technical

Results 76 - 100 of 597Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: NetApp     Published Date: Aug 26, 2016
The technical and financial advantages of solid state drives are driving a rapid transition from hard disk-drive (HDD) and hybrid-flash array (HFA) storage systems to all-flash arrays (AFAs). The white paper identifies some of the key considerations for evaluating all-flash storage infrastructure for three major uses cases: standalone applications, virtualized applications, and next-generation cloud services.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Datto Inc.     Published Date: Apr 15, 2013
Looking to expand your recurring revenue? Need a key to open the door to small business? Learn how Datto ALTO answers both questions, as the key to BDR for small business. Datto wants you to succeed. As the only 100% channel-focused backup, disaster recovery (BDR) and intelligent business continuity (IBC) vendor, Datto is focused on the success of our Partners. Our Partners succeed by delivering award-winning solutions to their clients that are easy to sell, easy to manage, and will eliminate downtime in the event of a natural or technical disaster.
Tags : 
small business, datto alto, bdr solutions, recurring revenue
    
Datto Inc.
Published By: Datto Inc.     Published Date: Apr 15, 2013
Small businesses are positioned for the perfect data storm: more data, at more value, with more risk. Their challenge has been not having an enterprise-class BDR solution built with their specific pain points in mind. Datto ALTO, and you, can change that. Datto wants you to succeed. As the only 100% channel-focused backup, disaster recovery (BDR) and intelligent business continuity (IBC) vendor, Datto is focused on the success of our Partners. Our Partners succeed by delivering award-winning solutions to their clients that are easy to sell, easy to manage, and will eliminate downtime in the event of a natural or technical disaster.
Tags : 
datto redefines bdr for small business, bdr solution, datto alto, robust bdr solution
    
Datto Inc.
Published By: Clustrix     Published Date: Sep 04, 2013
Online advertising is a highly competitive and innovative market being driven to new levels by the rise of ad exchanges, real-time bidding alongside traditional ad networks. With advertisers increasingly buying one impression at a time, advertising market growth is soaring. If your database is the bottleneck limiting the growth of your advertising business, this is the white paper for you. Find out how Clustrix will give you access to functionality, such as ad segmentation and targeting based on up-to-the minute campaign performance, as well as instant access to smart data, so your clients can make the right buy decisions. This free whitepaper considers the technical challenges this rise presents for the database, and discusses the unique technology that enables Clustrix to solve these challenges and give your advertising business a competitive advantage.
Tags : 
technology, clustrix, online advertising, real time bidding, database, analytics, it management, knowledge management
    
Clustrix
Published By: Maetrics     Published Date: Oct 08, 2015
Re-evaluating Their Importance Under a New Regulatory Spotlight Every medical device sold into Europe, irrespective of its classification, must have an up-to-date Clinical Evaluation Report (CER) as part of its Technical File.
Tags : 
    
Maetrics
Published By: Dynatrace     Published Date: Apr 26, 2017
This new report from Dynatrace and O'Reilly Media details the 3 stages that businesses move through as they migrate to the cloud, and a winning strategy for each stage. It includes case studies that will show you how to tackle both technical and cultural challenges along the way.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Dynatrace
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
This document will guide solution providers through the five main principles necessary to develop a practical, customized cloud transformation strategy designed to support a cloud-first customer offering. These principles include: Financial Considerations to Building a Cloud Model Marketing Approach How To “Sell” the Cloud Technical Strategy Operational Readiness
Tags : 
    
Concerto Cloud Services
Published By: Red Hat     Published Date: Jun 23, 2016
The traditional technical and cultural challenges that large, hierarchical IT organizations face become more visible during times of IT transformation, such as the adoption of cloud technologies, DevOps practices, and agile methodologies. Persistent organizational culture is organic, and it can be extremely difficult for IT leaders to dictate it effectively from the top down. IT leaders can, however, use technology to encourage proper incentive structures in all levels of the organization. This paper explores the role of OpenShift by Red Hat in creating an atmosphere where creative and passionate developers can succeed frequently and quickly. Their success means decisionmakers can impact organizational culture and more rapidly achieve their goals. In this way, IT leaders can harness the efficiency and persistence of spontaneous organization, despite the inherent limitations of hierarchical systems.
Tags : 
technology, productivity, red hat, best practices
    
Red Hat
Published By: VMware     Published Date: Jul 01, 2016
Straight from our experts at VMware®, follow these technical tips to learn what you need to know to get started with VMware vCloud® Air™. From choosing the right service offering to migrating your workloads and administering resources, reference these tips as you extend your data center to the cloud.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension
    
VMware
Published By: Panaya     Published Date: Aug 09, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: • Sync business and IT to ensure your ERP solu
Tags : 
    
Panaya
Published By: CA Technologies     Published Date: Aug 22, 2017
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Download this webcast today to hear guest speakers discuss and review key issues and themes around SD-WAN. Guest speakers will talk through recommendations on how to address the unique challenges that SD-WAN presents to network operations: Industry expert panel discussion featuring: -Shamus McGillicuddy, Senior Analyst, EMA -Fred Estienne, Managed Solutions Architect, Bell Canada -Paul Kohler, Director, Technical Alliances, Viptela -Time Diep, Director Product Management, CA Technologies Download and listen today!
Tags : 
    
CA Technologies EMEA
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Business leaders expect two things from IT: keep mission-critical applications available and high performing 24x7 and, if something does happen, recover to be back in business quickly and without losing any critical data so there is no impact on revenue stream. Of course, there is a gap between this de facto expectation from nontechnical business leaders and what current technology is actually capable of delivering. For mission-critical workloads, which are most often hosted on databases, organizations may choose to implement high availability (HA) technologies within the database to avoid downtime and data loss.
Tags : 
recovery point, recovery time, backup appliance, san/nas, service level agreement, oracle
    
Oracle ZDLRA
Published By: TIBCO Software     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay. Join guest speaker, Forrester Research VP and Principal Analyst, Boris Evelson and Oracle Analytics Senior Group Director, Jose Villacis as they discuss insights from an Oracle-commissioned study of North American enterprise analytics leaders.
Tags : 
    
Oracle Analytics
Published By: Oracle Analytics     Published Date: Oct 10, 2017
How are organizations balancing self-service analytics and data governance today? What are the trends for tomorrow? Many organizations are on their way to achieving self-service analytics maturity through the use of intuitive data visualization technologies aimed at non-technical users; as well as various tactics that reduce reliance on IT. But handing the analytics reins entirely to business users can make governance nearly impossible. As a result, organizations are increasing investments in modern analytics platforms that enable a balance between IT governing and curating data, empowering business users to derive insights from data mostly on their own and without delay.
Tags : 
    
Oracle Analytics
Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: Jul 07, 2015
This is the Key technical support considerations for smart IT infrastructures" White Paper.
Tags : 
infrastructure, big data, data center, scalability, reduce complexity, data management
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This Technical Support Services infographic explains how IBM can help you manage your multivendor IT environment.
Tags : 
multivendor, it environment, performance, software activities, virtualization, operating systems, it management
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
" This eBook will take you through the basics of application release and deployment, and provide best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions Complete the short form to the right to download the eBook."
Tags : 
ibm, application release, devops, deployment, ibm urbancode, software development, enterprise applications
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee