Whitepaper Library
 

device

Results 1 - 25 of 2326Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Mar 02, 2015
Users of WebEx are able to conduct meetings in real time across all geographies on all internet connected devices, in high definition video and audio, resulting in clearer pictures, more effective communications, and more getting done. Chances are if you have ever watched a webinar or been in a virtual meeting room, then you have experienced a WebEx offering.
Tags : 
data center, virtualization, cloud computing, infrastructure, power and cooling, green computing
    
Server Technology
Published By: Raritan     Published Date: Jan 11, 2017
The rack power distribution unit (rack PDU) has emerged from obscurity. As the last link of the elaborate data center power chain, the traditional role of the rack PDU has been to deliver stable, reliable and adequate power to all the devices in the rack or cabinet—servers, storage, network equipment—which are plugged into it. Although it provides the electrical heartbeat to all the systems that run the critical applications that support the operation of the business (or that, in some cases, are the business); it was often considered a simple commodity, just a power strip. Typically, IT merely told facilities how much power was needed, based on device nameplate specs—and often with redundancy, so there was plenty of headroom and minimal risk of downtime. Little thought was given to efficiency or what other value a rack PDU could provide.
Tags : 
data center
    
Raritan
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In The Top Technologies to Cure Mobile Performance, Forrester’s Mark Grannan elaborates on this reality and explains how firms can tackle the device, bandwidth, and location challenges to appeal to a users perception of performance. In this paper, Mark explains: Why a Delivery Tier is Necessary Why Perception of Performance is the Key Metric of Mobile Success How User Context Steers Performance Optimization Whether to Build or Buy Delivery Capabilities Why the Delivery Tier Alone is Not Enough to Improve Performance.
Tags : 
technology, mobile, forrester, performance, optimization, device, bandwidth
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software APAC
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Datastax     Published Date: Aug 03, 2018
" For any business that wants to successfully compete in today’s digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: IBM     Published Date: Jul 05, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Epicor     Published Date: Aug 10, 2018
In the world of retail, the only returns you want are returns on your business investments. With Epicor Eagle N Series, you get precisely that—a tool that is engineered to go the distance, hit revenue and profit targets, keep customers coming back, and deliver great returns on your technology investment. The latest technology advances, and higher customer expectations, make it critical to have a solution in place meets your business goals and your customer’s needs. This eBook details seven way you can make your Point of Sale system deliver growth and profits including-- • Easy-to-use inventory management tools • Ability to streamline and simplify everyday processes • Keep customers coming back with customized loyalty programs • Get the advantage in-the-aisles with check-out and support through your mobile device This eBook includes comments from Epicor customers that are using the tools Eagle provides to reduce inventory costs, increase margins, and drive customer loyalty.
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor
    
Epicor
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing, network architecture, network management, servers, small business networks
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
    
Coyote Point Systems
Published By: Epson     Published Date: May 14, 2018
Over the past few years, improvements in mobile devices, Wi-Fi, and cloud computing have made mobile point of sale (POS) solutions e ective and a ordable for businesses of all sizes. Tablets have emerged as the most popular platform for mobile POS solutions, and you may have already heard the buzz about them. There’s a reason for all the hullaballoo. In addition to integrating payments and making retail transactions more e cient than using a traditional electronic cash register (ECR), tablet POS solutions can provide robust management data. A tablet POS solution makes sense for many retailers, particularly if you’re looking to: • replace an ECR or want to have a mobile POS in place on opening day • unlock new pro t-making and cost-saving opportunities • expand your business • keep pace with ever-changing customer expectations Figuring out which tablet POS solution is the best for your business may seem like a huge challenge. But don’t worry. Taking the right approach, by using too
Tags : 
    
Epson
Published By: ASG Software Solutions     Published Date: May 12, 2010
For many organizations, managing and delivering the knowledge contained within documents is difficult or impossible due to technological disparity. Conventional approaches to knowledge management work within the constraints of disparate platforms, applications, and output devices, and fail to address technological disparity.
Tags : 
asg, cypress, managing delivery, knowledge management, document management
    
ASG Software Solutions
Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.