ibe

Results 176 - 200 of 1103Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : 
ibm, resilience, cloud, design, sustain
    
IBM
Published By: IBM     Published Date: Apr 05, 2016
It's no longer enough to be able to predict what might happen-organizations also need to know how to respond to predictive insights. This white paper describes how predictive analytics and decision optimization can work together to create a powerful end-to-end decision management system.
Tags : 
ibm, business insight, business action, ibm decision optimization, ibm predictive analytics
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
The synergy between predictive analytics and decision optimization is critical to good decision making. Predictive analytics offers insights into likely future scenarios, and decision optimization prescribes best-action recommendations for how to respond to those scenarios given your business goals, business dynamics, and potential tradeoffs or consequences. Together, predictive analytics and decision optimization provide organizations with the ability to turn insight into action—and action into positive outcomes. In this white paper, you’ll gain a better understanding of: The difference between predictive and prescriptive analytics How predictive and prescriptive actions complement one another to help you achieve optimized business decisions IBM’s approach to creating a powerful end-to-end decision management system
Tags : 
ibm, predictive analytics, decision optimization, synergy, decision making, business goals, prescriptive analytics, decision management
    
IBM
Published By: Prevero     Published Date: Feb 23, 2018
Ohne eine angemessene IT-Unterstützung lässt sich eine werttreiberbasierte Planung nicht umsetzen. Die Auswahl der passenden Software ist mindestens genauso wichtig wie die Identifikation der geschäftsspezifischen Werttreiber und die Konzipierung eines werttreiberbasierten Planungsmodells. Insbesondere Softwarelösungen, die bereits branchenspezifische Werttreiberbäume hinterlegt haben, bieten für Unternehmen große Vorteile. Gleichzeitig ist auf die Usability und eine hohe Flexibilität mit einfacher Anpassungsfähigkeit zu achten, die ohne umfangreichen Customizing-Aufwand realisiert werden kann.
Tags : 
werttreiberbasierte, planung, prevero
    
Prevero
Published By: Akamai     Published Date: Mar 08, 2017
This whitepaper discusses why speed, or throughput, is so critical for today’s Internet users, provides a historical perspective on the Internet’s TCP protocol underpinning and describes how the FastTCP protocol addresses the needs of today’s Internet.
Tags : 
online video, online video quality, speed, internet, reliability
    
Akamai
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: NetApp EMEA     Published Date: Feb 15, 2018
Der Eintritt von NetApp in den Hyperkonvergenzmarkt ist seit Langem überfällig, und die Lösung wird bei den wichtigsten Kunden des Unternehmens große Wellen schlagen. IDC ist der Meinung, dass die Entscheidung von NetApp für die Technologie von SolidFire als Grundlage der HCI beweist, dass es verstärkt auf die neue Generation von Speichertechnologien setzt, die den digitalen Wandel ermöglichen. Die Integration mit Data Fabric zeigt, dass NetApp fähig ist, seine Vision für die hybride Cloud und den Datenverkehr in all seine Lösungen einzubringen, damit Kunden ihre Pläne für eine hybride IT nahtlos vorantreiben können. Schließlich deuten die flexiblen Skalierungsmöglichkeiten darauf hin, dass NetApp nicht einfach in aller Eile ein „Me-too“ Produkt auf den Markt bringen, sondern vielmehr ernsthaft auf die kostenbezogenen Herausforderungen eingehen wollte, denen sich HCI-Kunden gegenübersehen.
Tags : 
netapp, hcl, erste, hyperkonvergente, infrastrukturlosung
    
NetApp EMEA
Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : 
mobile developers, microsoft azure, xamarin, it operations, developer market, container
    
AppDynamics
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: CA Mainframe     Published Date: Sep 12, 2008
This paper describes the approaches in MDD, explains how CA Gen fits into the larger picture of application development, and relates customer experiences to underpin the quiet success. Access this White Paper now to learn how to CA Gen goes one step further!
Tags : 
model, application development, software development, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : 
ca mainframe, mainframe
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: EMC     Published Date: Apr 15, 2011
This white paper describes a simple, efficient, and powerful EMC proven solution that enables small and medium size businesses to deploy up to 250 virtual desktops rapidly and cost-effectively.
Tags : 
emc vnxe3300, vmware, virtual desktop, integrated infrastructure, storage platform, vmware vsphere 4.1, vmware view 4.5
    
EMC
Published By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : 
emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs
    
EMC
Published By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : 
enterprise, soa, technology, liaison, business, data integration, data architecture, it management
    
Liaison Technologies
Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage
    
LogLogic
Published By: Tellabs     Published Date: Mar 23, 2012
This white paper from Tellabs outlines the key steps for upgrading a backhaul network to Ethernet and the benefits compared to TDM or SDH/SONET.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network
    
Tellabs
Published By: Teradata     Published Date: Jan 30, 2015
This report is about two of those architectures: Apache™ Hadoop® YARN and Teradata® Aster® Seamless Network Analytical Processing (SNAP) Framework™. In the report, each architecture is described; the use of each in a business problem is illustrated; and the results are compared.
Tags : 
teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges
    
Teradata
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: BMC Software     Published Date: May 28, 2014
This paper, "Workload Automation – From Application Development to Digital Service Delivery," describes how a workload automation solution can eliminate the manual processes developers now use to define batch workflows and communicate them to schedulers.By extending the use of workload automation to developers, organizations can implement applications faster, slash costs, and increase service quality.
Tags : 
big data, hadoop
    
BMC Software
Published By: Oracle     Published Date: May 05, 2017
Vertriebsmitarbeiter vertreiben. Kunden kaufen. Digitalisierung verändert.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.