• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

events

Results 151 - 175 of 263Sort Results By: Published Date | Title | Company Name
By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
    
Tripwire, Inc
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
    
Tripwire, Inc
By: Crowdcast     Published Date: Apr 30, 2010
The Aberdeen Group reviews SAP's partnership with Crowdcast and how Crowdcast's Collective Intelligence Platform is used to monitor key risk indicators, helping enterprises course correct as events arise that may impact success.
Tags : 
crowdcast, cpg, key risk, businessobjects, grc, platforms, collective intelligence, packaging
    
Crowdcast
By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how to accelerate the path to IoT through the Visible Value Chain (VVC). It enables organizations to gain real-time visibility into their operations allowing them to be more nimble, agile, and make better-informed business decisions. Once organizations have seamlessly enabled device connection to the data center, they can see events occurring throughout their value chain in real time—and act upon them. Doing so creates new value and intelligence from both legacy and new devices, while mining the vast riches of Big Data.
Tags : 
zebra, internet, visible value chain, vvc, big data, data center, device connection, iot
    
Zebra
By: CenturyLink     Published Date: Nov 18, 2011
Only companies with a disaster-ready infrastructure and solid business continuity plan can come through such events with minimal downtime and cost.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
By: IBM     Published Date: Nov 09, 2012
Many of the latest initiatives in the IT world are focused around aligning IT resources more closely with business users and solution needs. In this white paper, learn to make better business decisions with flexible, automated business rules.
Tags : 
operations decision management, it infrastructure, data management, automated business rules, automated business events, it management
    
IBM
By: IBM     Published Date: Apr 18, 2012
IBM Tivoli Netcool/OMNIbus is a "manager of managers" designed to collect and correlate events and provide a holistic "single pane of glass" view into the health and performance of the entire business IT and network infrastructure, with its increasingly instrumented devices.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, technology platform, application integration
    
IBM
By: SAP     Published Date: May 11, 2012
SMEs need confidence to act boldly on business intelligence and take advantage of business opportunities. The key is to better understand all facets of all the business and to enable data-driven decision making as events unfold.
Tags : 
sme, small and medium enterprises, business intelligence, real time business intelligence, sap, data management
    
SAP
By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network
    
Limelight Networks
By: Oracle     Published Date: Jan 21, 2014
The rise of big data provides Modern Marketers with an unprecedented level of insights. But too often, it's easy to get buried by the data. We put together 40 Must-See Charts for Modern Marketers, offering analysis and intelligence today's marketers need to know across a range of disciplines from email marketing and lead management to social media and events.
Tags : 
modern marketers, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance
By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security
    
Cyveillance
By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
By: AWS     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
    
AWS
By: AWS     Published Date: Oct 30, 2018
As cybercriminals look for new ways to break through defenses, it’s vital that organizations have access to real-time operational intelligence across their applications, services, and security infrastructure. As Recreational Equipment, Inc. (REI) migrated applications to Amazon Web Services (AWS), it needed to expand security capacity for edge protection of its AWS VPCs. REI chose Splunk for security monitoring, historical analysis, and data visualization in real time, to help it investigate events and mitigate operational risks.
Tags : 
rei, intelligent, threat, detection, edge, protection, aws, splunk
    
AWS
By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine
    
VMware
By: VMware     Published Date: Dec 18, 2012
How to prepare for and mitigate the “Black Swan Events” in your data center
Tags : 
disaster recovery, guide, data center, virtualization, database security
    
VMware
By: Oracle     Published Date: Feb 10, 2016
Today's online customer-connected era demands tight integration as well as collaborative systems and processes to orchestrate events and activities across the multi-party end-to-end supply chain. The omni-channel customer mandate implies "order from anywhere, fulfill from anywhere, and return to anywhere." To address this challenge, we present '5 Key Steps to Build a Cloud-ready Supply Chain for your Organization'.
Tags : 
oracle, cloud based supply chain, execution, omnichannel. best practices, it management, wireless, data management, manufacturing
    
Oracle
By: FORA.tv     Published Date: Jun 11, 2012
The conference and event industry is booming. An online video strategy can help conference and event organizers benefit from various trends. Download your complimentary white paper now and find out more!
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos
    
FORA.tv
By: FORA.tv     Published Date: Aug 09, 2012
The conference and event industry is booming. Audiences everywhere are rediscovering the value of face-to-face networking, the importance of professional education, and the plain thrill of hearing a dynamic speaker firsthand.
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos
    
FORA.tv
By: FORA.tv     Published Date: Aug 20, 2012
The conference and event industry is booming. Audiences everywhere are rediscovering the value of face-to-face networking, the importance of professional education, and the plain thrill of hearing a dynamic speaker firsthand.
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos
    
FORA.tv
By: FORA.tv     Published Date: Aug 30, 2012
The conference and event industry is booming. An online video strategy can help conference and event organizers benefit from various trends. Download your complimentary white paper now and find out more!
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos
    
FORA.tv
By: FORA.tv     Published Date: Aug 30, 2012
The conference and event industry is booming. An online video strategy can help conference and event organizers benefit from various trends. Download your complimentary white paper now and find out more!
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos
    
FORA.tv
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter