att

Results 301 - 325 of 4084Sort Results By: Published Date | Title | Company Name
By: KeyBank Commercial Banking     Published Date: Aug 31, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. These surveys help us discover overall industry sentiment on topics of importance to you. We believe that the more we know, the better we can serve you. Check out what leaders are saying about their outlook on the U.S. economy, expansion plans, and their thoughts on changing healthcare policy when you read our latest quarterly report.
Tags : middle market, us economy, economic outlook, business acquisitions, business acquisitions, business expansion
     KeyBank Commercial Banking
By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
     Key Private Bank
By: Key Private Bank     Published Date: Apr 05, 2018
From budgeting daily expenses to deciding a career path, attending college brings plenty of opportunities for teenagers to make the right—and wrong—financial decisions. That’s why parents of college-bound children should utilize opportunities to instill money and wealth preservation lessons in their children. But knowing where to start can be daunting. The experts at Key Private Bank have narrowed down the best ways to help you discuss important money lessons with your teens, so that you can set your children up for a lifetime of financial success. Read about the four wealth lessons you can start introducing to your children now when you read our latest whitepaper. © 2018 KeyCorp. E92127 180314-372281
Tags : financial responsibility, college money management, managing your money in college, college money tips, college spending tips, how can students spend money wisely, save money in college, budgeting in college, budgeting college students, personal finances for college students, credit cards and college, student loans, college loans, managing student loans, monthly budget for college students, savings accounts for students, spending habits of college students, better spending habits in college, money management for students, college cash management
     Key Private Bank
By: SAS     Published Date: Jul 14, 2015
An Enterprise Approach to Fraud Detection and Prevention in Government Programs.
Tags : fraud, detection, prevention, cost savings, efficiency
     SAS
By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : data visualization, sas, big data, visual analytics, data exploration, analysis, networking, knowledge management, data management
     SAS
By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for Exchange 2013 are right-sized solutions including servers, storage, networking and services that have been optimized for Microsoft Exchange. There are two HP Flex-Bundles for Exchange. One has been configured for customers who have 200–499 mailboxes and another one for customers with 500-1000 mailboxes. These solutions are low risk investments because HP understands how to build infrastructures for Microsoft environments and applications. HP and Microsoft have the longest standing relationship in the IT industry spanning 30 years. During this time, HP has gained a deep and comprehensive understanding of Microsoft products. HP has more than 34,000 trained Microsoft specialists, with over 13,000 of them attaining Microsoft-certification. HP has been named Microsoft Enterprise Partner of the Year five times and is Microsoft’s largest Gold Certified partner.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how it’s done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, cloud computing
     CA Technologies
By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : location data, ad tech, location targeting
     Here Technologies
By: Dell     Published Date: Dec 12, 2017
Read this report to learn how your conference rooms can transition from a wired and often cluttered loss of time to an improved collaborative workspace. With increases in efficiency you can enjoy less time worrying about if and how technology will work and more time on what truly matters. See what the Dell OptiPlex 7050 Micro desktop as a hub in conjunction with Intel ® Unite™ host software can do for your collaboration initiatives.
Tags : 
     Dell
By: Dell EMC     Published Date: Aug 17, 2017
If your business uses a three-tier architecture with disaggregated servers, storage, and SAN to run applications, you might be considering upgrading to an integrated solution to streamline your business. However, implementing a hyperconverged Dell EMC XC Series cluster powered by Nutanix software is an even more attractive option that can provide over 73 percent greater database performance - an advantage that translates to 50 percent greater database performance per dollar than a traditional integrated solution.
Tags : three-tier architecture, disaggregated servers, integrated solution, hyperconverged infrastructure, database performance
     Dell EMC
By: Dell EMC     Published Date: Aug 17, 2017
For many companies the appeal of the public cloud is very real. For tech startups, the cloud may be their only option, since many don’t have the capital or expertise to build and operate the IT systems their businesses need. Existing companies with established data centers are also looking at public clouds, to increase IT agility while limiting risk. The idea of building-out their production capacity while possibly reducing the costs attached to that infrastructure can be attractive. For most companies the cloud isn’t an “either-or” decision, but an operating model to be evaluated along with on-site infrastructure. And like most infrastructure decisions the question of cost is certainly a consideration. In this report we’ll explore that question, comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : public cloud, it systems, data center, it agility, hyperconverged solution, hyperconverged appliance
     Dell EMC
By: Dell EMC     Published Date: May 09, 2018
Millennials are reshaping the world of work through their knowledge of new technologies, work habits, and attitudes of the 21st-century workplace. At the same time, IT departments are working to add flexibility to the way they are supporting the Millennial worker. Yet it’s not just about IT providing the right tools and devices to its employees so they can get their jobs done effectively; IT needs to offer an overall workplace ecosystem that is secure and innovative. In September 2016, Dell commissioned Forrester Consulting to conduct a study with 560 information workers across all industries in Australia, India, the UK, and the US. Learn more about the working habits that emerged and how IT departments can apply these insights to future deployments. Download Report! Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
     Akamai Technologies
By: Polycom     Published Date: Sep 04, 2012
This survey was conducted to assess C-level executives' attitudes and strategic ideas regarding their organizational use of communication and collaboration products and services.
Tags : tele-health, enterprise video initiatives, business video applications, healthcare, video, telepresence, video conferencing
     Polycom
By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
     Alert Logic
By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Berücksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgeräte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen würde.
Tags : mobileiron, byod, enterprise app store, productivity apps, mobile network access
     MobileIron
By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : video quality, playback, video reliability, high quality viewing, online video success
     Akamai Technologies
By: Akamai Technologies     Published Date: May 08, 2017
Video quality can be measured in multiple ways, but the primary metrics – playback reliability and image quality – are the most critical. Get these right, and content providers are on their way to winning the loyalty of online audiences and driving monetization. Get them wrong, and viewers will defect in a heartbeat. For live-streaming events, such as sports, where there’s can’t-miss fast action, the ante is raised even higher. In this white paper, we’ll explore why online video quality matters and the specifics of how it should be measured. Get a peek “under the hood” to understand the core elements of video delivery that contribute to high-quality viewing experiences. Most importantly, see why the choice of a content delivery partner is essential to your online video success.
Tags : video quality, playback, video reliability, high quality viewing, online video success
     Akamai Technologies
By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
     Akamai Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.