ports

Results 51 - 75 of 678Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters
    
CA Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Video quality can be measured in multiple ways, but the primary metrics – playback reliability and image quality – are the most critical. Get these right, and content providers are on their way to winning the loyalty of online audiences and driving monetization. Get them wrong, and viewers will defect in a heartbeat. For live-streaming events, such as sports, where there’s can’t-miss fast action, the ante is raised even higher. In this white paper, we’ll explore why online video quality matters and the specifics of how it should be measured. Get a peek “under the hood” to understand the core elements of video delivery that contribute to high-quality viewing experiences. Most importantly, see why the choice of a content delivery partner is essential to your online video success.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: HP     Published Date: Jun 24, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries.
Tags : 
intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup, recovery, archive, roi of hp storage solutions, business value of hp storage solutions
    
HP
Published By: HP     Published Date: Jul 03, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries
Tags : 
    
HP
Published By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Download this case study now to see how Jonckers Translation & Engineering was able to help this customer meet its localization objectives.
Tags : 
jonckers, translation & engineering, asian languages, arabic, icann
    
Jonckers Translation & Engineering
Published By: Infor     Published Date: Jan 03, 2011
When it comes to retail marketing, slow and steady does not necessarily win the race. These days, it's not enough for a merchant to boast reams of data if that data can't be quickly accessed and manipulated to seize marketing opportunities.
Tags : 
infor, crm tool, customer relationship management, pier 1 imports, data management
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
When it comes to retail marketing, slow and steady does not necessarily win the race. These days, it's not enough for a merchant to boast reams of data if that data can't be quickly accessed and manipulated to seize marketing opportunities.
Tags : 
infor, crm tool, customer relationship management, pier 1 imports, data management
    
Infor
Published By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : 
content management, customer experience management, web content management
    
Adobe
Published By: Akamai Technologies     Published Date: Sep 03, 2019
The attacks and tools being used against financial services organizations are part of a complex ecosystem. This may seem like an obvious statement at first glance. When you read most industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks. To be honest, we’ve been just as guilty of having a myopic view of attack traffic as anyone else. We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.
Tags : 
    
Akamai Technologies
Published By: SAP     Published Date: Sep 19, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity. It allows insights into operational retail data, empowering users with contextual, real time information for faster and better decision making. Processes can easily be extended to connect to business networks to form a digital ecosystem and collaboratively drive business model improvements. Equipped with a simple and intuitive user experience, the solution offers better support for headquarters users as well as store associates to drive compelling customer experiences.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: SAP     Published Date: Sep 28, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : 
embedding reports, dashboards, analytics, saas, actuate, software application providers
    
Actuate
Published By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions in a Software as a Service (SaaS) model to more than 2,800 customers with employees in 150 countries. “Storage has always been Ultimate’s biggest technology challenge" according to Senior Director of Cloud Operations, Steven May. The company’s storage goals revolve around managing growth while combining the economics of leveraging shared resources on demand with the performance and predictability of dedicated infrastructure. Seeking high IOPS performance, fault tolerance, and scalability, along with a high availability solution that supports both VMware and OpenStack, Ultimate's search led them to SolidFire.
Tags : 
    
NetApp
Published By: Dell EMC     Published Date: May 08, 2019
IDC reports companies that modernize IT infrastructure for emerging technologies such as AI thrive and see results such as launching IT services faster and closing more deals. Access this comprehensive whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use
    
Blue Coat Systems
Published By: Red Hat     Published Date: Jan 01, 2013
Using Red Hat middleware, virtualization, and platform technologies, consultant Booz Allen Hamilton helped the U.S. Department of Defense save $5.1 million through fiscal year 2015. The solution replaced a complex legacy system that could not scale to meet modern demands.
Tags : 
idc, red hat, department of defense, technology consulting, supports elasticity, flexibility, private cloud, elastic infrastructure, increase agility, increase flexibility, automatic scaling, automatic process execution, configurationg management, monitoring capabilities
    
Red Hat
Published By: Oracle     Published Date: Aug 16, 2013
Steve Romeo, VP of IT and Business Technology Solutions at Breg, a sports medicine company, discusses the benefits of accessing sales information in Outlook or on an iPad with Oracle Sales and Marketing Cloud Service.
Tags : 
oracle, cloud, sales, breg, information access, marketing cloud service
    
Oracle
Published By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : 
customizable dashboards, crm, oracle, custom reports, dashboards, sales
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Steve Romeo, VP of IT and Business Technology Solutions at Breg, a sports medicine company, discusses the benefits of accessing sales information in Outlook or on an iPad with Oracle Sales and Marketing Cloud Service.
Tags : 
oracle sales cloud, oracle, cloud, sales, sfa, crm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : 
customizable dashboards, crm, oracle, custom reports, dashboards, sales
    
Oracle
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: