evolved

Results 1 - 25 of 218Sort Results By: Published Date | Title | Company Name
Published By: Masergy     Published Date: Nov 04, 2019
Managed SD-WAN services have been around for years, but Ovum is now seeing solutions evolve and go beyond the early adopter phase. With the integration of new features and additional value-added services, enterprises today see simplified SD-WAN solutions. This white paper will share how these solutions have evolved and matured, explore the major benefits from the new SD-WAN solutions, and examine why enterprises should feel more confident about adopting SD-WAN now.
Tags : 
    
Masergy
Published By: HPE & Intel®     Published Date: Oct 10, 2016
Collaboration has evolved significantly over the past five years from sliding your chair over to the next desk to consult with a co-worker to setting up a virtual conference call with your colleagues located in multiple countries across the world.
Tags : 
skype for business, unified communications, internal communication, hpe, intel
    
HPE & Intel®
Published By: Dell EMC     Published Date: Aug 23, 2018
“While 3D design tools have been around for a while, the consumerisation of VR is opening-up visualisation options at an unprecedented rate. Visualisation has evolved to a level that allows designers to produce photorealistic images of products in natural environments faster and with more accuracy, enabling even faster time-to-market and allowing customers to experience the product for themselves – and all without real-world prototyping and modelling costs. This guide is designed to give you an overview of the latest developments in visualisation and introduce our new VR Centres of Excellence in Limerick, Cork, Paris, Frankfurt, Dubai, Santa Clara or Austin, where you can experience the benefits for yourself.” Rahul Tikoo Executive Director and General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Red Hat     Published Date: Aug 22, 2018
Unlike surveys that just look at what respondents say at a specific point in time, the BPTrends survey has been asking questions of process practitioners for over a decade. Thus, we are in a good position to generalize about ongoing trends in process work. Broadly speaking, the interest in business process change has evolved slowly. For some organizations the progress has been dramatic, but for most, their process initiatives are best described by the phrase “two steps forward; one step back.” An amazing number of organizations have focused on process work for several years, made significant progress, then, seemingly forgotten all about their process work, regressed, and then, a few years later, started up again.
Tags : 
    
Red Hat
Published By: Mobify     Published Date: Apr 14, 2015
Over two-thirds of US consumers under 50 say they would be happy if shopping evolved into a mobile-only experience, recent survey research found. Is your brand designing its mobile experience for a near future in which you may be engaging with your customers exclusively via smartphone, tablet or watch? In this guide, we draw on our experience creating mobile shopping experiences for some of the world’s leading brands to help you optimize the design of your mobile presence and improve engagement with your customers. Design matters for mobile. The user experience of your website and app can make the difference between driving revenue and driving customers away.
Tags : 
mobile shopping, mobify, customer experience, customer retention, mobile-only experience
    
Mobify
Published By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
    
Microsoft
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Adobe     Published Date: Mar 26, 2018
If you’re wondering whether you should really prioritize email in your marketing—especially when new channels continually emerge—consider this: 91 percent of marketing executives agree that email is their most effective channel.1 Clearly, email isn’t just here to stay, it’s the mainstay. And with the ability to personalize and contextualize messages, upgrade mobile campaigns, and better understand customer needs, email marketing has evolved into a stronger and smarter version of its former self.
Tags : 
    
Adobe
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 17, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how…
Tags : 
windows 10, best practices, technology, data
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: EMC Converged Platforms     Published Date: Aug 25, 2015
In the past decade, information technology has evolved from an enabler of back-office business process to the very foundation of a modern business. IDC interviewed 16 EMC customers who had recently deployed VCE Vblock® systems. Results included: • 4.6X more applications deployed • 96% reduction in downtime • 4.4X faster app delivery • 41% less time keeping the lights on Download this white paper to learn how to leverage convergence to drive business agility to accelerate your pace of innovation, provide flexibility to meet new demands and continually reduce the costs of operations.
Tags : 
    
EMC Converged Platforms
Published By: ServiceNow     Published Date: Jul 09, 2015
Modern IT requires an evolved approach to orchestration – one that erases the barriers separating people, process and technology. Modern IT also demands tools, including orchestration, that promote action and agility. Without high levels of automation, virtual machines and cloud services will quickly grow out of control. IT organizations choose evolved orchestration to deliver business agility while also maintaining control. This white paper describes how ServiceNow Orchestration empowers IT organizations to do all of this and more.
Tags : 
    
ServiceNow
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
What’s the best analytic approach for your business? As technology has evolved, so has our ability to process data at an incredible rate, making it possible to perform what has become known as Anticipatory Analytics. While still a relatively new concept, anticipatory analytics is gaining prevalence as a methodology. If you’re seeking to understand the future needs of your business before they show obvious signs, anticipatory analytics can’t be ignored. In this document, you’ll learn: • The advantages of anticipatory analytics • The key enablers of anticipatory analytics • How anticipatory can be leveraged for your business • Why anticipatory can give you first-mover advantage • When to use anticipatory or predictive analytics, based on your goals
Tags : 
    
Dun & Bradstreet
Published By: LogMeIn EMEA     Published Date: Nov 01, 2019
The IT landscape has evolved drastically over the last few years, and one of the biggest challenges is staying ahead of ever-changing security threats. IT teams are constantly being asked to do more with less, so implementing solutions that embrace automation, enhance security and provide a single pane of glass view are absolute necessities. Remote Monitoring and Management (RMM), defined as the process of supervising and controlling IT systems (laptops, desktops, servers), enable automation, security, and control, and have thus become a crucial component in every IT professional’s toolkit.
Tags : 
    
LogMeIn EMEA
Published By: ServiceNow     Published Date: Nov 05, 2012
Without high levels of automation, virtual machines and cloud services will quickly grow out of control. An evolved approach to automation erases the barriers between people, process and technology and drives more efficiency into the business.
Tags : 
runbook automation, servicenow, complex procedures, business agility
    
ServiceNow
Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
Published By: Oracle APAC     Published Date: May 24, 2018
Linux has become an important component of the organization's infrastructure since initial deployment around six years ago. The Linux infrastructure was first used for classic edge-of-network workloads but has evolved over time to take on increasingly sophisticated and critical workloads. Today, it is considered a primary workhorse for the company. As in many organizations, Windows, with about 5,000
Tags : 
    
Oracle APAC
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.