dyn

Results 51 - 75 of 903Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : 
ubuntu, performance, windows, hyper-convergence
    
Dell EMC
Published By: TIBCO Software EMEA     Published Date: Jan 17, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
    
TIBCO Software EMEA
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
    
TIBCO Software GmbH
Published By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : 
ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, business technology
    
CA Technologies
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Digital experiences on mobile connections suffer from performance issues, and impatient users compound the challenges that slower, intermittent mobile connections raise. Firms need to build a new discrete delivery tier to improve users’ perception of mobile performance and drive conversion and engagement. By dynamically adjusting to context, this new delivery tier can adaptively send the right assets, optimize the sequence, and modulate streaming rich media. this report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace. this is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
mobile performance, technology, digital experience, media
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs sind die verborgene Sprache des Internets. Sie bilden die Grundlage für die digitale Transformation vieler Branchen, indem sie es Anwendungen ermöglichen, miteinander zu kommunizieren und als Backend-Services für Websites und Apps zu fungieren. Da es sich um eine dynamische Technologie handelt, die im Hintergrund arbeitet, ist es schwierig, detaillierte Informationen zur API-Landschaft zu finden. Auf Basis von Erkenntnissen unserer neuesten API-Umfrage unter 400 führenden Technologieunternehmen sowie umfassenden Branchendaten haben wir vier essenzielle Fakten zu APIs herausgearbeitet.
Tags : 
    
Akamai Technologies
Published By: Kaon     Published Date: Feb 01, 2012
As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing, demonstrations, meeting, tablets, smartphone, products, interactive, trade shows, remote meeting, laptop, touch-screen, iphone, events
    
Kaon
Published By: HPE     Published Date: Mar 23, 2015
For small and midsize businesses, the realities of a dynamic marketplace and ever-changing customer expectations pose continual challenges and opportunities. Big Data, the cloud and mobility are changing the way information moves and connections are made across the organization, offering productive potential while promising competitive advantage. But adoption of these advanced technologies will require a transformation in the capacities, functions and methods of IT. Download this white paper to learn more.
Tags : 
    
HPE
Published By: CA Technologies     Published Date: Nov 07, 2014
Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.
Tags : 
business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, business technology
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 23, 2017
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 17, 2017
Digital Transformation is the reinvention of business activities, processes, competencies, and models that fully leverage current and future digital technologies. In today’s dynamic business environment, organizations across the board are tasking IT to accelerate efforts to deliver a unique and compelling customer experience. At the same time, IT organizations are adopting new approaches in order to better serve organizational goals. Organizations are adopting cloud technology to drive agility, efficiency, and effectiveness to become more productive today, and to help ensure they can easily meet future objectives.
Tags : 
digital transformation, it transformation, customer experience, cloud technology
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 17, 2017
This paper presents the results of a three-year total cost of ownership (TCO) study comparing Dell EMC™ VxRail™ appliances and an equivalent do-it-yourself (DIY) solution of standalone server hardware and software from the VMware vSAN ReadyNode™ (hardware compatibility list) configurations. For both options, we modeled total hardware capital expense, total software capital expense and operational expense for small, medium and large clusters over a three-year period.
Tags : 
server hardware, hci, vsan readynode, hardware compatibility, hardware
    
Dell EMC
Published By: Quantum     Published Date: Mar 16, 2017
The increasing availability of 4K/ultra-high-definition (UHD) TVs, computer displays, and cameras is driving the adoption of new, higher-quality video specifications for video production. To create more immersive, engaging experiences, video producers are capturing and generating content with greater resolution, frame rates, dynamic range, color depth, and color gamut.
Tags : 
    
Quantum
Published By: Adobe     Published Date: Nov 07, 2013
Think targeting ticks customers off? Actually, it’s quite the opposite. Studies show that 41% of consumers would consider ending a brand relationship because of irrelevant messaging.1 That’s why targeted and personalized content is more important now than ever before.
Tags : 
adobe, testing and targeting, targeted content, personalized content, target segments, targeting tips, important target facts, targeted campaigns, noticeable page elements, segment preferences, alternate content, control content, testing organizations, optimal end conversion, dynamic banners, quick attraction, device usage, test designs, define segments
    
Adobe
Published By: Pega     Published Date: Apr 04, 2016
Millennials are different than any other generation before them. They are making major decisions later in life—from choosing a career, getting married, buying a home and yes, investing in life insurance. And while they are more tech savvy than their predecessors and want to make purchasing from any device of their choosing, they still value face-to-face interaction, contrary to popular belief. Insurance and financial companies need to understand the unique dynamics of the millennial generation in order to better service and exceed expectations of this growing consumer base. They need to meet their tech-savvy expectations, while also understanding Millennials still value one-to-one attention. In fact, 48% of Millennials said they would be more likely to make a speedy financial or insurance-related decision if a person who they trusted took the time to explain the benefits and risks. Download this whitepaper and learn how to better tap into the growing millennial market.
Tags : 
    
Pega
Published By: Pega     Published Date: Feb 02, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack.
Tags : 
    
Pega
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: VMWare - vFabric     Published Date: May 10, 2012
Read this paper to learn how to enable a fast, scalable, fault-tolerant distributed foundation for data management that runs dynamically across many environments.
Tags : 
vfabric, data management, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking
    
VMWare - vFabric
Published By: Red Hat     Published Date: Dec 09, 2013
Linux has proven to be a key element for successful datacenter modernization. Red Hat Enterprise Linux delivers cross-architecture standardization to a single operating system (OS) and provides a target platform for migrating mission critical workloads. For more information on Red Hat Enterprise Linux datacenter modernization watch the webinar here.
Tags : 
idc, red hat, informationweek, industry solutions, webinar, standardization, cloud computing, virtualization, os dynamics, technology reset, datacenters, market trends, it infrastructure, demarcation line, al gillen, data center
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.