technical

Results 201 - 225 of 597Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Jun 21, 2019
This paper explores the merits of agile integration architecture--a container-based, decentralized, and microservices-aligned approach for integration solutions that meets the demands of agility, scalability, and resilience required by digital transformation.
Tags : 
    
Group M_IBM Q3'19
Published By: Domino Data Lab     Published Date: Feb 08, 2019
A data science platform is where all data science work takes place and acts as the system of record for predictive models. While a few leading model-driven businesses have made the data science platform an integral part of their enterprise architecture, most companies are still trying to understand what a data science platform is and how it fits into their architecture. Data science is unlike other technical disciplines, and models are not like software or data. Therefore, a data science platform requires a different type of technology platform. This document provides IT leaders with the top 10 questions to ask of data science platforms to ensure the platform handles the uniqueness of data science work.
Tags : 
    
Domino Data Lab
Published By: Sierra Wireless     Published Date: Jun 19, 2019
The IoT is transforming the energy industry by eliminating tradeoffs between operation, SCADA systems, maintenance and new services for assets deployed in industrial and power facilities, buildings and across the grid. When it comes to building the best IoT system for your business application, it’s vital to keep your use case and business requirements at the forefront of your technical design strategy. In the energy industry, accessing and collecting data at the edge from disparate, heterogenous, multi-site, fixed topologies and transferring that data efficiently to the cloud to perform analytics and action business decisions is still the greatest challenge. Mission-critical data collected from the edge is integral to energy facility operations and cannot be excluded or corrupted.
Tags : 
    
Sierra Wireless
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : 
identity, theft, revenue, technical, support, data, confidential
    
Akamai Technologies
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: BMC ESM     Published Date: Aug 19, 2009
Would you trust your network monitoring tools enough to know when something is truly halting a business service? While Mary Nugent won’t use this podcast to attempt to tell you technical details on the correct alarming thresholds, she will share some excellent stories about predicting a system’s behavior. Run Time: 11:30.
Tags : 
network, networking, monitoring, podcast, bmc, monitor, business service, business behavior, network, management, performance
    
BMC ESM
Published By: SAS     Published Date: May 24, 2018
Ongoing digitization has created vast streams of data, forcing businesses to become more data-driven than ever before. While the benefits of being a data-driven organization are clear (improved performance, more profitability, stronger innovations), there are still some technical and business challenges to overcome. Thanks to technological advancements in data analytics, companies in all types of industries can become data-driven. Read this e-book to discover what it means to be a data-driven organization and to learn the basic do’s and don’ts of how to get there.
Tags : 
    
SAS
Published By: SAS     Published Date: Sep 05, 2019
Envision this situation at a growing bank. Its competitive landscape demands an agile response to evolving customer needs. Fortunately, analytically minded professionals in different divisions are seeing results that positively affect the bottom line. • A data scientist in the business development team analyzes data to create customized • experiences for premium customers. • A digital marketer tracks and influences the customer journey for prospective • mortgage customers. • A risk analyst builds risk models for the bank’s loan portfolios. • A data analyst examines data about local customers. • A technical architect defines a new system to protect bank data from internal and • external cyberthreats. • An application developer builds a new mobile app for online customer portfolio • management. Between them, these employees might be using more than a dozen packages for analytics and data management.
Tags : 
    
SAS
Published By: Red Hat     Published Date: Dec 27, 2012
Gabriel Consulting Group’s recent annual x86 Data Center Surveys have shown that the average x86 enterprise customer is using three different hypervisors to virtualize their workloads.
Tags : 
data center, hypervisors, virtualize, red hat, it management, business technology
    
Red Hat
Published By: NetIQ     Published Date: Nov 01, 2012
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security, business technology
    
NetIQ
Published By: Vidyo, Inc.     Published Date: Jul 17, 2009
Personal Telepresence is the next generation in video communication. It delivers affordable, universal, and reliable video communication. The VidyoConferencing system provides the solution to the business and technical challenges of personal telepresence
Tags : 
vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc
    
Vidyo, Inc.
Published By: LogMeIn     Published Date: Feb 06, 2013
This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers. The data was collected via an online survey from August to October 2012.
Tags : 
customer satisfaction, support organizations, technical support, products, services, business technology
    
LogMeIn
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to move beyond single task apps and enable the app workflows that help keep your mobile workforce productive and secure.
Tags : 
mobile collaboration, secure collaboration, secure mobile application, enterprise mobile applications, enterprise mobile apps, enterprise collaboration, business case
    
Good Technology Corporation
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This technical white paper outlines the mission critical reference configuration that is part of the HP Virtual System family.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Read this paper to learn more on how blades are highly associated with core infrastructure consolidation and optimization efforts.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: AlienVault     Published Date: Aug 14, 2015
Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: Infoblox     Published Date: Jun 18, 2015
Download this detailed technical analysis to learn how to avoid manual tasks and processes.
Tags : 
infoblox, cloud network, vmware, vrealize, tolly group, flexible deployment architecture, scale up, scale out, cloud network automation
    
Infoblox
Published By: HP     Published Date: Nov 05, 2014
HP Proactive Care helps prevent problems and stabilize IT by utilizing secure, realtime, predictive analytics and proactive consultations when your products are connected to HP. Benefits include: • Problem prevention • Predictive analytics for proactive reports • Personalized consultation with a Technical Account Manager • Rapid access to advanced technical experts Download this customer brief now.
Tags : 
proactive care, it stability, problem protection, reduce risks, prevent it issues, care service, gen9, customer brief, it management
    
HP
Published By: NetApp     Published Date: Mar 06, 2018
Gartner Report: Competitive Landscape for Hyperconverged Integrated Systems. Accelerate business outcomes and achieve growth with hyperconverged integrated systems (HCIS). Key findings: As the hyperconverged integrated system (HCIS) market has matured in the past two years, some smaller providers without sufficient bases, technical resources and cash to survive on their own have exited the market." • "HCIS-only providers that have a sustainable sales advantage based on effective communication of technical strengths that can deliver superior cost savings or performance advantages are most likely to remain viable as the market continues to grow." • "HCIS providers without compelling value propositions to differentiate their offerings against other HCIS solutions are unlikely to survive the increasing competitive pressure that is appearing in the market."
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee