dynamic

Results 751 - 775 of 818Sort Results By: Published Date | Title | Company Name
Published By: Sponsored by HP and Intelģ Xeonģ processors     Published Date: Apr 11, 2013
Between increased use of server virtualization, the dynamic proliferation of private cloud, the ever-growing unstructured data pool, and the advent of ďbig data,Ē organizational data is going to continue to grow. Learn more about what HP has in store
Tags : 
dedupe 2.0, store(once), deduplication, strategy, data source
    
Sponsored by HP and Intelģ Xeonģ processors
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
We live in a digital world, surrounded by the most powerful innovations in human communication since the invention of the printing press. We document our daily lives on a global scale. With Twitter, Facebook, Instagram, and other social media sites, we are always plugged in, consuming and producing content every minute of every day. Understanding the power of social integration is half the battle; finding the right tools and strategies to help you do this easily and effectively is equally important. Knowing what to look for and what to get out of a social experience platform is extremely important in creating a successful campaign, product launch, or dynamic brand experience.
Tags : 
spredfast, social media, sponsorship, content, social integration, emerging marketing, internet marketing
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
We live in a digital world, surrounded by the most powerful innovations in human communication since the invention of the printing press. We document our daily lives on a global scale. With Twitter, Facebook, Instagram, and other social media sites, we are always plugged in, consuming and producing content every minute of every day. Understanding the power of social integration is half the battle; finding the right tools and strategies to help you do this easily and effectively is equally important. Knowing what to look for and what to get out of a social experience platform is extremely important in creating a successful campaign, product launch, or dynamic brand experience.
Tags : 
spredfast, social media, sponsorship, content, social integration, emerging marketing, internet marketing
    
Spredfast, Inc.
Published By: Sprint     Published Date: Oct 18, 2010
Discover the dynamic new approach to Voice Over Internet Protocol services called the Partner Inter-exchange Network (PIN).
Tags : 
sprint wholesale, partner interexchange network, pin, scalable voice peering, voice over internet protocol, ip networks
    
Sprint
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‚Äźmakers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‚Äźprocess changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized
    
SRC,LLC
Published By: StreamSets     Published Date: Dec 05, 2018
Enterprise analytics is quickly evolving into a democratized capability where anyone can access and act on all available information, often in real-time employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration. This paper proposes that DataOps, the application of DevOps practices to data analytics, is the best way to overcome these challenges to create an iterative build-operate process for data movement. Read this white paper to: Understand how modern data analytics create data integration challenges due to architectural complexity, operational blindness and data drift. Learn how DevOps pillars of automation and monitoring can create higher developer productivity, operational efficiency and business confidence in data. See specific examples of DataOps functionality being applied to data integration across modern architectures.
Tags : 
    
StreamSets
Published By: StreamSets     Published Date: Feb 13, 2019
Enterprise analytics has quickly evolved from a centralized business intelligence function for historical reporting and dashboards to a democratized capability where anyone can access, analyze and act on all available information, often in real-time while employing advanced techniques. But the complex, dynamic and urgent nature of modern data analytics demands a new approach to data integration.
Tags : 
    
StreamSets
Published By: SundaySky     Published Date: Mar 06, 2018
Cox Communications has been a SundaySky customer for five years, running personalized video ad programs through traditional video publisher channels. At the end of 2016, Cox Communications expanded that program to Facebook to see if greater levels of personalization and performance could be achieved by combining the dynamic capabilities of SmartVideo technology with the reach of the Facebook ads platform. The program targets recent Cox website visitors on Facebook and delivers them a relevant video ad with offers related to products and services they had viewed on Cox.com. The program leverages SundaySkyís SmartVideo platform to achieve Coxís online revenue goals of maximizing the number of revenue-generating orders on its website while also lowering the cost per acquisition (CPA) as the program optimizes.
Tags : 
    
SundaySky
Published By: Sungard Availability Services     Published Date: Sep 23, 2016
Dynamic logistics and aviation business John Menzies plc needed a flexible, scalable IT infrastructure to support its ambitious growth plans. And it needed it quickly.?
Tags : 
it management, it infrastructure, it support
    
