att

Results 1 - 25 of 4184Sort Results By: Published Date | Title | Company Name
By: DRIP     Published Date: Aug 23, 2019
When it comes to how you communicate with customers, you’re faced with some big decisions—one of them being whether to use an ESP or ECRM. Both platforms can deliver your email, but beyond that, these tools are pretty different. Getting the right roster of marketing tools is critical no matter where your brand is when it comes to growth. If you’re just starting to sell online, you need platforms that won’t hold you back when you hit your stride. If you’re part of a long-standing enterprise, whichever platform you adopt needs to be able to handle anything you throw at it while exposing opportunities you might not have noticed before. See what each platform was built for, which companies benefit the most from each, and which you should choose to reach your brand’s goals.
Tags : 
     DRIP
By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartner’s 2017 prediction that “through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches”. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS don’t experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
     CloudHealth by VMware
By: TIBCO Software     Published Date: Aug 20, 2019
How we fuel our vehicles, heat our homes, and power our industries is undergoing fundamental change. Well-deployed but inefficient technologies, such as internal combustion engine cars and oil/gas boilers are being replaced with electrified and higher-efficiency alternatives. And renewables such as sunlight, wind, thermal, and others, supported by next generation battery storage, are fueling an evergreater share of energy demand.
Tags : renewable energy, oil&gas, connected intelligence, real-time data, analytical insights, information technology
     TIBCO Software
By: Dell EMEA     Published Date: Aug 20, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security.
Tags : 
     Dell EMEA
By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 years—but the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates don’t undermine the very user experience that we’re working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
     Tricentis
By: Dell EMC Storage     Published Date: Aug 15, 2019
L'era digitale ha determinato una crescita esponenziale di dati che può rivelarsi vantaggiosa per le aziende moderne. Sfruttata correttamente, consente alle organizzazioni di realizzare il potenziale dei dati per promuovere risultati migliori in tutti gli aspetti del business. Utilizzati per supportare analisi, attività e workflow diversi, i dati si trasformano in valore economico, una risorsa digitale che darà impulso al valore per l'azienda. La misura in cui un'azienda allinea la propria organizzazione a questa mentalità del valore economico dei dati, sia nel modo in cui utilizza i dati che nel modo in cui investe in tecnologia dei dati, può avere un impatto duraturo sul proprio successo. A febbraio 2019 Dell EMC e Intel hanno commissionato a Forrester Consulting uno studio per valutare se la capacità di sfruttare e applicare dati e analisi ogni qualvolta emerga un'opportunità stia diventando rapidamente un prerequisito per il successo. Per verificare questo aspetto, Forrester ha co
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 15, 2019
Das digitale Zeitalter verändert die Art und Weise, in der Unternehmen Daten betrachten, schützen und gewinnbringend nutzen. Sie streben jetzt mehr den je danach, zu einem digitalin Unternehmen zu werden, aber dafür sind datengesteuerte Verfahren erforderlich. In modernen Unternehmen sind Daten die Grundlage für alle Bereiche: Analysen, digitale Erfahrungen, IoT und künstliche Intelligenz sind nennenswerte Beispiele. All diese Bereiche sind wichtig für Unternehmen, die in einer digital transformierten Welt erfolgreich sein möchten, und können ohne Daten schlicht nicht funktionieren. Deshalb werden Daten statt als statische digitale Ressource zunehmend als strategische Unternehmensressource wahrgenommen.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 15, 2019
Perseguire l'agilità per influire realmente sulla trasformazione dell'attività richiede l'adozione del rinnovo del data center come competenza principale. Per questo è fondamentale disporre dell'infrastruttura IT più aggiornata che possa supportare la portata e la complessità di un ambiente tecnologico in evoluzione. Le aziende devono sostenere questo imperativo adottando principi di data center definito dal software, eseguendo il rinnovo e automatizzando i processi di gestione dell'IT. Quelle che agiscono in tal modo, favoriranno l'innovazione aziendale e offriranno un'esperienza del cliente superiore con tecnologie aziendali veloci, sicure e affidabili. A dicembre 2018, Dell Technologies ha commissionato a Forrester Consulting la valutazione del valore per il business dell'infrastruttura moderna nei data center aziendali. Per analizzare questo argomento, Forrester ha condotto una survey online su 508 responsabili delle decisioni in ambito di tecnologia dell'infrastruttura IT. Questo
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 15, 2019
L’agilité nécessaire à la transformation en profondeur de l’entreprise ne peut être atteinte qu’en adoptant la modernisation du datacenter en tant que compétence principale. À cette fin, disposer d’une infrastructure IT parfaitement à jour et capable de prendre en charge l’étendue et la complexité d’un environnement technologique changeant est essentiel. Pour satisfaire cet impératif, les sociétés doivent adopter les principes du datacenter géré via une base logicielle, s’engager dans la modernisation et automatiser leurs processus de gestion informatique. Ce faisant, elles accéléreront l’innovation et proposeront des expériences client de qualité supérieure avec des technologies métiers rapides, sécurisées et fiables. En décembre 2018, Dell Technologies a chargé Forrester Consulting d’évaluer les principaux atouts d’une infrastructure moderne dans les datacenters des sociétés. Pour apporter des éléments de réponse, Forrester a mené une enquête en ligne auprès de 508 décideurs en matiè
Tags : 
     Dell EMC Storage
By: Automation Anywhere APAC     Published Date: Aug 15, 2019
The University of Melbourne deployed Automation Anywhere’s Robotic Process Automation (RPA) technology to reduce manual work and automate a range of administrative processes across student admissions, faculty administration, and supplier tracking. The deployed software bots now automate the entry of all data and attachments for new admission applications, and the university has slowly expanded its automation capabilities for staff across other faculties. This has allowed the University of Melbourne to increase the efficiency of critical business processes, boost staff engagement, and improve customer experience for its teachers and student body.
Tags : rpa, roi, digital workforce, customer story
     Automation Anywhere APAC
By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
     Lenovo - APAC
By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
     Jamf
By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
     Limelight Network
By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
     Limelight Network
By: Limelight Network     Published Date: Aug 12, 2019
Live streaming is attracting viewers online to watch major sports events, play games, participate remotely in educational opportunities, and bid at live auctions. But today, the latency of online video stream delivery is typically too long to provide the viewing experience users expect, resulting in unhappy viewers and lost revenue. Fortunately, new live streaming technology makes it possible to deliver live streams in less than a second, enabling exciting new experiences that engage viewers in multiple ways. For organizations that need to distribute live streams, it’s about increasing audience size and revenue. For viewers, watching streams in realtime with interactive data integrated with the live video enables new possibilities for how they can interact with you and each other. Read this brief to learn how sub-second latency streaming enables new business opportunities by making live viewing a more interactive social experience.
Tags : 
     Limelight Network
By: Cohesity     Published Date: Aug 09, 2019
Best practices to prevent, detect, and respond to a ransomware attack targeting your backups
Tags : 
     Cohesity
By: Cisco Umbrella EMEA     Published Date: Aug 09, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 09, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources. Learn more about this fast-growing threat and how Cisco Umbrella can help. "
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
We have covered a great risk in the web attack vector of ransomware, and greatly improved our user experience in regards to Internet connectivity. -Jason Hancock, Global Senior Network Engineer, Octapharma
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
     Cisco Umbrella EMEA
By: InMoment     Published Date: Aug 08, 2019
InMoment surveyed 1,300 U.S. consumers to understand the state of trust and loyalty, as well as customer perception about retailers’ attemps to offer more experiences versus simple transactions.
Tags : 
     InMoment
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.