here technologies

Results 201 - 225 of 262Sort Results By: Published Date | Title | Company Name
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Data Fabric is NetApp’s vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp® helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management, it management, enterprise applications, data management
    
CDW - NetApp
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Emarsys     Published Date: Feb 14, 2018
Expectations for dramatically improved customer experiences (CX) are driving retail investments in omnichannel technologies that provide competitive differentiation beyond core products and services. As retailers pursue more advanced capabilities, artificial intelligence (AI) technologies provide innovative opportunities for retail marketers. It is, therefore, mission-critical for retail decision-makers to understand how ready their organizations are to embrace AI technologies with the potential to propel them forward as industry leaders.
Tags : 
marketing, retail, ecommerce, customer experiences
    
Emarsys
Published By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
    
CradlePoint
Published By: Jobvite     Published Date: Aug 25, 2016
This explosion in the amount of information is similar to the boom the marketing world saw in the early 2000’s with the introduction of customer data. Now that recruiters finally have access to the same types of information as marketers, it’s becoming more clear that recruiting is marketing. Whereas the marketing world immediately saw the value in this data and latched onto technologies that could leverage the information, the recruiting world is just catching up. The proliferation of CRMs has revolutionized marketing and business development. Creating and maintaining relationships has always been part of a sound business strategy, but that nebulous process has now been operationalized through software like Salesforce. There is a reason the CRM software market has boomed to over $20 billion...it works. Personalizing the process to maintain constant contact and build relationships has been shown to be extremely effective in converting leads to sales.
Tags : 
    
Jobvite
Published By: Marathon Technologies     Published Date: Sep 18, 2009
There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability, infrastructure, network architecture, network management, server hardware, servers, server virtualization, microsoft exchange, windows server, data protection
    
Marathon Technologies
Published By: Salesforce.com     Published Date: Apr 16, 2013
Smartphones and tablets are game changers for engagement because people carry them everywhere they go. Your customers and partners and employees have perpetual access to the vast resources of the Internet — and hopefully your mobile app as well — in the key moments of their day. In interviews with more than 100 mobile innovators, we have found four places where mobile engagement transforms services and processes: customer engagement, process acceleration, employee productivity, and new business services. Even at this early stage of development, you can see positive impacts of mobile engagement in apps from General Electric, Trane, and Uber Technologies. We close with a simple framework for prioritizing which apps and features people will actually use based how useful and convenient they are.
Tags : 
mobile, engagement, business, smartphones, tablets, mobile computing, mobile workers, smart phones, wifi, wireless application software, wireless infrastructure, wireless phones, productivity
    
Salesforce.com
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
    
Intralinks
Published By: Oracle     Published Date: Nov 27, 2013
Global business has affected no group more than Human Resources (HR). Recruiting, hiring, developing, and retaining global workers is more complicated in a global economy adding another layer complexity, and without doing those things effectively, companies simply can’t grow. Therefore there’s more pressure than ever on HR leaders to develop and execute new workforce and talent strategies. Unfortunately, many HR organizations are simultaneously juggling these demands with a set of legacy technologies that are not up to the task because they don’t address the increasingly complex nature of HR’s role in the business.
Tags : 
human capital, human resources, recruiting, hiring, development, global, technology, business, best practicies, knowledge management
    
Oracle
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media, storage, business intelligence, cloud computing
    
SnowFlake
Published By: IBM     Published Date: Jul 13, 2017
Leaders embracing the ioT are gaining new values, including accelerating innovation, enhancing operations, and improving engagement. Disruptors are utilizing the internet of things and recomposing their businesses by digital transformation. There are many different ways to unlock the potential of the internet of things. The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, innovation, enhancing operations, digital transformation, iot technologies
    
IBM
Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware, data loss prevention, identity protection, business intelligence, data protection, database security
    
HP & Intel
Published By: SAS     Published Date: Mar 06, 2018
There is a lot of excitement in the market about artificial intelligence (AI), machine learning (ML), and natural language processing (NLP). Although many of these technologies have been available for decades, new advancements in compute power along with new algorithmic developments are making these technologies more attractive to early adopter companies. These organizations are embracing advanced analytics technologies for a number of reasons including improving operational efficiencies, better understanding behaviors, and gaining competitive advantage.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry
Published By: Apple Corporation     Published Date: Nov 07, 2014
Join Apple Business Experts for a free on-demand online seminar focused on progressive IT. Learn about a new way to work where IT empowers employees with the very best tools, technologies, and apps to do their jobs. Register now
Tags : 
apple, progressive it, ipad, iphone, new it, networking, it management, knowledge management
    
Apple Corporation
Published By: Apple Corporation     Published Date: Jul 30, 2014
Join Apple Business Experts for a free on-demand online seminar focused on progressive IT. Learn about a new way to work where IT empowers employees with the very best tools, technologies, and apps to do their jobs. Register now.
Tags : 
apple, progressive it, ipad, iphone, new it, it management, knowledge management
    
Apple Corporation
Published By: IBM     Published Date: Mar 12, 2014
Following an analytics strategy set by the company’s C-level executives, MarineMax moved away from spreadsheet-based reporting processes several years ago, and built an enterprise-class business analytics platform based on IBM Cognos and IBM InfoSphere technologies.
Tags : 
ibm, ibm cognos, ibm infosphere, business technology, business analytics, analytics strategy, business analytics platform
    
IBM
Published By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : 
ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM     Published Date: Aug 05, 2014
There is a lot of discussion in the press about Big Data. Big Data is traditionally defined in terms of the three V’s of Volume, Velocity, and Variety. In other words, Big Data is often characterized as high-volume, streaming, and including semi-structured and unstructured formats. Healthcare organizations have produced enormous volumes of unstructured data, such as the notes by physicians and nurses in electronic medical records (EMRs). In addition, healthcare organizations produce streaming data, such as from patient monitoring devices. Now, thanks to emerging technologies such as Hadoop and streams, healthcare organizations are in a position to harness this Big Data to reduce costs and improve patient outcomes. However, this Big Data has profound implications from an Information Governance perspective. In this white paper, we discuss Big Data Governance from the standpoint of three case studies.
Tags : 
ibm, data, big data, information, healthcare, governance, technology, it management, data management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.