dynamic

Results 351 - 375 of 798Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Sep 22, 2015
The challenge of meeting the modern buyers expectation of a continuous, cross-channel, and personal experience is met with new ad technology and innovations that continue to advance at break-neck speeds. New ad technology platforms, types of ads, methods of tracking, dynamic ad content, and advances such as the Internet of Things now provide endless opportunities for marketers and advertisers to engage their customers personally and across channels.
Tags : 
marketo, digital advertising, strategy, ads, technology, measure, acquisition, loyalty, nurture, branding, search marketing, email marketing, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing
    
Marketo
Published By: F5 Networks Inc     Published Date: Nov 20, 2008
Best practices for a Microsoft Hyper-V Dynamic Data Center in an HP BladeSystem environment.
Tags : 
microsoft hyper-v dynamic data center, hp bladesystem, hyper-v, microsoft, adaptive infrastructure, bladesystem, dynamic data center, virtualization
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
enhancement, feature, big-ip, application delivery controller, adaptable, dynamic, device, system, version, management, solution
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP resource provisioning combines the best features of each virtualization model by enabling BIG-IP LTM modules to run sandboxed without sharing resources, while giving them the ability to dynamical scale if/when needed. Resource provisioning is a new model in hardware virtualization, one that will change the face of application delivery and Application Delivery Controllers moving forward.
Tags : 
big-ip, resource, feature, virtualization, ltm, modules, application, delivery, controller, functionality, solution, control, data
    
F5 Networks Inc
Published By: BMC Control M     Published Date: Jul 22, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm, web hosting
    
M86 Security
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: Cotendo     Published Date: Nov 18, 2011
Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.
Tags : 
mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance, mobile cdn, mobile cloud, mobile application performance, cotendo, redfin, webinar, online real estate, mobile user experience
    
Cotendo
Published By: Riverbed     Published Date: Oct 17, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs. With complexity growing at a fast rate, application discovery and mapping will soon be mandatory.
Tags : 
riverbed, application visibility, infrastructure monitoring, it infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture
    
Riverbed
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
Discover how the shift from "buy and hold" data center strategy to the next generation of HP ProLiant servers can tackle today's IT constraints and tomorrow's business opportunities in this new IDC dynamic white paper.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Sponsored by HP and Intel® Xeon® processors
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: GoodData     Published Date: Oct 14, 2013
Get the dashboard strategies report now!
Tags : 
gooddata, marketing dashboard, dynamic dashboards
    
GoodData
Published By: Cisco     Published Date: May 14, 2015
Read this whitepaper to learn why enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements.
Tags : 
cloud computing, erp, productivity, applications, efficiency, hybrid, cisco
    
Cisco
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this Constellation Research report, Principal Analyst Doug Henschen examines how Indiana manufacturer Steel Dynamics cut skyrocketing healthcare costs by turning their employees into informed healthcare consumers, saving millions. This inside look details how Castlight's health benefits platform provided Steel Dynamics employees with the combination of pricing information and quality measures they needed to make their own smart healthcare decisions. Download now to get the key takeaways and recommendations.
Tags : 
castlight health, healthcare cost, benefits, human resources
    
Castlight Health
Published By: Tharpe Robbins     Published Date: Jun 23, 2014
Do you recall the commercial a cellular provider once ran a that displayed cellular-connection “bars” above people’s heads to indicate the signal strength of the connection? Maybe that’s the way we can all look at employee engagement. Employee engagement is measurable, and we call that engagement signal strength (ESS). It’s not a static score, but a dynamic measurement that may change every day depending on what happens at work with a co-worker or supervisor, or at even home. This white paper from TharpeRobbins explains how you can understand your ESS and increase it with smart solutions.
Tags : 
employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent, retention, social recognition, sales performance, career recognition, retirement recognition, employee incentives, recognition software, engagement platform, career, performance, social, service award
    
Tharpe Robbins
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
What is SD-WAN? Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud. More simply, it is the method of leveraging the benefits of the cloud, the bandwidth of broadband and existing enterprise-wide network infrastructure to more efficiently and cost effectively transmit media (data, video, voice) and quickly access cloud applications from every location in the network. SD-WAN dynamically utilizes multiple available connections (MPLS, broadband, LTE) to find the optimal delivery path for traffic across the entire network, shaping the bandwidth as needed to eliminate jitter and dropped data packets, thereby delivering an optimal user experience regardless of location. The more sophisticated solutions will first attempt to dynamically steer traffic to the best available link and if the available link
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: CommVault     Published Date: Jun 10, 2015
Data and information management is becoming increasingly complex and dynamic. There are innovations in technology and process that can supply new advantages.
Tags : 
software, backup, optimize, management, efficiency
    
CommVault
Published By: SAP     Published Date: Mar 08, 2016
The digital economy is upending all industries and processes, placing a premium on speed, customer satisfaction, personalized products, and collaboration. These dynamics require companies to adopt a digitized, extended supply chain model that can respond immediately to dynamic changes and satisfy increasingly demanding customers.
Tags : 
sap, supply chain, digital
    
SAP
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.