iss

Results 176 - 200 of 2884Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 27, 2018
Web content management now constitutes mission-critical software to help drive successful communications with customers. Application leaders focused on enabling effective digital experiences should use this document to help them in selecting the most appropriate vendor and solution.
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
I database rappresentano spesso il motore su cui si basa l'attività missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attività del database può rappresentare un grande vantaggio per la crescita aziendale.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows.
Tags : 
    
Dell and Nutanix
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Mobile. It’s where things are going in life and in business. Your coworkers and customers are 2-5 times more likely to access information on their phone than their PC.* This ebook explores the mobile trends that are transforming how business gets done. Plus, it offers real-world examples of how companies like yours are using the new accessibility to their advantage. Get those forms and approvals on those phones and tablets! Imagine NDAs, invoices, project proposals, purchase orders, time sheets, RFPs, permissions, reviews, signoffs – you know, those tiresome paper pushing processes – all accessible, transferable, reviewable, approvable, and actionable via any digital device."
Tags : 
    
DocuSign UK
Published By: OC Tanner     Published Date: Dec 08, 2017
Workplace culture is trending everywhere. In 2014, culture was declared the most popular word of the year by Merriam Webster. In 2015, Deloitte research listed culture as a top-three business challenge for leaders. In 2016, 80 percent of executives rated employee experience as an important issue they need to tackle.
Tags : 
    
OC Tanner
Published By: Infosys     Published Date: May 30, 2018
Customer loyalty is hard to come by today, amid a growing array of choices, omnipresent discounting and fast changing trends and customer preferences. To cut through the clutter, product retailers are increasingly creating targeted offers tailored to customer preferences, to be delivered through an online platform. A premium drinks maker was following the same path when they created a mobile loyalty app to push promotions and notifications to customers. But something crucial was missing. See how Infosys helped and the five key takeaways from the project.
Tags : 
customer, loyalty, application, product, omnipresent
    
Infosys
Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM
Published By: Riverbed     Published Date: Jan 25, 2018
"When apps run efficiently, employees are more likely to use them.” The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach helps you
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Jan 25, 2018
To stay ahead in today's hybrid network, you need a lens into the end user's experience as well as an understanding of the dependencies between your applications and network. With this approach, you are alerted to issues before the business is impacted and problems are resolved faster. This eBook details what you need to know to select a best of breed network performance management solution and outlines the critical capabilities required for deep application visibility across virtualized, hybrid and cloud networks no matter where a user is located. Read this book and: Discover best practices - for proactive network monitoring and fast troubleshooting Learn how to stay ahead of application performance issues with increased visibility Increase productivity and a higher ROI - with automatic discovery, end-to-end monitoring, reporting, analytics and faster MTTR Ensure your approach is a proactive mode Study the
Tags : 
    
Riverbed
Published By: Dell EMC     Published Date: Nov 26, 2018
La technologie Dell EMC pour l’industrie exploite le stockage, les stations de travail et le calcul hautes performances en combinant leurs fonctionnalités pour améliorer les produits, développer des processus de conception et de production plus efficaces et répondre aux préférences en constante évolution des clients. La collecte, l’assemblage et l’intégration d’un nombre croissant de données dans l’ensemble de l’écosystéme, de la modélisation du produit aux tendances d’aprés-vente, font de l’usine numérique une réalité puissante et nécessaire dans l’environnement de production. En savoir plus sur les solutions Dell en collaboration Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
IDC empfiehlt Unternehmen, die ihre IT-Umgebungen modernisieren und operative Risiken, die Kosten verursachen können, begrenzen möchten, Data-Protection-Initiativen höchste Priorität einzuräumen. Um Ihre IT wirklich zu transformieren, modernisieren Sie Ihr Rechenzentrum, um die IT-Effizienz zu steigern. Befreien Sie sich aus Ihren technischen Abhängigkeiten und schützen Sie gleichzeitig Ihre Erträge. Treiben Sie die IT-Transformation voran und erzielen Sie Ergebnisse mit führenden Unternehmenslösungen von Dell EMC, powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Jusqu’à présent, les améliorations du datacenter se sont limitées à la réduction des coûts et à des solutions ponctuelles. La consolidation des serveurs, le Cloud computing, la virtualisation et l’implémentation de stockage Flash ont contribué à réduire la prolifération des serveurs, ainsi que les coûts de personnel et d’installations associés. Regroupant ressources de calcul, de stockage et de réseau au sein d’une même solution, les systèmes convergés se révèlent particulièrement efficaces dans la baisse des dépenses de personnel et de fonctionnement. Ces systèmes définis par logiciel (software-defined) exigent peu d’interventions humaines. Le code intégré dans le logiciel configure le matériel et automatise de nombreux processus autrefois manuels, ce qui réduit considérablement le risque d’erreurs humaines. Ensemble, ces technologies ont permis aux entreprises d’améliorer progressivement les processus et stratégies d’engagement client et de prestation de services.
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
La sauvegarde est une chose, la restauration est tout. Vous reconnaissez sans aucun doute combien votre base de données Oracle est essentielle à la réussite de votre organisation. Mais que faire en cas de panne ou de cyberattaque ? Êtes-vous certain de pouvoir restaurer rapidement toutes vos données ? Les solutions de sauvegarde traditionnelles peuvent exposer votre entreprise au risque de la perte de données. La solution Oracle Zero Data Loss Recovery Appliance réduit votre exposition à ce risque et vous permet d’économiser du temps, des efforts et le stress de la récupération des données. Découvrez comment nos clients récupèrent leurs données sans drame.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Oracle Database powers your business’s mission-critical applications. Their downtime and data loss can have a devastating impact on your company’s bottom line and productivity—not to mention the damage to your company’s (and your) reputation, because outages and data losses make headlines.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Workday Spain     Published Date: Sep 19, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.