opt

Results 1 - 25 of 3767Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 05, 2017
Today’s mobile users are spoiled. They demand rich, desktop quality experiences tailored to their devices and delivered at lightning fast speeds. And while these “always on” users represent a tremendous business opportunity, satisfying their high expectations requires overcoming complex mobile delivery challenges. In this e-book, we review three key mobile delivery challenges and explain how you can overcome them by optimizing for fast APIs, mobile apps, and mobile sites to increase engagement, revenue, and customer loyalty. Download today to learn how your business can Meet Today’s Mobile Mandate.
Tags : 
mobile adoption, customer loyalty, customer engagement, increase revenue
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 10, 2017
IT departments in organizations of all types are looking to increase the agility, scalability, and cost-effectiveness of their data centers and storage initiatives. While the cloud, hybrid cloud, and private cloud options tend to be the first options that come to mind for many of these IT professionals, many are finding that hyperconverged infrastructures provide many of the same benefits. In this Enterprise Strategy Group white paper, uncover the many benefits of hyperconverged infrastructures and information on Dell EMC and Intel®'s Hyperconverged VxRack System 1000.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 10, 2017
In this brochure, discover how you can accelerate your adoption of converged infrastructure (CI) and cloud-based computing models with Dell EMC. CI enables you to reduce IT costs, improve time to market and focus more on business innovation.
Tags : 
    
Dell EMC
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Stories and statistics behind successful analytics projects The adoption of analytics across the enterprise is accelerating, and with good reason. Analytics can offer a competitive advantage by helping to identify growth opportunities, circumnavigate risk and improve customer relationships. These insights are becoming crucial parts of the business strategy for executives representing a wide array of industries. Check out our latest eBook to see how some of the world’s leading companies are using analytics to meet their needs. You’ll receive diverse examples of how organizations applied the latest statistical methodologies, such as: scorecard build, regression, decision trees, machine learning and material change to uncover meaning in data. The examples represent global brands across critical industries – Financial Services, Insurance, High-Tech, Aerospace, Manufacturing and others – where analytics helped answer their most challenging questions.
Tags : 
    
Dun & Bradstreet
Published By: Oracle     Published Date: Mar 06, 2017
This whitepaper explores how Oracle Database Exadata Express Cloud Service is the ideal entry-level service for running Oracle Database in Oracle Cloud. It delivers an affordable and fully managed Oracle Database 12c Release 2 experience, with enterprise options, running on Oracle Exadata.
Tags : 
    
Oracle
Published By: Adobe     Published Date: Feb 01, 2017
information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
In der Zeit vor Mobilgeräten, Suchmaschinenoptimierung und Facebook konnten anonyme Verbraucher kostengünstig durch Print-Medien, TV und Radio sowie Außenwerbung erreicht werden. Allerdings war es aufgrund der ungenauen Zielgruppensegmentierung schwierig, den Erfolg von Werbeaktionen zu ermitteln. Die Identifizierung potenzieller Kunden per Direkt-Mail oder Telefon war zwar messbar, aber gleichzeitig kostenintensiver und nur mit viel Aufwand skalierbar.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
The close is the most critical step of every sale, but long, drawn-out processes can cause deals to fall through. Top-performing sales teams use e-signatures to close deals quick and speed time to revenue.
Tags : 
    
Adobe
Published By: HPE APAC     Published Date: Feb 24, 2017
In this white paper, we will examine the storage challenges faced by businesses. We consider the case for the allflash data center, discuss the importance of a flash-optimized data protection strategy, and provide tips for gaining support from business leaders for your vision.
Tags : 
flash storage, storage, sata protection, data protection strategy, data center, allflash, best practices
    
HPE APAC
Published By: Oracle (Hospitality)     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : 
hotel, loyalty program, perks, redeem, oracle
    
Oracle (Hospitality)
Published By: RedHat     Published Date: May 10, 2017
Transform to a digital business through infrastructure optimization.
Tags : 
improve service, reduce costs, it modernization, trends, red hat, infrastructure
    
RedHat
Published By: RedHat     Published Date: May 16, 2017
The study reveals that among CIOs and senior IT decision makers, open source is not just a cost-saving option; it is also a strategic investment that can lead to digital innovation. It indicates open source usage is moving from community freeware to enterprise-grade solutions. Asia Pacific IT leaders view open source as improving the evolution of technologies that are key to digital transformation, including cloud, DevOps, mobility, and big data.
Tags : 
open source, digital innovation, digital transformation, devops, mobility, cloud, big data
    
RedHat
Published By: Akamai     Published Date: Mar 08, 2017
Engage online audiences with attractive images that are automatically optimized for both maximum visual quality and performance while reducing the cost and effort to transform and deliver web-ready images.
Tags : 
online, quality, performance, cost, reducing cost, images, content, quality
    
Akamai
Published By: Akamai     Published Date: Mar 08, 2017
Akamai’s Predictive Content Delivery (PCD) technology was developed to help satisfy the growing demand of mobile video. It is designed to optimize the delivery of data-heavy video traffic terminating on mobile devices and provide mobile customers with a video service that exceeds their expectations in the form of high-quality, always-available video with instant startup. Read on to find out more.
Tags : 
content, predictive content delivery, pcd, video, traffic, mobile video
    
Akamai
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care. • How built-in data encryption keeps your PHI, DICOM studies safe • Why more security pros are concerned with user behavior than cloud tools • What your organization should know about the cloud and compliance
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data, virtualization, infrastructure, infrastructure management
    
Intel
Published By: Dell EMC     Published Date: Apr 18, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
hci, hyperconverged infrastructure, storage, hybrid
    
Dell EMC
Published By: Oracle     Published Date: Jan 09, 2017
Holen Sie sich einen Überblick über OPERA Cloud, wie es Ihnen dabei helfen kann wichtige Geschäftsprozesse zu optimieren und entdecken Sie weitere Vorteile in der OPERA Cloud Broschüre.
Tags : 
oracle solutions, cloud, cloud computing, opera cloud, hotel, hotel management, hotel operations, virtualization
    
Oracle
Published By: Oracle     Published Date: Mar 29, 2017
We staan aan de vooravond van een technologische revolutie waarbij innovaties zoals Artificial Intelligence en Virtual Reality de customer experience zullen hervormen. Merken raken beter ingespeeld op digitale klanten die steeds meer de voorkeur geven aan self-service boven menselijke interactie. Aan de andere kant blijkt ook dat vele merken nog steeds worstelen met een van de meest fundamentele basisvereisten digitale CX: een optimale data-strategie.
Tags : 
    
Oracle
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.