line

Results 326 - 350 of 4796Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Polycom     Published Date: Sep 04, 2012
Companies can get products to market faster, have them work better, function more reliably, all with significant cost savings.
Tags : 
unified communications, manufacturing, collaboration solutions, real-time monitoring, video collaboration
    
Polycom
Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Quality matters, but despite advances made in video streaming technology, delivering great quality live video over the Internet is still not easy. There are challenges with predicting the scale and potential audience location; challenges with managing complex encoder and origin technology; challenges of delivering video securely and reliably over the Internet; and challenges of protecting live streams. Add to that the range of devices, the complexity of live event production, and the demand for HD and 4K image quality and you get a scenario that is more complicated than ever before.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Video quality can be measured in multiple ways, but the primary metrics – playback reliability and image quality – are the most critical. Get these right, and content providers are on their way to winning the loyalty of online audiences and driving monetization. Get them wrong, and viewers will defect in a heartbeat. For live-streaming events, such as sports, where there’s can’t-miss fast action, the ante is raised even higher. In this white paper, we’ll explore why online video quality matters and the specifics of how it should be measured. Get a peek “under the hood” to understand the core elements of video delivery that contribute to high-quality viewing experiences. Most importantly, see why the choice of a content delivery partner is essential to your online video success.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Online video’s explosive growth has created tremendous new opportunities for engaging customers and developing new revenue streams. But despite the fact that video is becoming increasingly central to many online business strategies, many publishers still lack the tools and data to understand what factors are important in keeping their audiences engaged. In this whitepaper, we present data from the first ever large-scale scientific study that shows how video performance quality affects viewer behavior. The results help to shed light on important considerations that can help businesses craft a successful online video strategy – boosting their business bottom line and ultimately reaping the rewards of online video’s vast potential.
Tags : 
data optimization, audience engagement, business strategies, customer engagement, business potential
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
There are many reasons why bots pose the most complicated threat to your online business - access to pools of IP addresses, ability to stay under the radar, highly persistent. Read what you need to know to stay in the know.
Tags : 
credential stuffing, ip security, threat protection
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: IBM APAC     Published Date: Jul 09, 2017
This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : 
customer, ecm, enterprise content management, customer experience
    
IBM APAC
Published By: Amazon Web Services     Published Date: Apr 27, 2018
One of the value propositions of an Internet of Things (IoT) strategy is the ability to provide insight that was previously invisible to the business. But before a business can develop a strategy for IoT, it needs a platform that meets the foundational principles of an IoT solution. Amazon Web Services (AWS) believes in some basic freedoms that are driving organizational and economic benefits of the cloud into businesses. These freedoms are why more than a million customers already use the AWS platform to support virtually any cloud workload. These freedoms are also why AWS is proving itself as the primary catalyst to any Internet of Things strategy across commercial, consumer, and industrial solutions. This paper outlines core tenets that should be considered when developing an IoT strategy, the benefits of AWS in that strategy and how the AWS cloud platform can be the critical component supporting those core tenets.
Tags : 
    
Amazon Web Services
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design
    
Cisco
Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats
    
Cisco
Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 29, 2016
Extended Validation (EV) certificates were launched in January 2007. EV certificates are an effort to define a standard for a high assurance SSL/TLS certificate and create a new trust foundation. The EV Guidelines are managed by the leading browsers and certification authorities (CAs) through the CA/Browser Forum, and have been since launch.
Tags : 
extended validation certificates, ssl, security, ssl certificate, ev certificate, ev guidelines
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
ssl, ssl certificate, lifecycle management process, ssl digital certificate
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device, best practice
    
Citrix Online
Published By: ShoreTel     Published Date: Oct 26, 2012
Today's IT investments require bottom-line, quantifiable truths and Unified communications (UC) is no exception. This whitepaper covers best practice tips on building a comprehensive business case for UC systems.
Tags : 
shoretel, unified communications, return on investment, uc solution, productivity, enterprise applications, business technology
    
ShoreTel
Published By: ShoreTel     Published Date: Oct 26, 2012
Compared with Cisco products, ShoreTel UC can offer numerous advantages, including streamlined deployment and management, easier scalability, and a significantly lower total cost of ownership (TCO).
Tags : 
shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution, business technology
    
ShoreTel
Published By: ShoreTel     Published Date: Oct 26, 2012
Back in the days of wireline telephony, when all phone calls went over the Public Switched Telephony Network (PSTN), businesses would purchase "trunks" -dedicated lines or a bundle of circuits - from their service provider.
Tags : 
shoretel, sip trunking, best practices, pstn, public switched telephony network, trunks, circuits, roi, return on investment, business technology
    
ShoreTel
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.