Sungard Availability Services
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Supply chain-centric organizations face unique challenges in today’s rapidly-changing marketplace. A variety of macro-industry factors, combined with the dynamic nature of their business, have made operations increasingly complex. As a result, there is an urgent need for tools that enable complete visibility into and enhanced management of inventory and related events and activities.
Tags : 
inventory, inventory control, scm, supply chain, supply chain connect, vendor managed inventory, collaboration, collaborating
    
Supply Chain Connect
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the yearís global internet threat activity. The report is based on data from the Symantecô Global Intelligence Network, which Symantecís analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings ē 91% increase in targeted attacks campaigns in 2013 ē 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyoneís lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customersí sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security
    
Symantec
Published By: Symantec     Published Date: Oct 20, 2014
Today, Symantec finds itself in an industry that is defined by tough competition, as well as an ever-changing variety of sophisticated security threats directed at its customers. To compete in this dynamic environment, Symantec has embarked on a strategy to streamline and simplify the company around its customers.
Tags : 
symantec, vmware, vcloud, data center
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attackerís advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new ďDigital Industrial Transformation with the Internet of ThingsĒ report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : 
industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains
    
T Systems
Published By: TeamQuest     Published Date: Apr 09, 2014
Find out what more than 400 respondents globally had to say about solving issues associated with agility, risk and efficiency. This 1:15 video shares and summarizes several findings that can help organizations increase IT efficiency in today's rapidly changing, highly dynamic, highly shared and distributed environments.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: TeamQuest     Published Date: Apr 09, 2014
Your customers rely on you to efficiently manage a highly dynamic, rapidly changing, highly shared, distributed environment so they can do their jobs effectively. This means working through the complexities of understanding the services in your virtualized networks, machines and storage, and determining how and when customers will be affected. Listen to virtualization expert Bernd Harzog discuss the complexities that many IT professionals face.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: TeamQuest     Published Date: Sep 04, 2014
You donít have to be a superhero to be a CFO, but it would help. The rapidly changing pace and dynamics of todayís business environment is placing fresh pressures on all director-level executives, but none more than the CFO who now has virtually equal responsibility for then success of the company as the CEO but without quite the same glory.
Tags : 
risk management, corporate management, operational partnerships
    
TeamQuest
Published By: TeamQuest     Published Date: Dec 19, 2014
Businesses are constantly putting pressure on price, performance and reliability of IT services and infrastructure. Recent adoption of technologies such as virtualization, dynamic computing and various forms of cloud computing coupled with changing management paradigms has raised the stakes even more. This ruthless drive for efficiency calls for the use of more sophisticated optimization methods. It is safe to say that if you donít, chances are you will be ďdoneĒ by others who do.
Tags : 
infrastructure, virtualization, optimization, guide, descriptive, diagnostic, predictive, prescriptive
    
TeamQuest
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook youíll learn whatís working Ė and whatís not Ė from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether itís discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: ē Minimize the attack surface ē Expand visibility of assets beyond the perimeter ē Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Tharpe Robbins     Published Date: Jun 23, 2014
Do you recall the commercial a cellular provider once ran a that displayed cellular-connection ďbarsĒ above peopleís heads to indicate the signal strength of the connection? Maybe thatís the way we can all look at employee engagement. Employee engagement is measurable, and we call that engagement signal strength (ESS). Itís not a static score, but a dynamic measurement that may change every day depending on what happens at work with a co-worker or supervisor, or at even home. This white paper from TharpeRobbins explains how you can understand your ESS and increase it with smart solutions.
Tags : 
employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent
    
Tharpe Robbins
Published By: ThousandEyes     Published Date: Nov 17, 2016
As the Internet becomes the WAN backbone, Software-defined-WAN (SD-WAN) is gaining popularity. SD-WAN provides the flexibility to choose the most optimal transport and dynamically steer traffic over hybrid access networks. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: TIBCO Software     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
    
TIBCO Software
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.