• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

apo

Results 126 - 147 of 147Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Apr 18, 2016
Ooyala manages rapid growth with Cisco Metapod™ to enable efficient, streaming HD video services.
Tags : 
    
Cisco
By: Optify     Published Date: Sep 13, 2012
Discover what visitor and lead intelligence details are available to B2B marketers, and how to use that info to help sales win more often.
Tags : 
website visitor intelligence, lead intelligence, lead generation, leveraging data, lead scoring, internet marketing
    
Optify
By: HP     Published Date: Sep 08, 2014
Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and security. When such a shift occurs, legacy servers rapidly become obsolete, dragging down enterprise productivity and agility. Fortunately, each new server shift also brings its own suite of enabling technologies, which deliver new economies of scale and entire new computational approaches. In this interview, long-time IT technologist Mel Beckman talks to HP Server CTO for ISS Americas Tim Golden about his take on the latest server shift, innovative enabling technologies such as software-defined everything, and the benefit of a unified management architecture. Tim discusses key new compute technologies such as HP Moonshot, HP BladeSystem, HP OneView and HP Apollo, as well as the superiority of open standards over proprietary architectures for scalable, cost-effect
Tags : 
servers, innovative, management, mobility, security, computational, technologies, mainframes
    
HP
By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security myths, customer protection, ever-changing threats, website security, security
    
Thawte
By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
By: Cisco     Published Date: Jul 11, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
By: AdRoll     Published Date: Jul 11, 2017
AdRoll surveyed 350 marketers across Australia, New Zealand and Singapore this year to dive into how they're thinking about the latest performance strategies across every stage of the marketing funnel. The survey explored: • The challenges marketers are tackling when creating mobile campaigns • The attribution models marketers are moving toward • The key performance indicators marketers are using to measuring to determine the success of their campaigns • The channels marketers are using to run programmatic advertising • And more! See how your campaigns compare to those of 350 other marketers.
Tags : 
marketing, programmatic advertising, performance marketing, adaptation
    
AdRoll
By: Maponics     Published Date: Sep 24, 2010
This case study tells the story of how HelloMetro, a network of more than 1,600 city guide web sites, used Maponics Neighborhood Boundaries and ZIP Code Boundaries to significantly increase web site traffic and revenue.
Tags : 
neighborhood data, neighborhood boundaries, neighborhood database, neighborhood names, neighborhood information by zip code
    
Maponics
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
By: MuleSoft     Published Date: Sep 08, 2016
Between March 25th and March 28th, 2016, MuleSoft surveyed 802 IT decision makers globally across Australia, the Netherlands, Hong Kong, Singapore, Sweden, the United Kingdom and the United States. The survey assessed how organizations of all sizes are executing on digital transformation, IT challenges and technologies used to meet business goals.
Tags : 
mulesoft, digital transformation, it challenges, business goals, it innovation, business management, business process management, customer relationship management
    
MuleSoft
By: Oracle     Published Date: Apr 16, 2018
Los líderes empresariales quieren que los gestores financieros asuman el papel de conductores proactivos del negocio. Pero tu equipo ¿está preparado para esto? Ve cómo las soluciones de Finanzas de Oracle pueden apoyar la Jornada de la Modernización Financiera con tecnologías innovadoras que impactan directamente los procesos de negocio, ofreciendo alto desempeño, agilidad y evolución con diversas funcionalidades cada vez más alineadas a las necesidades de los usuarios de negocio.
Tags : 
como, aumentar, agilidad, equipo, financiero, reducir
    
Oracle
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
    
Cox Business
By: Google     Published Date: Aug 09, 2017
This document gives an overview of how security is designed into Google’s technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
Tags : 
cloud, cloud computing, security. infrastructure
    
Google
By: Oracle     Published Date: Jan 09, 2019
The Accenture Oracle data team has more than 20,000 professionals, who aid in delivering 50 billion transactions a day across more than three exabytes of data for clients globally. Accenture Oracle data specialists recently put the Oracle Autonomous Data Warehouse to a rigorous performance test to provide a real-life application usage experience. The data was then extrapolated and expanded to nine years’ worth of data to test the performance. Learn directly from Accenture experts about testing methodology and results that enable them to deliver more data intelligence faster to the enterprise and transform the way people live and work.
Tags : 
    
Oracle
By: List Sotheby's International Realty, Singapore     Published Date: Feb 13, 2019
Branded residences are luxury homes associated to a premium brand that offers prestige and recognition through association, in addition to services it provides to its owners. The key themes that surround a branded residence are the emphasis on design, services, facilities and amenities, and architecture.
Tags : 
    
List Sotheby's International Realty, Singapore
By: List Sotheby's International Realty, Singapore     Published Date: Jun 11, 2019
The former Keppel Harbour was transformed into the vibrant marina-waterfront living precinct that it is today. To date, the Keppel Bay waterfront is lined by three iconic residential developments – Caribbean At Keppel Bay, Reflections At Keppel Bay and Corals At Keppel Bay – with a total of 2,464 apartments. As the Keppel Bay precinct matures over the years, the marina-waterfront housing lifestyle has taken roots and offers an attractive living concept to prospective buyers. Being situated on the mainland, Keppel Bay also have the advantage of being closer to amenities and have better accessibility and connectivity. Following the announced extension of the CCL to include three more stations (Keppel, Cantonment and Prince Edward) to close the circle, Keppel Bay will be directly connected to Marina Bay in the Downtown Core. When these stations are in operation by 2025, travel time between Keppel Bay and the CBD will be reduced by one-third of the current travel time.
Tags : 
    
List Sotheby's International Realty, Singapore
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Retailers know that stores will be a hub of sales activity for many years to come. While eCommerce sales continue to rise, the store remains the primary contributor to retail enterprise sales. It also serves as the retailer’s tangible face to the world.
Tags : 
    
Group M_IBM Q3'19
By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
By: ExpertVoice     Published Date: Jun 17, 2019
I’m not sure if you’ve heard, but people keep talking about how we’re in the midst of a retail apocalypse. It’s this thing where lots of brick-and-mortar locations close down, and even entire companies go out of business. There’s quite a bit of blame to go around: The Great Recession, and Amazon, and private equity, and shifting consumer spending behaviors. In spite of the doomsday headlines, some brands continue to succeed, and a lot of those brands seem to be focusing on one thing: the customer experience. A good retail experience for a customer can be as complicated as incorporating innovative technology like 3D printing to create a clothing item on-demand, or as simple as focusing on the store employees. Unfortunately, a lot of brands and retailers overlook the latter. In fact, according to this recent panel surveying retail employees, only 35% of retail employees feel as though training is effective. That’s a scary number for both retailers and brands, because without a well train
Tags : 
    
ExpertVoice
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter