block

Results 251 - 275 of 427Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : 
money, transfer, digital, technology, business
    
Infosys
Published By: Infosys     Published Date: Feb 11, 2019
Good coffee is more than just a drink - it's an art. And coffee connoisseurs (distributors, retailers, and consumers) want to be sure of the authenticity of the art they buy. But given the complex supply chain and the number of stakeholders involved in getting coffee from the farm to the cup, it is almost impossible to ascertain the lineage, health, and origin of your coffee.
Tags : 
    
Infosys
Published By: Infosys     Published Date: Jun 14, 2019
Introduction Cloud along with other technologies such as Big Data, Internet of Things, Artificial Intelligence and Blockchain have made it possible for enterprises to have bolder visions for the future. The new technologies motivate them to accelerate tier digital transformation journey and deliver more rewarding experiences to clients.
Tags : 
    
Infosys
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: McAfee EMEA     Published Date: Nov 15, 2017
In response to an increasingly complex IT ecosystem and expanding attack surface, Intel Security offers a unified threat defense lifecycle. Intel Security delivers an integrated, connected architecture that dramatically increases speed and capacity of organizations to prevent and respond to attacks. Our architecture reduces complexity and improves operational efficiency, providing critical integrated, adaptive, and orchestrated intelligence and response capabilities. This empowers customers to block threats more effectively, identify compromises, and implement quick remediation and stronger countermeasures.
Tags : 
security information, event management, orchestration, surface, intel security
    
McAfee EMEA
Published By: MuleSoft     Published Date: Jan 16, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jul 13, 2018
"Businesses are currently experiencing a generational shift in competitive and operational environments due to a convergence of technological, social, and economic forces. A single characteristic is emerging as the key factor that determines a company’s success: speed. API-led connectivity is the integration approach that will provide the speed organizations are looking for. It provides an approach for connecting and exposing assets. With this approach, companies can deliver today’s projects faster than ever before while also building an infrastructure to increase productivity on future projects and an enterprise ready for change. In this paper, you'll learn: -How to adopt an API-led connectivity approach that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks, exposed by APIs. -How to structure these building blocks across distinct systems, process and experience layers, to achieve both greater organizational agility and
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 15, 2019
In response to the federal government’s Cloud First initiative, agencies are moving to the cloud at an accelerated rate - moving on-premise applications, data and workloads to cloud infrastructure and adopting SaaS technologies like Salesforce, ServiceNow and Workday. What many in government have found is that integration and looking for government integration solutions has emerged as a stumbling block that has prevented government from realizing many of the benefits of moving to the cloud. This is because while a growing number of applications adopted by government are in the cloud, the underlying integration technologies connecting these applications are still based on-premise, meaning that government IT teams still have to spend time provisioning and maintaining infrastructure to ensure that their middleware doesn’t become a performance bottleneck for their applications. Join us for a conversation with MuleSoft CISO Kevin Paige on why cloud integration is key for agencies to succe
Tags : 
    
MuleSoft
Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware’s VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization, security
    
EMC Converged Platforms
Published By: Oracle ODA     Published Date: Oct 19, 2016
This research note is designed to support the near and mid-term infrastructure plans for Oracle infrastructure practitioners and DBAs, and better understand the fit of products like ODA relative to other appliances in Oracle's portfolio.
Tags : 
    
Oracle ODA
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security, compliance, security management, infrastructure
    
Oracle Corp.
Published By: Business.com     Published Date: Oct 09, 2012
A business needs a solid business infrastructure in order to succeed in today's marketplace. And one of the most basic building blocks of a company's infrastructure is its business phone system.
Tags : 
phone systems, efficiency, telecommunications, telecom, technology
    
Business.com
Published By: EMC Corporation     Published Date: Dec 01, 2014
EMC VSPEX Proven Infrastructures have dramatically changed the way you can deploy and manage IT by combining VSPEX with ScaleIO which creates scalable and high performance virtualization solutions for your growing business needs. VSPEX with ScaleIO provides an agile building block approach thatt delivers scalability, ease of management, elasticity, and performance.
Tags : 
infrastructure, scalable and high performance, virutalization solutions, business needs, elasticity, data center
    
EMC Corporation
Published By: Riverbed     Published Date: Oct 09, 2012
In this report, Taneja Group explores how Riverbed Technology has identified a critical challenge that limits IT performance in highly distributed customer environments: costly, complex, and hardware-heavy branch offices. The report profiles the new Steelhead EX + Granite appliance, combining a true "branch-office box" virtualized hardware platform with a first-of-its-kind block storage technology. Download now.
Tags : 
it infrastructure, data, virtualization, optimization, servers, it management, data management
    
Riverbed
Published By: Riverbed     Published Date: Oct 09, 2012
This informative ESG Lab report examines the Riverbed® Steelhead EX + GraniteT appliance, which delivers a powerful combination of wide area network (WAN) optimization, a virtual services platform, and innovative block-storage optimization to help organizations consolidate servers and storage and deliver IT services globally, while ensuring the performance required in remote and branch offices. Download this informative report now to find out how edge-VSI can improve your IT infrastructure.
Tags : 
it infrastructure, data, virtualization, optimization, servers, wan optimization, it management, data management
    
Riverbed
Published By: EPiServer Inc.     Published Date: Sep 16, 2013
Traditional multi-channel thinking simply does not deliver the results most businesses and, more importantly, their customers demand. Today, it's critical to go beyond thinking in terms of "multi-channel" and start focusing on unifying content across screens—only forking content to real channels such as social media and mobile apps. It's vital to really understand the user's context and to intelligently re-use and re-format content blocks to deliver the right experience at the right time on the right screen or channel. Download this eBook for 6 ways to rethink content when structuring and managing online properties.
Tags : 
multi-channel marketing, multi-screens, content delivery, cross-channel experience
    
EPiServer Inc.
Published By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
    
sevone
Published By: Tribridge     Published Date: Feb 09, 2015
Delivering great content is often the biggest stumbling block to effective learning in many organizations. A sensible content strategy can help any organization jump-start, rebuild, or enhance its learning initiatives.
Tags : 
content development, training content, e-learning content development, content creation services, content conversion, enterprise content management, custom content, learning content
    
Tribridge
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Everything you need to know about Infrastructure for Desktop Virtualization—in one eBook. Dive into this extensive eBook to get all the details you need to consider when launching down the path of virtualization. In this eBook, from Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and editor Sachin Chheda, director of solutions and verticals marketing at Nutanix, we provide detailed analysis and key points to consider, including: • Architectural Principles • Building Blocks • Infrastructure Alternatives • Storage Requirements • Compute Sizing Get the eBook
Tags : 
infrastructure, capacity, monitoring, storage requirements, compute sizing, scalability
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Accelerates Time-to-Value, Reduce IT Complexity, and Improve Efficiency. The Lenovo Converged HX Series Nutanix appliance, powered by Intel® Xeon® processors, consolidates compute, storage, and virtualization resources in one simple data center building block.
Tags : 
hyperconverged systems, it hardware, virtual machine, hardware, data, data management
    
Lenovo and Intel®
Published By: SmoothWall     Published Date: Jun 03, 2009
Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.
Tags : 
smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering
    
SmoothWall
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security, application security
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Jul 10, 2009
A complex IT infrastructure is a stumbling block for many businesses seeking greater agility in these uncertain times. This white paper shows how a service oriented architecture (SOA) helps align the infrastructure with business needs in order to achieve maximum flexibility.
Tags : 
soa, service oriented architecture, ibm smart soa, it infrastructure, integration, websphere, change management, costs
    
IBM
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron
    
Secure Computing
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.