block

Results 226 - 250 of 428Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Sep 20, 2016
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
adobe, mobile, data driven marketing, marketing, marketer
    
Adobe
Published By: Ayla Networks     Published Date: Aug 11, 2015
Innovative approaches for the Internet of Things on core building-block technologies in communications, IoT platforms and security. Gartner profiled five Cool Vendors that can help CIOs, IT leaders and decision makers to build IoT solutions.
Tags : 
    
Ayla Networks
Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data—anytime, anywhere. APIs are not necessarily a new technology, but in today’s digital world, they have risen in prominence and become important to every facet of the enterprise. This in turn has increased the demand for effective API management. But what does an effective solution look like? The API Management Playbook will help you understand: • Why digital transformation is crucial in the application economy • How APIs are the building blocks of digital transformation • Which key stakeholders in your organization are impacted by APIs • What the API lifecycle is and how it relates to API management
Tags : 
    
CA Technologies EMEA
Published By: Google Cloud     Published Date: Aug 17, 2017
Cloud Spectator, an independent benchmarking and consulting agency, has released a new comparative benchmarking study that ranks Google Cloud #1 for price-performance and block storage performance against AWS, Microsoft Azure and IBM SoftLayer.
Tags : 
    
Google Cloud
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Tricentis     Published Date: Nov 15, 2018
Countless QA teams continue using subpar testing tools because they can’t stand the thought of migrating thousands of test artifacts or training testers on an entirely new platform. Many would prefer the status quo of using their current toolset because they believe that a migration will be painful, or that it will slow them down. But there’s a problem with that logic: The longer they wait, the more obsolete their current toolset becomes, and the further removed QA becomes from the rest of the software development lifecycle — which often means that testing lags behind, remaining a roadblock on the agile transformation journey. This white paper will cover: o The true cost of using inadequate legacy tools, and why migrating now is better than waiting o Six steps to make migration as painless as possible for your QA and development teams o How the entire SDLC benefits from a flexible toolset that integrates quality into agile processes
Tags : 
    
Tricentis
Published By: Sprinklr     Published Date: Apr 02, 2018
Jon Lombardo, Creative Lead, LinkedIn, reveals in this presentation how B2B businesses can improve their content strategy in 2017. In particular, he points out why the “Newspaper Model” is difficult to scale and harder to monetize while a B2B “Blockbuster” approach can monetize a brand’s expertise.
Tags : 
b2b marketing, b2b marketing strategy, marketing strategy, marketing trends, brand recognition, omni-channel, employee advocacy, people first
    
Sprinklr
Published By: Return Path     Published Date: Jan 29, 2013
Internet Service Providers make filtering decisions about what email to block or mark as SPAM based on three main factors. Find out what they are in “Email Sender Reputation Report: Key Factors that Impact Email Effectiveness."
Tags : 
email filtering factors, sender reputation, email blocking
    
Return Path
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip, storage, blade servers, voice over ip, microsoft exchange, windows server
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities, security, enterprise applications, internet security
    
F5 Networks Inc
Published By: Infosys Limited     Published Date: Aug 02, 2019
Cloud along with other technologies such as Big Data, Internet of Things, Artificial Intelligence and Blockchain have made it possible for enterprise to have bolder visions for the future. The new technologies motivate them to accelerate their digital transformation journey and deliver more rewarding experiences to clients.
Tags : 
    
Infosys Limited
Published By: CDW     Published Date: Nov 12, 2012
By migrating to VCE Vblock, ATS Cloud can scale up enterprise IT services to small and medium-sized businesses in real time.
Tags : 
case study, converged infrastructure, data centers, cloud computing, data center
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
    
McAfee
Published By: Cisco     Published Date: Dec 21, 2016
The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools. The report also includes research from external experts, such as Level 3 Threat Research Labs, to help shed more light on current threat trends. We take a close look at data compiled by Cisco researchers to show changes over time, provide insights on what this data means, and explain how security professionals should respond to threats.
Tags : 
    
Cisco
Published By: Dell EMC     Published Date: Mar 18, 2016
EMC has recently enhanced its VNX block-based deduplication technology enabling flexible data reduction across a wide variety of use cases from virtual desktops to virtual servers and databases. While block-based deduplication is not new for VNX, this latest enhancement, according to EMC, offers up to a 3x better performance at half the response time.
Tags : 
emc, vnx, hybrid flash, deduplication, block-based, data reduction
    
Dell EMC
Published By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : 
compliance, ofac, sanction, finance
    
Factiva
Published By: Oracle     Published Date: Apr 16, 2018
A nuvem se tornou o catalisador para uma série de tecnologias novas e disruptivas para seus negócios, desde chatbots e inteligência artificial (IA) até aprendizado de máquina aplicado e blockchain. Como um provedor de nuvem completo que atende clientes que são essencialmente líderes do setor, a Oracle tem profundo conhecimento das oportunidades tecnológicas do future— e a probabilidade da sua adoção. Somos inspirados por nossos clientes líderes do setor e as tendências que os afetam. É nesses pioneiros na adoção da tecnologia que nos concentramos para fazer nossas previsões para a nuvem em 2018. O que você poderia alcançar se agisse agora?
Tags : 
quais, tendencias, setor, tecnologico, proximos
    
Oracle
Published By: Oracle     Published Date: Apr 16, 2018
La nube se ha convertido en el catalizador de una serie de nuevas tecnologías disruptivas en el sector comercial, desde chatbots e inteligencia artificial (IA) hasta aprendizaje automático aplicado y blockchain. Oracle como proveedor integral de la nube y con clientes que son líderes de cada una de sus industrias, tiene una visión creíble de las oportunidades que ofrece la tecnología para el fututo, y sus posibilidades de implementación. Nos inspiramos en nuestros clientes líderes en la industria y en las tendencias que los afectan. Con la experiencia de los usuarios pioneros de Nube, analizamos las tendencias para 2018. ¿Qué podrías alcanzar ahora?
Tags : 
cuales, tendencias, tecnologico, proximos
    
Oracle
Published By: Fitbit     Published Date: Jan 28, 2019
Vaccines. Antibiotics. Organ transplants. All medical breakthroughs which changed the face of health in the developed world. But while certain causes of death have been greatly reduced, chronic disease has emerged as the next big threat, and behavior change as the next blockbuster opportunity.
Tags : 
    
Fitbit
Published By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.