RecruitingBlogscom

Follow Us:

 

overview

Results 351 - 375 of 664Sort Results By: Published Date | Title | Company Name
Published By: Pentaho     Published Date: Jan 16, 2015
If you’re considering a big data project, this whitepaper provides an overview of current common use cases for big data, from entry-level to more complex. You’ll get an in-depth look at some of the most common, including data warehouse optimization, streamlined data refinery, monetizing your data, and getting a 360 degree view of your customer. For each, you’ll discover why companies are investing in them, what the projects look like, and key project considerations, including tools and platforms.
Tags : 
big data, nosql, hadoop, data integration, data delivery, data management, data center
    
Pentaho
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security
    
CA Technologies
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
This report provides a detailed overview of the Linux container ecosystem. It explains the various components of container technology and analyzes the ecosystem contributions from companies to accelerate the adoption of Linux-based containers.
Tags : 
dell cloud marketplace, linux container ecosystem, cloud services, cloud computing, cloud
    
Dell Cloud Marketplace
Published By: Cisco     Published Date: Dec 23, 2014
Download the Cisco Mobility Solution Overview to get information on providing highly secure mobile access anytime, anywhere, building a unified platform for mobile applications, and improving relationships with customers and employees through new mobile experiences.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: HP     Published Date: Dec 05, 2014
How the New Style of IT changes the rules of business. The balancing act - What IT environment should be enabled to achieve the business outcomes you desire - While IT environments are in a rapidly changing landscape
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud, storage, data, speed, software
    
HP
Published By: EMC Corporation     Published Date: Dec 01, 2014
This document provides a detailed overview of the ViPR Services architecture. ViPR Services is a geo-scale cloud storage platform that delivers cloud-scale storage services, global access and operational efficiency at scale.
Tags : 
hyperscale storage platform, infrastructure, geo-scale cloud storage, operational efficiency, data center
    
EMC Corporation
Published By: IBM     Published Date: Nov 22, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
b2b, cloud integration, value chain optimization, cloud services, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management, business technology
    
IBM
Published By: IBM     Published Date: Nov 19, 2014
IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS, for individuals and teams building mobile and cloud applications (‘systems of engagement’) that enable teams to shrink the application delivery cycle time, and consistently deliver software with speed, quality and accuracy. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.
Tags : 
ibm, bluemix, devops, collaborative development, productivity, networking, software development, it management, business technology
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
IBM SPSS Modeler is a powerful, versatile data and text analytics workbench. Learn how you can build accurate predictive models quickly and intuitively, without programming. So you can use data to understand the current state of your organization and get a view into the future.
Tags : 
ibm, webinar, business intelligence, entity analytics, modeler, automated modeling, predictive intelligence, building models, spss modeler gold, data management
    
IBM
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: Oracle     Published Date: Oct 23, 2014
Learn how DMPs can help you achieve unprecedented audience targeting precision and scale across all marketing programs. This whitepaper delivers an in-depth overview of DMPs and provides actionable, useful information for marketers and agencies hoping to implement a DMP to improve programme outcomes.
Tags : 
demystified, audience, targeting, scale, marketing, programs, actionable, agencies, outcome, crm & customer care, marketing research
    
Oracle
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Yext     Published Date: Oct 13, 2014
This whitepaper aims to help marketers understand how to use Google My Business Locations with an overview of the offering and a list of key things to know as you adjust to this new tool.
Tags : 
yext, google, search marketing, geo marketing, google search, google my business, online marketing, geo marketing cloud, emerging marketing, internet marketing
    
Yext
Published By: Marketo     Published Date: Oct 08, 2014
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
marketo, enterprise marketing, lead conversion, marketing roi, emerging marketing
    
Marketo
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec
Published By: IBM     Published Date: Oct 07, 2014
Hurwitz & Associates provide insight into the journey to enterprise cloud computing from a quality of service perspective provide an overview of what capabilities IBM Power Systems cloud solutions offer to support customers.
Tags : 
ibm, cloud computing, enterprise cloud computing, ibm power systems, cloud solutions
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
cloud integration, b2b, value chain, cloud services, it management, knowledge management
    
IBM
Published By: ReadyTalk     Published Date: Sep 24, 2014
Learn how ReadyTalk Web Conferencing can make your next online meeting more enjoyable. From our amazing customer service to our simple interface, just wait until you see what your online meetings have been missing.
Tags : 
prospect, integrate, pipeline, faster, industry, eloqua, webinar, promote, event, speed, behavior, services, leverage, strength, leads, buying, automation, crm & customer care, sales
    
ReadyTalk
Published By: Brightcove     Published Date: Sep 17, 2014
OVERVIEW: THE STATE OF B2B CONTENT MARKETING IN NORTH AMERICA
Tags : 
content marketing, content marketing tactics, documented content strategy, b2b trends
    
Brightcove
Published By: Brightcove     Published Date: Sep 17, 2014
OVERVIEW: THE STATE OF B2B CONTENT MARKETING IN NORTH AMERICA
Tags : 
content marketing, content marketing tactics, documented content strategy, b2b trends
    
Brightcove
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Published By: Vision Solutions     Published Date: Aug 26, 2014
This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.
Tags : 
systems migrations, business downtime, system migration, business continuity, vision solutions
    
Vision Solutions
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top