next gen

Results 126 - 150 of 874Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 06, 2015
Far from being out of date, mainframes are used around the world to build robust, trusted clouds. Increasingly, organizations are turning to cloud computing to improve their IT responsiveness and to reduce costs. And for enterprise workloads, which require highly reliable and secure platforms to meet demanding service levels, many companies are building their clouds using a mainframe.
Tags : 
ibm, cloud computing, cost reduction, next generation mainframe
    
IBM
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
When Hewlett-Packard set out to develop the next generation of its popular ProLiant server family, a key objective was to dramatically reduce the burden of manag-ing the servers-both individually and in aggregate across the data center.
Tags : 
intel, proliant, gen8, mgmt, efficiency, business technology
    
Sponsored by HP and Intel® Xeon® processors
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : 
configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
    
Tail-f Systems
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, business technology
    
Intralinks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : 
palo alto, botnets, firewall, malware, business technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Introducing WildFire: the Next-Generation of Malware Defense
Tags : 
palo alto, malware, wildfire, business technology
    
Palo Alto Networks
Published By: Extreme Networks     Published Date: Feb 05, 2015
A smarter network operating system that delivers plug-and-play, resilient, secured connectivity.
Tags : 
app networking, network operating system, secured connectivity, network switches, network infrastructures, it management, knowledge management, data management
    
Extreme Networks
Published By: HERE Technologies     Published Date: Sep 27, 2018
Location has become paramount to building new apps, services, experiences and business models. If data is the new oil, then location is the crude oil. This is why most of the top location platform players have been developing technologies to power next-generation autonomous mobility systems. And the “richness” of location data and real-time intelligence are becoming strong monetization opportunities. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors, including Google, TomTom and Mapbox. Learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Most IT professionals today recognize that enterprise IT will be hybrid in the future. To provide the optimal foundation for each workload being deployed, the hybrid IT environment will include cloud-based infrastructures—from multiple providers—co-existing alongside infrastructure within the enterprise data center or a hosted environment. But not all hyperconverged solutions yield the same results. The right hyperconverged infrastructure can meet your IT needs both today and well into the future. In this paper, we will talk about where your data center needs to be in the next five years to meet changing business demands, and how the roles of IT professionals will evolve. We will also review “hyperconvergence” models, and how they can best meet your IT needs both today and in the future, as well as the benefits you can expect along the way. Finally, we discuss what to look for in the right hyperconverged provider, who will position your IT department for success.
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Jan 06, 2016
Replay of the September 24, 2015 webcast on API Economy & API Management with speaker George Nealon, IBM API Economy and Integration Sales Manager Worldwide.
Tags : 
ibm, digital, business, cloud strategy, applications, data. integration
    
IBM
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, business technology
    
IBM
Published By: NextGen     Published Date: Jan 29, 2015
Learn how Mirth’s HIE solution can support your growth, ease data sharing, and help you reach your goals. In this case study, you'll learn why the Chesapeake Regional Information System for our Patients (CRISP) moved to Mirth® solutions.
Tags : 
mirth, hiw, total cost, erp, system, information, connect, technology, results, application, customization
    
NextGen
Published By: Infor     Published Date: Apr 01, 2010
This report identified how top performing organizations leverage and execute multichannel marketing campaigns. The findings demonstrate how Best-in-Class organizations are leveraging a collaborative cross-channel approach to extract maximum value and marketing efforts.
Tags : 
infor, cross-channel campaign management, multichannel marketing, knowledge management, performance management, metrics
    
Infor
Published By: ServiceNow     Published Date: Jan 03, 2017
The scope and value that modern IT service delivery provides a business is increasing dramatically, according to a new research reportfrom Enterprise Management Associates (EMA). And yet in some organizations legacy ITSM systems contribute significantly to reduced credibility for IT departments who fail to integrate with and support important business concerns. This lack of modern IT service delivery creates multiple issues for the enterprise, including: Increasing divergence of IT and business performance Rising costs due to service delivery complexity Inability to measure and protect a business from potential risks Informed by extensive research and two compelling deployment narratives, this report examines what EMA calls “next-generation ITSM” and its contributions toward optimizing changing IT and business requirements. EMA contrasts these advances with the risks of staying with legacy ITSM models and then evaluates and itemizes the risks of “doing nothing” by allowing legacy ITS
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management
    
ServiceNow
Published By: Cisco     Published Date: Nov 30, 2016
CureSeq’s mission is to “revolutionize next-generation sequencing in the oncology space.” To accomplish this, the company must reach as many researchers and clinical oncologists as possible to help them identify and treat cancer. CureSeq, whose work has been published in scientific journals, needed a reliable online meeting solution to communicate effectively with critical stakeholders around the world. After struggling with several other solutions, the company selected Cisco WebEx to take advantage of the platform’s presentation and document-sharing capabilities and audio quality.
Tags : 
    
Cisco
Published By: IBM     Published Date: Jan 21, 2016
Collaborate with your customers to architect next generation customer experiences across physical and digital worlds
Tags : 
ibm, customer experience, collaboration, business technology
    
IBM
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
Next generation security for financial services.
Tags : 
palo alto, financial services, cyber security, data security
    
Palo Alto Networks
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
it management, business technology
    
CarbonBlack
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.