Whitepaper Library
 

evolution

Results 1 - 25 of 694Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Jun 19, 2014
ScaleMatrix is a revolutionary new kind of data center. It offers clients premiere colocation services, public cloud, and private cloud services. Built from the ground up for the cloud – for high bandwidth applications — by data center owners and operators
Tags : 
scale matrix, server technology cloud, ups, pdu, data center, energy, virtualization, cloud computing, infrastructure, design and facilities, power and cooling, green computing
    
Server Technology
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Digital transformation has arrived, and it’s creating unprecedented opportunities for companies of all sizes to become market leaders through the evolution of business processes and the creation of new products and services. Organizations that master digital transformation will see a dramatic increase in revenues and profitability by converging people, processes and technologies; those that do not will struggle to survive. Evidence of this is clear to see by looking at the churn in the biggest companies in the world. For example, a Capgemini study found that since 2000, 52% of the Fortune 500 has disappeared through acquisitions or bankruptcies. The study also found that digital organizations control 70% of market share in all industries today. Therefore, making the shift to a digital business must be a top initiative for IT and business leaders. Download this whitepaper to see how Cisco has become the Market Share Leader in Online Meetings.
Tags : 
cisco, digital transformation, collabaration
    
Cisco EMEA Tier 3 ABM
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. Website security must be evolved in line with these growing threats and challenges. Download this whitepaper to find out more about how Digicert can help.
Tags : 
    
DigiCert
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Technology is in a constant state of evolution, and the world of automation is no exception. In this eBook, we’ll consider how you can stay ahead of the competition—because in the application economy, it’s vital to ensure the tools your organization uses are capable of positioning you at the forefront of industry—not just today, but tomorrow as well. We are heading toward a scenario where workload automation tools are capable of thinking for themselves and making decisions based on policy; this is what we at CA Technologies are calling intelligent automation. At the same time, however, more and more challenges are being presented as the increasingly fragmented places our workloads run begin to impact our analytics, reporting and processes. The task is to navigate these hurdles while at the same time allowing our enterprises to harness the power of new technology.
Tags : 
    
CA Technologies_Business_Automation
Published By: HP Inc.     Published Date: Jun 12, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: TrendKite     Published Date: Apr 25, 2018
Sometimes a perfect storm comes together to signal a radical shift or rebirth of an industry. But it’s not enough to say public relations is in flux or rapidly changing. It’s more impactful to discuss the evolution of the change, understand the potential gaps, and be early to capitalize on opportunities created by these gaps. The path for change in the PR industry has been tumultuous. And understandably so. The irrationality of basing performance on vanity metrics is so ingrained in the profession that the left-brain, rational piece has been pushed aside. This has created a culture of estimating based on vanity metrics like AVE (ad value equivalency), leading to a dynamic where the C-suite craves that WSJ or TechCrunch story, yet doesn’t believe PR’s reporting on the value of that coverage. When everyone in the marketing stack is crunching numbers and showing real, tangible value, PR is holding onto air. Why keep setting the profession up for failure by perpetuating the cycle of abstr
Tags : 
ave, trendkite, marketing
    
TrendKite
Published By: Hubble by insightsoftware.com     Published Date: May 22, 2018
Don’t settle. Forward-thinking finance professionals know that there is a better way. Though BI tools have provided visibility to data, they have in fact failed to provide direct access to enterprise information. However, evolution does not stop there: Next-gen corporate performance management solutions are among us and promise to deliver interconnected, flexible, and realtime data access. Agility achieved.
Tags : 
erp, enterprise, finance, evolution, performance
    
Hubble by insightsoftware.com
Published By: Forcepoint     Published Date: Apr 19, 2018
Every few years a technology comes along that evolves the current approach to become more efficient and cost effective. Software-defined wide-area networking (SD-WAN) connects locations in a revolutionary way, but many “facts” about SD-WAN are more fantasy than reality. Read “5 Myths About Enterprise SD-WAN” for clarity around the advantages and limitations of SD-WAN and how Forcepoint helps with its implementation. For anyone that has ever had to worry about connecting a distributed network, software-defined wide-area networking (SD-WAN) is a big deal. It’s a drastic upgrade to the status quo, efficiently connecting locations with existing network technology like commodity broadband and virtual private networks (VPNs).
Tags : 
enterprise, wan, technology, software, networking, cost
    
Forcepoint
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
    
Trend Micro
Published By: iShares by BlackRock     Published Date: Apr 19, 2018
In this paper, we examine the evolution of the bond market through three interconnected lenses: the liquidity environment, market structure and product preferences. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, bonds, bond market, liquids, risk management
    
iShares by BlackRock
Published By: NEC     Published Date: Aug 26, 2009
This is a case study which shows how Leicester Theatre Trust (LTT) implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC.
Tags : 
curve, nec, ltt, unified communications, architecture, service oriented architecture, soa, soc, service oriented communications
    
NEC
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa, ip networks, ip telephony
    
NEC
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Epson     Published Date: Jun 22, 2018
The U.S. workplace is undergoing one of its largest transformations in the past 40 years. Although the magnitude of this evolution is difficult to notice when viewed in short time frames, by 2020, the percentage of employees in the workplace from the Baby Boom and Millennial generations will have completely reversed from the composition in 2010, with Millennials increasing to 50% of the U.S. workforce and Boomers decreasing to 25%. Because of their size, these generations already exercise significant influence on the workplace and will undoubtedly impact the nature of work well into the future.
Tags : 
    
Epson
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
Cylance
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design
    
OneUpWeb
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco is committed to leading the collaboration revolution— both today and tomorrow. The role of technology in themarket place is to support and inspire big ideas and innovation. Digital transformation is going to continue to drive new ways of working, and Cisco will remain a driving force, with a vision that extends beyond in-house innovations—because the best ideas can come from anywhere.
Tags : 
file sharing, team engagement, cisco spark board, hybrid media, services, work optimization, developers
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
Published By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Vonage Business     Published Date: Jan 19, 2018
With the revolutionary application of SD-WAN technology to Unified Communications as a Service (UCaaS), network quality of service (QoS) is delivered both efficiently and economically. Read the ebook now.
Tags : 
business, technology, vonage, smart wan, bandwidth, network
    
Vonage Business
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.