now!, learn how one of the top ten major insurance carriers has used digitization for the past decade to streamline their reconciliation efforts - saving time and money - while increasing their bottom line.
Tags : 
insurtech, financial automation, financial close, insurance reconciliation, insurance bottom line, insurance automation, digitization, digitalization
    
Fiserv
Published By: Amazon Web Services EMEA     Published Date: Oct 07, 2019
Application development has become core to business success. As a result, application developers have emerged as precious assets not just inside their companies, but across the global economy. According a report from Stripe, these developers have the potential to collectively raise worldwide GDP by $3 trillion over the next decade—which is why keeping them productive and professionally fulfilled is more important than ever
Tags : 
    
Amazon Web Services EMEA
Published By: Amazon Web Services EMEA     Published Date: Oct 17, 2019
Customers have been running Windows workloads on Amazon Web Services (AWS) for over a decade. We run nearly 2x more Windows Server instances than the next largest cloud provider, according to an IDC report. Our experience running Windows applications has earned our customers’ trust and the number of AWS enterprise customers using Amazon EC2 for Windows Server has grown 5x since 2015.
Tags : 
    
Amazon Web Services EMEA
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: