eda

Results 76 - 100 of 150Sort Results By: Published Date | Title | Company Name
Published By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
Published By: Oracle     Published Date: Apr 03, 2012
Read this white paper for an explanation of how business process management melds with complex event processing. The combination nets intelligent business processes that react to changing business conditions in real time.
Tags : 
bpm, business process management, cep, complex event processing, oracle, business activity monitoring, bam, sla
    
Oracle
Published By: Adobe     Published Date: Sep 20, 2016
Our report outlines five ways data-driven marketing can transform your business into a machine that can leave your competition in the dust.
Tags : 
adobe, data driven marketing, marketing
    
Adobe
Published By: Xangati     Published Date: Feb 04, 2016
MBSI was providing approximately 800 virtual desktops to their employees using VMware Horizon with View and 8 VMware ESXi hosts and they were running an additional 140 virtual servers using 5 VMware ESXi hosts – all on a Tegile Hybrid SAN. “It was shortly after we converted from ICD-9 diagnosis codes to ICD-10 codes that performance for the VDI desktops began to suffer noticeably,” explained Shawn Wood, Assistant Manager of Systems Administration, MBSI. “We have relied on Xangati for a number of years now to help us quickly see where bottlenecks are in a short period of time. It's an important part of maintaining the integrity of our infrastructure.” Read more to learn how Xangati helped MBSI address this problem.
Tags : 
xangati, medamerica, mbsi, case study
    
Xangati
Published By: BlueData     Published Date: Aug 19, 2015
Many organizations seeking to get started with Hadoop implementation have resorted to the public cloud to avoid the complexities of deployment. Organizations are always looking for an opportunity to take advantage of the simplicity of cloud deployment and the efficiencies of multi-tenant operations on premise. Download this white paper to see why there is a greater need to simplify on-premise deployment and see how this will greatly improve manageability and security.
Tags : 
big data, hadoop, hadoop-as-a-service, multi-tenant, and infrastructure
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
Big Data is on virtually every enterprise’s to-do list these days. Recognizing both its potential and competitive advantage, companies are aligning a vast array of resources to access and analyze this strategic asset. However, despite best intentions, the majority of these Big Data initiatives are either extremely slow in their implementation or are not yielding the results and benefits that enterprises expect. Download this white paper to learn how to solve the Big Data intention-deployment gap and see how you can make your infrastructure in a flexible, easy-to-use platform that will provide in-depth analytics.
Tags : 
big data, big data intention-deployment, in-depth analytics, hadoop
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
As companies seek to better understand their customers, their opportunities, and themselves, they are embracing new technologies such as Hadoop and NoSQL to better manage and manipulate their data. Yet a complete solution for big data has many moving parts while at the same time these moving parts are continuously evolving. Download this white paper to figure out how to make all the moving parts work smoothly together and see how this will ease frustration with business users and free up your IT teams time to handle other issues.
Tags : 
big data infrastructure, hadoop deployment, spark, analytics software, big data
    
BlueData
Published By: BlueData     Published Date: Aug 19, 2015
Over the past few years, “Big Data” has evolved from an interesting technology topic into a source of major competitive advantage, in which IDG conducted a survey and found out that 60% of enterprises are planning on spending an average of $8 million on Big Data initiatives. However, somewhere between intention/investment and executive/production, Big Data initiatives are falling into a gap. Download this white paper to find out how to change the equation on Big Data spending and learn what the successful companies are doing in order to achieve a success from your Big Data applications.
Tags : 
bigdata, hadoop, big data spending, big data projects, it commitments
    
BlueData
Published By: CA Technologies EMEA     Published Date: May 24, 2018
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.APIs sind nicht unbedingt eine neue Technologie, aber in der heutigen digitalen Welt ist ihre Bedeutung gewachsen, und sie sind für jeden Aspekt des Unternehmens wichtig geworden. Dies wiederum hat den Bedarf an einem effektiven API Management erhöht. Aber wie sieht eine effektive Lösung aus?Im API Management Playbook wird erläutert:• Warum die digitale Transformation in der Application Economy unerlässlich ist• Warum APIs die Bausteine der digitalen Transformation sind• Auf welche wichtigen Interessenvertreter in Ihrem Unternehmen APIs Auswirkungen haben• Was der API-Le
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Importancia de la velocidad y la agilidad. Los negocios se están viendo afectados cada día por las empresas digitales emergentes que encuentran formas de satisfacer las nuevas necesidades del mercado antes de que puedan reaccionar las compañías más consolidadas.
Tags : 
    
CA Technologies EMEA
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : 
credant technologies, bitlocker encryption, best practices, reporting
    
CREDANT Technologies
Published By: Polycom     Published Date: Mar 06, 2017
Education today is described as between paradigms from the traditional to the digital. Students expect a highly engaging interactive learning environment, not stagnant instructor-led designs. Learning technologies, and changing pedagogical methods, are not only changing the way we teach but also the physical environments we teach in. Download now to learn more.
Tags : 
polycom, education, education technology, students, public sector, global connectivity, education sector
    
Polycom
Published By: Oracle     Published Date: Apr 16, 2018
La gestión de bases de datos resulta costosa y complicada. A medida que aumenta la cantidad de aplicaciones y de bases de datos, se pueden multiplicar los costos y las complicaciones. Una solución sería un sistema hardware y software diseñado específicamente para que el software de la base de datos optimice las operaciones, tanto para simplificar el rendimiento como el aspecto administrativo. Exadata de Oracle es la única plataforma que ofrece un rendimiento óptimo de la base de datos y eficacia para la combinación de datos, análisis y cargas de trabajo para el procesamiento de transacciones en línea (OLTP). Con una amplia variedad de opciones de implementación, puede ejecutar sus bases de datos y cargas de trabajo de datos de Oracle en el lugar que quiera y de la manera que quiera, en la Nube de Oracle, en Cloud at Customer, en su data center o cualquier combinación de estos modelos.
Tags : 
ejecutar, base, datos, oracle, exadata
    
Oracle
Published By: Symantec     Published Date: Jun 13, 2018
El actual escenario es una desenfrenada carrera. Los funcionarios y las organizaciones adoptan a ritmo acelerado aplicaciones y servicios en la nube debido a la productividad, colaboración y conveniencia que ofrecen. ¿Y por qué actuarían de forma diferente? Si tiene un problema, es posible que exista una aplicación en la nube que pueda solucionarlo. Así mismo, el movimiento a nivel corporativo que se distancia de licencias tradicionales de software hacia plataformas en la nube como Office 365, G Suite, Salesforce, etc., ofrece el beneficio adicional de un modelo financiero de Opex en lugar de Capex para sus costos de software.
Tags : 
    
Symantec
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy
    
SafeData, LLC
Published By: eDataSource     Published Date: Nov 08, 2016
Why marketers must invest in Competitive Intelligence Applications, and implement a systemic process to harness the value of such insight.
Tags : 
competitive intelligence, competitive intelligence operations, swot analysis, email, email marketing, marketers, cia
    
eDataSource
Published By: eDataSource     Published Date: Mar 20, 2017
Today, email deliverability is a challenging goal and a moving target all at the same time. Traditional metrics such as email volume and open rates are going up, but inbox placement is in decline. And no matter how fantastic your email is, it won’t generate a response if it isn’t delivered. So, what can today’s marketers do to make sure their messages hit the inbox?
Tags : 
edatasource, email marketing, performance insight, email delivery rates
    
eDataSource
Published By: eDataSource     Published Date: May 08, 2017
Learn how other email marketers are dealing with growing SPAM rates and driving positive ROIs for their marketing efforts.
Tags : 
edatasource, email marketing, performance insight, email delivery rates
    
eDataSource
Published By: Xangati     Published Date: Sep 14, 2015
Efficiency is not about maxing out utilization, nor is it about achieving the highest possible MIPS, IOPS or any other standard metric. Technically, efficiency is about the ratio of useful work performed to the energy expended in doing that work. You want the greatest amount of output from your IT infrastructure for the lowest possible cost. It’s a bit like long-distance driving and working to achieve the highest possible miles per gallon through constant observation of time, speed and gas consumption in the face of varying traffic and weather conditions. Flooring the gas pedal is not always the best option. What can you do to optimize your converged infrastructure efficiency? While there are no 10-second, quick-fix answers, here are five strategies you can start implementing right now to bring your organization much closer to optimal efficiency and long-term cost savings.
Tags : 
infrastructure efficiency, optimal efficiency, long-term cost savings, utilization
    
Xangati
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Everything you need to know about Infrastructure for Desktop Virtualization—in one eBook. Dive into this extensive eBook to get all the details you need to consider when launching down the path of virtualization. In this eBook, from Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and editor Sachin Chheda, director of solutions and verticals marketing at Nutanix, we provide detailed analysis and key points to consider, including: • Architectural Principles • Building Blocks • Infrastructure Alternatives • Storage Requirements • Compute Sizing Get the eBook
Tags : 
infrastructure, capacity, monitoring, storage requirements, compute sizing, scalability
    
Lenovo and Intel®
Published By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
    
IBM
Published By: IBM     Published Date: May 04, 2009
Even with increased start-up costs, higher-end processors can offer a lower TCO thanks to better performance. This white paper shows detailed comparisons between higher- and lower-end servers with surprising results—including a 42% lower TCO and 87% faster performance for the higher-end processor.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
    
IBM
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation
Start   Previous    1 2 3 4 5 6    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.