techniques

Results 151 - 175 of 424Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’essor des interfaces de programmation d’applications (API) représente à la fois une opportunité commerciale et un défi technique. Pour les dirigeants d’entreprise, les API sont synonymes de nouvelles sources de revenu et d’optimisation de la valeur pour le client. Ce sont toutefois les architectes d’entreprise qui sont chargés de créer ces API permettant de réutiliser les systèmes back-end dans les nouvelles applications Web et mobiles. Il est crucial que tous les intervenants comprennent que les objectifs métier et les défis techniques d’un programme d’API sont intimement liés. Les responsables de programmes ont pour rôle de présenter clairement les objectifs commerciaux clés d’une API proposée aux architectes qui seront en charge de la conception de l’interface.
Tags : 
    
CA Technologies EMEA
Published By: Google Cloud     Published Date: Aug 17, 2017
Breakthroughs in artificial intelligence (AI) have captured the imaginations of business and technical leaders alike: computers besting human world-champions in board games with more positions than there are atoms in the universe, mastering popular video games, and helping diagnose skin cancer. The AI techniques underlying these breakthroughs are finding diverse application across every industry. Early adopters are seeing results; particularly encouraging is that AI is starting to transform processes in established industries, from retail to financial services to manufacturing.
Tags : 
    
Google Cloud
Published By: Red Hat     Published Date: Jan 07, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 19, 2019
Agile integration — combining integration technologies, Agile delivery techniques, and cloud-native platforms to improve speed and security of software delivery — is a critical foundation for successful digital transformation. The pace of digital innovation and disruption continues to accelerate, driving the need for faster change to business models, processes, and applications. Firms that can quickly reconfigure and reconnect old and new applications have the advantage, and those with slow integration processes are at serious risk of losing customers. An Agile combination of integration and custom development is needed to meet the customer’s expectations and avoid losing market share to competitors that do put the customer first.1 For this study, we assessed the differences between successful and less successful Agile integration and app delivery strategies, why some firms can change their business faster, and what makes one integration strategy better than another. In March 2018, Re
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Uberall     Published Date: Jan 24, 2019
We’ll give you some key insights on how consumers are using technology platforms to guide them, how your clients can leverage those tools to win business, and how you can drive recurring revenue through location marketing services. We’ll also offer some specific tips on optimizing online presence for brands and maximizing budget – taking advantage of the techniques most likely to drive business. Read on to learn more!
Tags : 
local marketing, location analytics, location-based marketing, location-based services, mobile marketing, real-time location systems, marketing research, geofencing, location management, local listings management, local review management, local reputation management
    
Uberall
Published By: Gameffective     Published Date: Feb 26, 2019
How to drive employee motivation and learning with gamification and feedback Digital engagement provides an exciting new way of breaking away from old paradigms to generate motivation, proficiency and engagement. In this white paper we will: * Provide ways to rethink call center agent motivation by using techniques like feedback, competition, adaptive learning and goals. * Take a look at what digital motivation looks like in the contact center from the point of view of a call center agent and his manager Using gamification can do much more than drive quality and performance. It also provides agents with much needed engagement, transparency, feedback and optimal use of best practices training.
Tags : 
    
Gameffective
Published By: DataCore     Published Date: Apr 23, 2019
The emphasis on fast flash technology concentrates much attention on hot, frequently accessed data. However, budget pressures preclude consuming such premium-priced capacity when the access frequency diminishes. Yet many organizations do just that, unable to migrate effectively to lower cost secondary storage on a regular basis. In this white paper, explore: • How the relative proportion of hot, warm, and cooler data changes over time • New machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life • The role of artificial intelligence (AI) in migrating data to the most cost-effective tier.
Tags : 
storage tiering, auto tiering, all-flash array, ssd, software defined storage, hyperconverged, data migration, storage migration
    
DataCore
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
L’essor des interfaces de programmation d’applications (API) représente à la fois une opportunité commerciale et un défi technique. Pour les dirigeants d’entreprise, les API sont synonymes de nouvelles sources de revenu et d’optimisation de la valeur pour le client. Ce sont toutefois les architectes d’entreprise qui sont chargés de créer ces API permettant de réutiliser les systèmes back-end dans les nouvelles applications Web et mobiles. Il est crucial que tous les intervenants comprennent que les objectifs métier et les défis techniques d’un programme d’API sont intimement liés. Les responsables de programmes ont pour rôle de présenter clairement les objectifs commerciaux clés d’une API proposée aux architectes qui seront en charge de la conception de l’interface.
Tags : 
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
    
Trend Micro
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: MicroStrategy     Published Date: Mar 15, 2011
This free, one-day course covers an introduction to Mobile BI Applications and Mobile App architecture, interactivity and design techniques, and how to develop and deploy a fully-functional Mobile App. Students will spend the afternoon session exploring MicroStrategy software with hands-on, instructor-driven exercises.
Tags : 
microstrategy mobile class, bi application, business intelligence, mobile app architecture
    
MicroStrategy
Published By: Riverbed     Published Date: Oct 17, 2012
Faster page load times for Microsoft SharePoint provides user with a more satisfactory experience. This whitepaper examines how two techniques can optimize delivery of web content both separately and delivering up to 4x improvement.
Tags : 
wan optimization, riverbed, sharepoint, application processing, sharepoint, performance
    
Riverbed
Published By: CDW     Published Date: Nov 13, 2012
WAN optimization techniques tweak bandwidth for better network performance and more.
Tags : 
cdw, wan, wan optimizers, data compression, information caching, bandwidth
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security
    
McAfee
Published By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : 
audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data, third-party data, first-party data, digital marketing, single factor correlation, multiple factor correlation, predictive audience models, custom audiences, offline data, effective marketing practices, digital marketers, marketing funnel, trusignal
    
TruSignal
Published By: Marketo     Published Date: Feb 29, 2016
This white paper revelas how Account-based marketing (ABM) can be an effective alternative approach to marketing for many businesses. Download this
Tags : 
abm, account-based marketing, demand generation techniques, abm, benefits of account-based marketing, roi, marketo, marketing, marketing software, customer experience/engagement
    
Marketo
Published By: HP     Published Date: Jan 20, 2015
"Improving the operational aspects of a business can span the organizational chart, from line of business teams focused on the supply chain to IT teams reporting on communication networks and their switches. The goal is to capture the data streaming in from these various processes, and put Big Data techniques to work for you."
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: Workforce Software     Published Date: Jul 28, 2015
Download this white paper to gain a clear understanding of: Where current employee scheduling practices fall short 5 concrete ways to empower employees and improve engagement through scheduling Essential manager tools to look for in any workforce scheduling tool What to expect from scheduling improvements And more
Tags : 
workforce scheduling, employee engagement, productivity, manager tools, scheduling improvements, human resources
    
Workforce Software
Published By: SAP     Published Date: Feb 26, 2016
Work has evolved, so performance management should follow. SuccessFactors partnered with PwC to develop a paper that helps companies assess their PM programs and make PM more effective. Rethinking your performance management program addresses: • The critical importance of having separate but integrated processes to accurately assess past performance and to provide continuous coaching for the future • Techniques for embedding user-friendly social and mobile performance tools that reflect the real rhythm of the business • The pivotal role of HR to evaluate and evolve PM processes Our proven tips on how to adjust and nurture PM processes are food for thought as many managers and employees focus on the business of making 2014 a successful year.
Tags : 
sap, pwc, performance management
    
SAP
Published By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : 
social, engineering, fraud, cyber, security, scams
    
FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.