• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

his

Results 226 - 250 of 19143Sort Results By: Published Date | Title | Company Name
By: HPE APAC     Published Date: Jun 20, 2017
HPE Flexible Capacity service enables a cloud-like consumption model and economics for your on-premise IT. Now you don’t have to a make difficult choice between security and control of on-premise IT versus the agility and economics of public cloud. Watch this video to find out more.
Tags : 
cloud, agility, data center, security, public cloud
    
HPE APAC
By: HPE APAC     Published Date: Jun 20, 2017
This white paper shows IT architects, administrators, and DevOps developers how to deploy Docker hosts and execute containerized applications on bare-metal infrastructure.
Tags : 
infrastructure, bare--metal infrastructure, it transformation, business opportunities, operations
    
HPE APAC
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
By: IFS     Published Date: Jan 07, 2019
This eBook analyses the impact of technology on the service industry, outlining ways in which field service software can better deliver on customer expectations. Download it to discover: - Research into the impact of digital transformation in the service industry - What technology will disrupt field service and how to respond - How to assess what the next best steps are for your business
Tags : 
    
IFS
By: IFS     Published Date: Jan 18, 2019
To ensure loyalty and win new customers, leading brands are focusing on the quality of their customer care to stay ahead. This eBook will explain how you can: -Upgrade your support centers to deliver omni-channel customer care. -Introduce self-service and AI without sacrificing the human touch. -Deploy technology to empower support agents to go beyond transactional service and deliver personalized, proactive service. This eBook looks at the barriers which prevent companies delivering omni-channel service and then examines the process and technology changes required to overcome them.
Tags : 
    
IFS
By: Red Hat     Published Date: Sep 09, 2018
As enterprises work to balance IT innovation with efficiency—and increasingly adopt cloud-first strategies—agility is key. In this IDC InfoBrief, sponsored by Red Hat, learn 4 key capabilities supporting cloud adoption and agile integration approaches that offer faster, more flexible workflows.
Tags : 
    
Red Hat
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
    
Red Hat
By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
By: Cisco     Published Date: May 24, 2019
Uncover the MR45 performance, product highlights and features within this data sheet. Whether you’re looking to deliver high density, high throughput, or high efficiency wireless, the new Wi-Fi 6 compatible MR45 can do it all. Deliver a rich, seamless experience to users of the next generation of wireless networks.
Tags : 
    
Cisco
By: Cisco     Published Date: May 24, 2019
Today’s organizations are becoming more innovative and dynamic by adopting mobility, IoT, analytics and cloud technologies. With this, come growing demands for network scale, agility and threat protection which call for an intent-based network. The Cisco® Digital Network Architecture (Cisco DNA) gives you comprehensive intent-based networking across your campus, branch and WAN with robust wired, wireless, and routing solutions.
Tags : 
    
Cisco
By: Lenovo UK     Published Date: May 13, 2019
It’s time to think bigger than incremental processing power and storage capacity upgrades. In 2019 IT modernisation offers much more, providing opportunities to closely align infrastructure with your most ambitious goals and build a future-facing foundation for success. Whatever your goals, this playbook gives you six versatile strategies that can help you plan a successful IT modernisation project, supported by examples from our industry-leading data centre portfolio.
Tags : 
    
Lenovo UK
By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention
    
Cisco
By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services, access control, application security, internet security, intrusion prevention, security management
    
Cisco
By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco
By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
    
SAP
By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
    
Cisco
By: Entrust Datacard     Published Date: Oct 17, 2016
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality reshaping the enterprise. This white paper is the third in a three-part series on enabling the mobile enterprise while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter