• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

like it

Results 151 - 175 of 1538Sort Results By: Published Date | Title | Company Name
By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
By: Sage People     Published Date: Jan 31, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses face challenges around growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for that all-important slice of budget and that makes building the strongest business case for technology investment vital. This guide is designed to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and likely return on investment • Positioning HR as a leader of change throughout your business • Ensuring your HR vision fits in with the business strategy • Getting management and key stakeholder buy-in • Building the strongest business case and the most powerful el
Tags : 
    
Sage People
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
    
Venafi
By: Adobe     Published Date: Jul 31, 2013
This paper compares some of the issues to consider when evaluating app production platform like Digital Publishing Suite, versus custom app development.
Tags : 
digital publishing, mobile strategies, app development, dps apps
    
Adobe
By: HP     Published Date: Aug 25, 2014
" One thing is clear: the old way of running IT just won’t work in the new business environment.Truth is, preparing your IT department (and your company) to be agile, cost-efficient, metrics-driven, and flexible will require a change in how you operate. To support new business processes, you would do well to turn to a converged system, like HP ConvergedSystem for Virtualization. In this paper, we look at the greatest challenges faced by IT departments, and how traditional configurations, processes, and organizations are poorly-equipped to handle today’s workplace. We discuss the benefits of converged systems that are engineered to handle virtualized workloads. Finally, we look at HP ConvergedSystem for Virtualization as a simple and effective way for businesses to optimize their data center infrastructure and processes to better meet business needs."
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, converged, metrics-driven, cost-efficient
    
HP
By: ServiceNow     Published Date: Oct 02, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use as the Web apps they use at home. Integration remains difficult, because it’s sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
    
ServiceNow
By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
By: Pega     Published Date: Apr 04, 2016
Technology is empowering today’s consumers like never before. Consumers are getting used to buying, communicating and interacting with service providers whenever and however they want. Downtime is unacceptable and as a result broadband and telco providers are constantly put to the test with regards to customer service. There is an enormous disconnect between what customers expect and what broadband and telco providers are actually providing. All customers want to be understood as individuals, but this need is not always being met. Moving forward, broadband and telco providers need to differentiate themselves and provide innovative solutions in order retain as well as gain new customers. It is no surprise that nearly half of broadband/Telco providers believe customer service is a critical competitive differentiator. Download this research study and learn how broadband and telco providers can improve customer service.
Tags : 
    
Pega
By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies
By: Atlantic Broadband Business     Published Date: Apr 30, 2018
Innovative technology continues to transform how business is done for small and large businesses alike. With technology and communication trends moving faster than ever before, it’s important to take advantage of these trends to keep the way we communicate with our employees, clients and coworkers current and seamless. Having an efficient communication system not only enables employees to be productive, but it ultimately leads to improving businesses’ bottom lines.
Tags : 
business, voice, solutions, organization, employees
    
Atlantic Broadband Business
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : 
akamai, ddos, web application attacks, ntp, akamai intelligent platform, security, enterprise applications
    
Akamai Technologies
By: Salesforce Commerce Cloud     Published Date: Jul 12, 2016
96% of millennials say they still like to visit actual shops. They are also influenced more by online videos than TV advertising, and still rely on “official” reviews found in newspapers, magazines and online publications. If you want to be successful in this rapidly changing market, you need to attract millennials. Download this free research paper to find out how to attract millennials and adapt your methods to include them.
Tags : 
demandware, social, millennials, impressions, social media, social influence
    
Salesforce Commerce Cloud
By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH
By: ServiceNow     Published Date: Jul 12, 2013
"Learn how savvy enterprises, like Tickets.com, Verisign and Omnicare, use ServiceNow as a platform to enable business users to rapidly create applications with IT’s full guidance and support. During this webinar, you will discover how ServiceNow is enabling organizations to increase their competitive agility, user satisfaction and productivity, all while enhancing IT's value to the business."
Tags : 
servicenow, automation platform, service automation platform, webinar, it management, platforms, data management, .net
    
ServiceNow
By: Dell     Published Date: Nov 09, 2017
How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle Services and Endpoint Security to make both groups happy while still cutting costs. In this webcast you'll hear... - What workforce trends have impacted employee expectations of technology - How IT can balance costs and security with employee happiness - How to apply this approach to the 4 phases of the PC Lifecycle - What solutions can help you save up to 25% of PC Lifecycle costs Watch on-demand now.
Tags : 
    
Dell
By: Dell     Published Date: Nov 12, 2018
IT professionals need tools that make the never-ending log of tasks they face daily, more manageable. While tools like Intel® Active Management Technology (AMT), which is part of the set of Intel vPro™ technologies, can improve management capabilities, learning the software can take time. Download this report today to learn how Dell Client Command Suite can lessen the administrative burden and help your admins maximize their daily productivity.
Tags : 
    
Dell
By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report from Dell and Intel® for more information Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: Feb 14, 2019
Like businesses of all sizes, midmarket firms have an ongoing need to stimulate innovation and improve quality. Midmarket firms need to balance these requirements against a backdrop of limited scale, rapid market change and constraints on resources that can be dedicated to shaping the future, rather than reacting to the demands of the present. This Proaction Series report, commissioned by Dell, will address technologies best able to empower scarce resources as they help set new benchmarks for business performance. Download this report from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: May 09, 2019
In such a competitive business market, retaining the best talent is crucial. Knowing what makes them want to walk out the door is the first step in keeping them. The good news is that business leaders recognize the peril they face - and the need to do something about it. In a recent survey, 45% said they fear becoming obsolete in three to five years; 73% agree on the business need to prioritize technology, and 66% are planning to invest in IT infrastructure and digital skills leadership. However, investment without strategy is unlikely to succeed. Because innovation comes from people, investment must foster human creativity. Investment in technology that enables workers to address new challenges in new ways will give rise to new business initiatives, happier customers, and superior corporate financial performance. Download this whitepaper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks, service management
    
Blue Coat Systems
By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure, best practices, business intelligence
    
BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter