dynamic

Results 51 - 75 of 839Sort Results By: Published Date | Title | Company Name
Published By: TeamQuest     Published Date: Dec 19, 2014
Businesses are constantly putting pressure on price, performance and reliability of IT services and infrastructure. Recent adoption of technologies such as virtualization, dynamic computing and various forms of cloud computing coupled with changing management paradigms has raised the stakes even more. This ruthless drive for efficiency calls for the use of more sophisticated optimization methods. It is safe to say that if you don’t, chances are you will be “done” by others who do.
Tags : 
infrastructure, virtualization, optimization, guide, descriptive, diagnostic, predictive, prescriptive
    
TeamQuest
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing
    
OneNeck IT Services
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: SAP     Published Date: Nov 01, 2017
View this webinar to find out how to address challenges with PaaS such as Macro Trends, Dynamic Workforce, Disruptive Technology Adoption and New Digital Business Models.
Tags : 
    
SAP
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Dassault Systèmes
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: SAP     Published Date: Nov 04, 2015
Download this whitepaper to discover how global companies are using innovative technologies such as beacons, dynamic pricing and adaptive analytics to flourish in the modern-day, next-generation retail world. Learn what they believe they’re doing well and where they’re struggling as they adapt to today’s rapidly evolving marketplace. These insights can help your business thrive in an increasingly disruptive retail landscape.
Tags : 
consumer behaviors, sap, dynamic pricing, beacons, adaptive analytics, marketplace, fulfillment, customer experience
    
SAP
Published By: Equinix     Published Date: Mar 26, 2015
Connections are great. Having a network to connect to is even better. Humans have been connecting, in one form or another, throughout history. Our cities were born from the drive to move closer to each other so that we might connect. And while the need to connect hasn’t changed, the way we do it definitely has. Nowhere is this evolution more apparent than in business. In today’s landscape, business is more virtual, geographically dispersed and mobile than ever, with companies building new data centers and clustering servers in separate locations. The challenge is that companies vary hugely in scale, scope and direction. Many are doing things not even imagined two decades ago, yet all of them rely on the ability to connect, manage and distribute large stores of data. The next wave of innovation relies on the ability to do this dynamically.
Tags : 
data center, interconnectivity, mobile, server clusters, innovation, data storage
    
Equinix
Published By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture
    
Riverbed
Published By: Riverbed     Published Date: Nov 08, 2012
Many enterprises are shifting from desktop applications to web and mobile apps, they have started a tidal wave of dynamic content that will overwhelm traditional architectures. A tidal wave of dynamic web content is coming - how will you respond?
Tags : 
web content management, real time information, mobile apps, web content optimization
    
Riverbed
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
MongoDB is an open-source, document database designed with both scalability and developer agility in mind. MongoDB bridges the gap between key-value stores, which are fast and scalable, and relational databases, which have rich functionality. Instead of storing data in rows and columns as one would with a relational database, MongoDB stores JSON documents with dynamic schemas. Customers should consider three primary factors when evaluating databases: technological fit, cost, and topline implications. MongoDB's flexible and scalable data model, robust feature set, and high-performance, high-availability architecture make it suitable for a wide range of database use cases. Given that in many cases relational databases may also be a technological fit, it is helpful to consider the relative costs of each solution when evaluating which database to adopt.
Tags : 
total, cost, ownership, comparison, mongodb, oracle
    
AstuteIT_ABM_EMEA
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This paper sponsored by HP and Intel® discusses the dynamics of harnessing information and explains how you can leverage technology to better capitalize on information in the context of your business.
Tags : 
vision for storage architecture, managing storage space, intel, converged storage, information storage
    
Sponsored by HP and Intel®
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
Intel Security
Published By: Infosys Limited     Published Date: Aug 02, 2019
The consumer packaged goods landscape is a sum of many complex and moving parts – a demanding and ever changing customer universe, with a subset of digital natives; a complex distribution system; and legacy IT systems from internal silos and mergers. In such a dynamic environment, we help our clients accelerate growth by transforming their organization to become a thriving Live Enterprise by augmenting their core digital capabilities. The cloud is an integral part of this digital transformation ushering CPG enterprises into a new era of hyper performance. Cloud promises to deliver several significant benefits including reduced costs, increased scalability, flexibility, and agility, leading to improved business performance and therefore growth. To better understand the specifics of cloud initiatives, we surveyed 167 senior executives from organizations in the CRL industry, with over USD 1 billion in revenues across the United States, Europe, Australia and New Zealand. Download thi
Tags : 
    
Infosys Limited
Published By: Pattern     Published Date: Jan 09, 2019
Like it or not, your products will appear on online marketplaces. The question is whether your company can assert the control over your online sales necessary—particularly on marketplaces— to win in this dynamic market environment. Read on to learn more about these challenges— and what your company can do to be positioned to win.
Tags : 
    
Pattern
Published By: SAP     Published Date: Apr 30, 2008
Consider how life sciences manufacturers can deal effectively with dynamic market needs, increased compliance requirements, more distributed manufacturing operations, and rapid product innovation.
Tags : 
sap, scm, erp, lean manufacturing, lean methods
    
SAP
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway
    
McAfee
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: IBM     Published Date: Apr 18, 2012
This white paper describes the ability of IBM Maximo Asset Management solutions to efficiently and effectively manage processes and costs across the life cycle of an organization's vehicular fleet by standardizing processes, managing complexity, and aligning resources with demands.Dynamic transportation fleets require integrated asset management
Tags : 
ibm, manufacturing, asset management, transportation, fleets, product, technology
    
IBM
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: IBM     Published Date: Mar 04, 2014
This white paper discusses the key market trends and challenges facing organizations as they seek to deploy mobile enterprise solutions and examines the growing requirements of these firms. It also delivers an overview of how enterprises can address the challenges in terms of repackaging and optimizing applications to better operate in a converged, dynamic mobile world.
Tags : 
ibm, mobile, mobile enterprise, market trends, deployment, mobile enterprise solutions, applications, application performance
    
IBM
Published By: Adobe     Published Date: Mar 17, 2016
With Adobe Document Cloud eSign services integrated into Microsoft Dynamics, your sales processes become even quicker.
Tags : 
adobe, esign, microsoft dynamics, crm, sales process, customer experience/engagement, sales
    
Adobe
Published By: McAfee     Published Date: Apr 25, 2014
As malware becomes ever more sophisticated and evasive, new technologies are emerging to uncover threats no matter how well they’re camouflaged. This paper proposes a logical design strategy for dynamic malware analysis that optimizes detection effectiveness, efficiency, and economics.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.