independent

Results 126 - 150 of 310Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
This independent study from IDC looks at the economic benefits of flash deployments from a business perspective. It provides essential guidance for IT decision makers and also highlights scenarios where flash may not be the best choice.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NAVEX Global     Published Date: Oct 18, 2016
In 2016 NAVEX Global partnered with an independent research firm to survey ethics and compliance (E&C) professionals from a wide range of industries about their approach to E&C training.
Tags : 
    
NAVEX Global
Published By: Oracle_Hospitality Hotels     Published Date: Sep 27, 2016
In our new report, Cost Control in Food & Beverage: How Technology Can Help Maximize Profits, we surveyed more than 200 independent operators and chains to understand how they are managing labor, inventory, and loss prevention costs.
Tags : 
    
Oracle_Hospitality Hotels
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
    
Determine (Selectica)
Published By: NetApp     Published Date: Aug 26, 2016
Flash storage is taking the enterprise market by storm. With all-flash arrays (AFAs) now available from every major enterprise storage vendor, they are quickly becoming a mainstream general purpose deployment platform for mixed workloads. According to IDC, flash technology will come to dominate primary storage platforms by 2020. Read this independent whitepaper to learn what sets the NetApp AFF apart from other AFAs on the market, and discover why IDC describes the AFF as “the crown jewel” in the NetApp portfolio of all-flash storage solutions.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Aug 26, 2016
How has flash evolved over the years? This infographic takes you from the invention of flash memory in 1980 to its introduction in storage systems in 2008 to where we are today: an all-flash platform that supplies flexible, independent scaling of both capacity and performance.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Aug 26, 2016
Gartner: Moving Toward the All Solid-State Storage Data Center Are you only using solid-state arrays for your primary data? If so, you’re missing out on the benefits flash can deliver to other applications, such as active archives, data lakes, and big data infrastructures. In this independent report, Gartner finds that progressive I&O leaders are already moving toward an all solid-state data center and predicts that others will soon follow. Read the report here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas
    
NAVEX Global
Published By: Oracle_Hospitality F&B     Published Date: Aug 08, 2016
In our new report, Cost Control in Food & Beverage: How Technology Can Help Maximize Profits, we surveyed more than 200 independent operators and chains to understand how they are managing labor, inventory, and loss prevention costs.
Tags : 
cost control, best practices, technology, maximize profit, operators, business technology
    
Oracle_Hospitality F&B
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business technology
    
Okta
Published By: Cisco     Published Date: Jul 11, 2016
This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.
Tags : 
    
Cisco
Published By: NetApp     Published Date: Jun 27, 2016
“Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.”
Tags : 
    
NetApp
Published By: NetApp     Published Date: Jun 27, 2016
"Gartner: Moving Toward the All Solid-State Storage Data Center Are you only using solid-state arrays for your primary data? If so, you’re missing out on the benefits flash can deliver to other applications, such as active archives, data lakes, and big data infrastructures. In this independent report, Gartner finds that progressive I&O leaders are already moving toward an all solid-state data center and predicts that others will soon follow. Read the report here."
Tags : 
    
NetApp
Published By: IBM     Published Date: Jun 13, 2016
Join this virtual discussion between industry thought leaders to learn how to: - Separate the myths from realities related to the Millennial workforce. - Understand the value provided by alternative work arrangements and the independent worker. - Identify opportunities for your organizations to better adapt to these shifts within the workforce.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting
    
IBM
Published By: NetApp     Published Date: Jun 03, 2016
Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code, security
    
Auth0
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: Cisco     Published Date: Apr 04, 2016
Miercom was engaged to perfirm independent, hands-on, comparative testing of competitive IEEE 802.11ac Wave 2-based WiFi Access Points (APs) from Cisco Systems, Aruba Networks and Ruckus Wireless. This report summarizes the results of the Wave 2 AP comparative testing in these areas: - Client density: Downlink throughput as the number of client per AP scales from 10 to 100. - Single vs Multi-User MIMO: Downlink throughput for MU-MIMO (Multi-User, Multiple-Input Multiple-Output), a hallmark of 802.11ac Wave 2, vs Single-User (SU-MIMO) environments. - 1 Gbps+ Link Aggregation: Tests found that Wave 2 APs can support more than 1Gbps of aggregate downlink throughput, tested over two 1-Gbps LAG (link aggregation) connections.
Tags : 
cisco systems, meiercom, client density, mimo, link aggregation, networking, it management, wireless
    
Cisco
Published By: IBM     Published Date: Mar 28, 2016
In the age of the empowered individual, organizations must rethink the workplace with the employee at the center of the business. Business leaders are now facing a host of new challenges and opportunities associated with their workforces. On one hand, the demographics of their workforce are changing with a new type of employees coming on-board. At the same time, the nature of the employee relationships are rapidly changing. This session will focus on recent research from the IBM Institute for Business Value about how to make sense of these workforce changes and take actions that will benefit your organization. Join this virtual discussion between industry thought leaders to learn how to: Separate the myths from realities related to the Millennial workforce. Understand the value provided by alternative work arrangements and the independent worker. Identify opportunities for your organizations to better adapt to these shifts within the workforce.
Tags : 
ibm, workforce demographics, millennial workforce, alternative work arrangements, organization opportunities
    
IBM
Published By: SAS     Published Date: Feb 09, 2016
This report from Chartis provides an independent evaluation and description of leading practices from SAS as well as its competitive position in the market using the Chartis RiskTech Quadrant® for Enterprise Stress Testing Systems. This report also includes a brief look at: • The demand side trends outlining key business and regulatory challenges. • The supply side focusing on the technology landscape for enterprise stress testing. The RiskTech Quadrant® uses a comprehensive methodology of in-depth independent research and a clear scoring system to explain which technology solutions meet an organization’s needs. Chartis considers SAS to be one of the leading vendors of enterprise stress testing systems for the financial services industry.
Tags : 
sas, chartis, enterprise stress testing system, best practices, it management, wireless, knowledge management, data management
    
SAS
Published By: Optimizely     Published Date: Dec 01, 2015
In Optimizely’s independent survey of digital channel owners with Dimensional Research, we observed an emerging set of behaviors that indicate sophisticated optimization being done by teams actively running A/B and multivariate experiments. These teams are doubling down on the people and processes needed to accelerate the development of their optimization programs. The result? Faster business benefits and in greater orders of magnitude.
Tags : 
a/b testing, customer experience, sophisticated optimization, optimization programs, enterprise applications
    
Optimizely
Published By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure
    
Black Box
Published By: Cisco     Published Date: Nov 17, 2015
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners. Managers of these traditional factories say the feeling is akin to flying blind. These are operations where plant floors, front offices, and suppliers operate in independent silos, where managers have only hazy visibility into downtime and quality problems, and where the root causes of inefficiencies are rarely understood or addressed.
Tags : 
industrial enterprise, manufacturing, connected factory, convergence, automation, business networks, factory-based operational technologies, it networks
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee