web

Results 201 - 225 of 3936Sort Results By: Published Date | Title | Company Name
By: Amazon Web Services     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
     Amazon Web Services
By: IBM     Published Date: Jul 16, 2018
Do your plans and forecasts need a reality check? The quality of your strategic decisions is only as good as the quality of your forecasts. And forecasts are only good if they reflect current reality—not the reality of two, three or more quarters ago. Enter “continuous planning.” With a methodology for forecasting at frequent intervals throughout the year, continuous planning “enables managers to see trends, patterns, and ‘breaks in the curve’ long before their competitors, and thus make better informed decisions regarding products and markets.” In this free online webinar, speakers Jim Collins & Guy Jones will explain how continuous planning keeps you in touch with current reality - and one step ahead of competitors. Jim Collins, Performance Management Strategy Executive, IBM Guy Jones, Worldwide Technical Sales Executive, IBM Performance Management,
Tags : 
     IBM
By: MuleSoft     Published Date: Jul 13, 2018
"IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: -Best practices for modernizing legacy SOA web services -How to think about re-architecting monolithic applications into microservices -The role that APIs play in driving an effective legacy modernization strategy -The bank’s legacy modernization strategy, and how they used Anypoint Platform"
Tags : 
     MuleSoft
By: KPMG     Published Date: Jul 10, 2018
Digital transformation brings risks and opportunities for internal audit and risk functions. Are you ready to help the business stay safe in an increasingly challenging technology environment? Watch this webinar to understand: • the unique risks from artificial intelligence • the relevance of AI technologies for internal audit and risk functions • what an effective risk and control framework looks like for AI risks • key actions internal audit and risk functions should consider now.
Tags : 
     KPMG
By: Turbonomic     Published Date: Jul 05, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to iden
Tags : 
     Turbonomic
By: Turbonomic     Published Date: Jul 05, 2018
Download this webinar to understand how to maximize cloud cost savings.
Tags : 
     Turbonomic
By: Turbonomic     Published Date: Jul 05, 2018
Turbonomic enables organizations to understand - and compare - the precise costs of migrating optimized workloads from on-premises data centers to the public cloud, including licensing models and discounting mechanisms such as RIs and Azure Hybrid Use Benefit (AHUB). This on demand webinar explains the Turbonomic process, including customer case studies.
Tags : 
     Turbonomic
By: PGi     Published Date: Jul 03, 2018
Most large companies have already made investments in tools that make video webcasting possible. Video is the most vibrant and intimate medium that executives can use to convey information to large, far-flung internal audiences. Video helps keep employees on the same page about company branding, strategic direction, and externally-facing stories and messaging. It facilitates the transparency and authenticity that today’s employees demand. CEOs of large, global corporations are frequently the catalyst for enterprise live streaming because they know they can use it to make a powerful and personal connection with tens of thousands of remote employees—efficiently and cost-effectively. They support using technology to foster communication and transparency, leading to a more engaged, productive workforce. They recognize the power of video. And they see how engaged, satisfied employees can collectively strengthen their company’s competitive advantage and enhance their bottom line. If your CEO
Tags : 
     PGi
By: Akamai Technologies     Published Date: Jul 02, 2018
Forrester has published the results of its research evaluating the 10 most significant web application firewall (WAF) vendors on 33 important criteria. Akamai is proud to be recognized as one of three Leaders in WAFs, with top rankings in both the current offering and strategy categories.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
     Akamai Technologies
By: Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : artificial, intelligence, enterprise
     Cylance
By: IBM     Published Date: Jul 02, 2018
Talks about the advantages of Oracle on Power Systems in real Oracle environments from IT Economics workload studies with clients.
Tags : 
     IBM
By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
     Butler Technologies
By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
     Reputation.com
By: Box     Published Date: Jun 22, 2018
There’s more to your content than you might think. Beyond the differences of enterprise vs. web vs. cloud content management, new changes in intelligent machine-to-machine apps are reinventing the content management market. In this expert e-guide, we explore a flexible, API-led approach to cloud-based content management and collaboration. Learn about a platform designed to enable you to: • Power content with machine learning and metadata • Drive intelligent capabilities like smart search • Modernize content-based processes • And more
Tags : 
     Box
By: Box     Published Date: Jun 22, 2018
Content is a core element of digital business. Companies must create, secure, manage, and collaborate upon content with both internal and external participants. But traditional ECM technology is costly and dated while EFSS is limited in functionality. The result? Too many content repositories, leading to silos and broken communication. Companies need a better way to work! • Join us as we chat with Cheryl McKinnon, our featured speaker from Forrester Research, to learn how to make the most of your content investment and drive innovation through IT. Takeaways from the webinar include: o 5 key trends shaping the market o Key capabilities of content management vendors o Essential use cases and recommended tactics to accelerate digital transformation
Tags : 
     Box
By: SAS     Published Date: Jun 20, 2018
Download Webinar
Tags : 
     SAS
By: Amazon Web Services     Published Date: Jun 20, 2018
Data and analytics have become an indispensable part of gaining and keeping a competitive edge. But many legacy data warehouses introduce a new challenge for organizations trying to manage large data sets: only a fraction of their data is ever made available for analysis. We call this the “dark data” problem: companies know there is value in the data they collected, but their existing data warehouse is too complex, too slow, and just too expensive to use. A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated q
Tags : 
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 20, 2018
The notion of digitizing your business has become a matter of “when,” rather than “if.” For many, migrating critical workloads to the cloud is a key part of this transformation. When deciding on a cloud provider, however, IT executives are under pressure to find a solution that enables reduced costs, greater agility, and above all, the ability to innovate core business processes. At the heart of many businesses embarking on this journey is their SAP environment. But since SAP workloads represent some of the most critical and deeply integrated business applications, IT executives are required to look for ways to execute this migration in the most timely and reliable manner. Organizations migrating to the cloud cannot risk application downtime or productivity loss
Tags : 
     Amazon Web Services
By: Tenable     Published Date: Jun 19, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
     Tenable
By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Are you spending too much time managing SSL/TLS certificates? Can you scan and report on your entire certificate estate? Have you seen a service go offline because of an expired certificate? Do you have to update certificates manually? If the answer to any of these questions is ‘yes’ then it’s time to invest in an automated certificate management tool. Download this whitepaper to find out more.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. Website security must be evolved in line with these growing threats and challenges. Download this whitepaper to find out more about how Digicert can help.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
     DigiCert
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.