asp

Results 276 - 300 of 528Sort Results By: Published Date | Title | Company Name
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The Software-Defined Data Center (SDDC) is an overarching philosophy for implementing better data centers. The most basic way to think about an SDDC is as a combination of virtualized computing resources, plus software-defined storage and networking. In addition, SDDC often includes overarching security aspects: in other words, SDDC abstracts and automates all the compute, storage and networking aspects that are traditionally physical, and it can put that automation and abstraction to use in enhancing security.
Tags : 
data center, software, defined, sddc, implementation, automation, security
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Bei einem Software-definierten Rechenzentrum (Software-Defined Data Center, SDDC) handelt es sich um einen ganzheitlichen Ansatz für die Einrichtung besserer Rechenzentren. In der grundlegendsten Form ist ein SDDC eine Kombination aus virtuellen Rechnerressourcen und Software-definierten Speicher- sowie Netzwerksystemen, häufig ergänzt um übergreifende Sicherheitsfunktionen. Mit anderen Worten: Das SDDC fasst nicht nur alle üblicherweise physischen Rechner-, Speicher- sowie Netzwerkaspekte zusammen und automatisiert diese, sondern trägt zusätzlich auch zur Verbesserung der Sicherheit bei.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 20, 2018
Info zu diesem Bericht Pathfinder-Berichte führen Entscheidungsträger durch die Herausforderungen, die mit einer bestimmten Technologie oder einem Unternehmensaspekt in Zusammenhang stehen, untersuchen den geschäftlichen Nutzen einer Implementierung und geben Empfehlungen zu Überlegungen sowie konkreten nächsten Schritten im Entscheidungsprozess.
Tags : 
    
McAfee EMEA
Published By: Smarp     Published Date: Feb 22, 2019
Employee Advocacy relies on individual expertise on social media to support companies’ and individuals’ branding needs. All of this is done through content, accessible to all those who are part of the Employee Advocacy program. How exactly do Employee Advocacy and content marketing go together? There are four aspects that make Employee Advocacy highly relevant to content marketing efforts. 1. Alignment around a shared content strategy 2. Measuring Results 3. Boosting contents reach and engagement 4. Trust and authenticity
Tags : 
content marketing, employee advocacy, social media, content visibility, brand visibility
    
Smarp
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Microsoft has launched the most advanced Windows Server operating system yet: Windows Server 2008. Dell closely collaborated with Microsoft during development, gaining expertise in all aspects of its features and functionality, including key advancements in the management of remote infrastructures.
Tags : 
dell, windows server 2008, remote infrastructures, virtualization, dell powervault
    
Dell Windows Server
Published By: Cisco     Published Date: Dec 15, 2010
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization.
Tags : 
cisco, enterprise-class job scheduling, delivery, business processes, automation software, data center, systems management, backup and recovery, network management, systems security, custom scripting
    
Cisco
Published By: Okta     Published Date: Mar 09, 2015
Many companies believe Active Directory Federation Services (AD FS) is the best choice for applications to integrate with AD. After all, both Active Directory and AD FS are from Microsoft and AD FS is 'free,' so that should be the best choice, right? Not quite. it’s important to realize that not all Active Directory integration solutions are created equal, and IT departments should examine all aspects of implementation when considering a solution. Read this whitepaper and learn what to examine when integrating cloud applications to AD via AD FS.
Tags : 
active directory federation services, integration, it departments, cloud-based identity, access management service, web-based application integrations
    
Okta
Published By: Oracle Corporation     Published Date: May 11, 2012
Download this whitepaper for a summary of the complete and integrated aspect of Oracle's strategy and where OBIEE 11g, the Oracle database, and the Oracle Exadata Database Machine have several key integration points.
Tags : 
oracle, business intelligence, database, exadata, integration, machine, integrate, performance, lower costs, value, time
    
Oracle Corporation
Published By: Comcast Business     Published Date: Mar 24, 2015
The restaurant and bar industry is highly competitive, and many owners of these establishments struggle every day just to stay in business. In fact, approximately 40 restaurants and bars go out of business each day in the U.S. According to celebrity chef, restaurateur, and entrepreneur Robert Irvine, “Part of the problem is that they don’t have the systems and processes in place to track the key aspects of their business – not only their costs and their revenue, but what items sell the best (and by how much), what items are most profitable, who are the most productive employees, and so on.” The use of technology tools and the Internet – driven by a high-speed network connection that supports owners, staff and guests – can be the key to evolving a restaurant or bar from a struggling survivor to a thriving, successful business. Download this white paper to learn more.
Tags : 
hospitality, business, restaurant industry, network connection
    
Comcast Business
Published By: Hubspot     Published Date: Apr 23, 2013
It's a big job, for sure, but one your agency can handle with the right skill set. This 70+ page ebook covers all the crucial aspects of online branding, and will help your agency build out new or refine existing branding services.
Tags : 
inbound marketing, brand management, value proposition, buyer personas, social presence
    
Hubspot
Published By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
ibm, insurance, data, big data, technology, business
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : 
big data, technology, insurance industry, emerging marketing, business intelligence, market research, data management/analytics
    
IBM
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Security measures are becoming important aspects of new business opportunities. See how they are benefitting businesses beyond simply securing the environment.
Tags : 
video surveillance, access control, business intelligence
    
Tyco Integrated Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
    
ThreatTrack Security
Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
We have created the Ultimate Guide to Understanding the Cloud to help you better decipher the many aspects of cloud computing. Download the eBook and understand what the cloud is and the various service and deployment models available to you.
Tags : 
cloud, hosting, managed hosting, disaster recovery, saas, iaas, paas, private cloud, public cloud, hybrid cloud, multi cloud, managed services
    
INetU Managed Hosting
Published By: Magento     Published Date: Feb 15, 2018
This is a great opportunity to discuss the critical aspects of what makes B2B eCommerce successful. Join Magento Commerce, Magento Solution Partner, Monsoon Consulting, and leading UK supplier and industry leader in B2B online sales, Brymec, for The Anatomy of B2B Success webinar. In this webinar, Peter Sheldon shares how digital transformation is driving B2B online sales growth and provide tips on current eCommerce executive thinking. Guy Hewison and Russell Schlaudraff from Brymec share how they are delivering the ‘future of online ordering.’ If you are serious about growing your B2B eCommerce, discover: What's driving the move to online ordering and self service in B2B The importance of understanding who your customers’ buyer really is The common challenges and pitfalls B2B companies face with implementations Advice from Brymec for sourcing a B2B eCommerce platform Tactics for growing online sales and providing a better customer experience
Tags : 
    
Magento
Published By: EverString     Published Date: Jun 27, 2018
B2B marketing team needs to be agile. Many aspects of marketing are constantly in motion: your competitors, your customers, your product, even your own sales team and MarTech stack. You need to be actively exploring tools and technologies that help you spot new opportunities, and help you define and act on those changes to your customer base.
Tags : 
    
EverString
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : 
vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp
    
Vertica
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Feb 20, 2014
Don’t get caught in the crossfire. Read our special report "Who's spying on you?" to find out more about the threats of malware to your business.
Tags : 
kaspersky, malware threats, cyberespionage, internet perpetrators, security technology, internet safety, business protection, cybercriminals, cybersecurity, defend your network, defend your data, data management, innovative protection, sophisticated threats, essential data, confidential information
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Jul 31, 2014
Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe. Download the whitepaper now to learn what you need to create a resilient infrastructure to guard against targeted attacks.
Tags : 
kaspersky, security, cyber attacks, cybersecurity, targeted attacks, data protection, cybersecurity framework, security intelligence
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it’s imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats, it security, data protection
    
Kaspersky Lab
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.