RecruitingBlogscom

Follow Us:

 

overview

Results 451 - 475 of 679Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: IBM     Published Date: Oct 06, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
cloud integration, b2b, value chain, cloud services, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index, security
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Understanding the Deep Web and how it can endanger your organization. This paper offers a high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P.
Tags : 
ibm, security, mainstream media, deep web, dark web, i2p, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, threat, data, security
    
IBM
Published By: IBM     Published Date: Jan 21, 2016
Join us on this TechByte session, where we will provide an overview of the most common DevOps scenarios we come across, as well as highlight characteristics and benefits of each of these lifecycle patterns.
Tags : 
ibm, devops, middleware, lifecycle patterns, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Feb 29, 2016
In this report, Forrester Research discusses how to transform your infrastructure to better handle today’s digital technologies.  
Tags : 
ibm, forrester, infrastructure, project services, agile, networking, security, wireless
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management
    
IBM
Published By: IBM     Published Date: Apr 21, 2016
"Read this white paper for an overview of the B2B integration landscape—challenges, opportunities and leading strategies—and a summary of the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM cloud to: - Reduce TCO and internal resource requirements - Increase profitability and competitive differentiation - Accelerate B2B collaboration to achieve a competitive advantage"
Tags : 
ibm, b2b, cloud integration, collaboration, business technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
This webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance, hardware, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business technology, hybrid cloud, hybrid, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This smartpaper presents an overview of the B2B integration landscape—its challenges, opportunities and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM cloud to excel amid escalating global complexity, demand volatility and new customer requirements.
Tags : 
ibm, b2b, b2b cloud integration, b2b integration, cloud, integration, smart paper, knowledge management
    
IBM
Published By: IBM     Published Date: Nov 07, 2016
Is your software defined infrastructure (SDI) for high performance computing (HPC) and big data analytics meeting the needs of your growing business? Would you like to know how to justify the switching cost from unsupported open source software to a commercial grade SDI that ensures your resources are more effectively used cutting down time to market? This webcast will give you an overview of the true costs of building out and managing a HPC or Big Data environment and how commercial grade SDI software from IBM can provide a significant return on investment.
Tags : 
ibm, platform computing, software defined infrastructure, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
IBM Transformation Extender is IBM's new modular transformation solution, encompassing IBM's key transformation tools WebSphere Transformation Extender and Standards Processing Engine. Part of a series of 5 videos by IBM Software Development Manager Mark Conner, this video provides an overview of IBM Transformation Extender.
Tags : 
ibm, commerce, b2b integration, ibm transformation extender, transformation solution, software development, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
The new IBM MQ Appliance M2001 provides an optimized version of IBM MQ V8 that runs in a hardware appliance. IBM MQ provides universal messaging that allows applications, systems and services to connect and exchange information securely, reliably, rapidly and simply. Offering MQ capability in hardware appliances, additional features are provided, as well as some appliance benefits. This on-demand webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance m2001, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 13, 2018
Get an overview of enterprise grade business critical messaging and its various deployment options in private, public or hybrid cloud.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
IBM Security and Ponemon Institute are pleased to release the 2017 Cost of Data Breach Study: Global Overview. According to our research, the average total cost of data breach for the 419 companies participating in this research decreased from $4.00 to $3.62 million The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased from $158 in 2016 to $141 in this year’s study. However, despite the decline in the overall cost, companies in this year’s study are having larger breaches. The average size of the data breaches in this research increased 1.8 percent
Tags : 
data breach, security, research study, data trends
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Overview of unified endpoint management (UEM)–why it’s necessary and addresses complex problems encountered by IT in the modern enterprise
Tags : 
uem, modern enterprise, unified endpoint management
    
Group M_IBM Q1'18
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This short eBook provides a quick overview on specific use cases related to cloud application development such as Development and Testing in the Cloud, Extending SaaS Apps and Cloud Native Development.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: SWsoft     Published Date: Aug 21, 2009
This joint Intel white paper explores how to address virtualization in an environment with high I/O. The paper includes a technology overview, network concerns and explains how Virtuozzo and Intel are well suited for the high I/O environment.
Tags : 
virtualization, network management, i/o, input/output, high i/o, intel, servers, server virtualization
    
SWsoft
Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: Marketo     Published Date: Sep 24, 2009
Get a complete market overview and discover the key capabilities of leading systems. With 18 vendor comparisons, this report also features recommendations for getting the most value out of a lead management automation solution.
Tags : 
b2b, automation, forrester, marketo, lma, lead management, sales leads, demand generation
    
Marketo
Published By: Konnetic     Published Date: Aug 05, 2010
A technical overview of the Session Initiation Protocol standard.
Tags : 
sip, session initiation protocol, konnetic
    
Konnetic
Published By: Konnetic     Published Date: Aug 08, 2010
A technical overview of the Session Description Protocol standard.
Tags : 
sdp, session description protocol, konnetic
    
Konnetic
Published By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : 
microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
    
SilverSky
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top