RecruitingBlogscom

Follow Us:

 

overview

Results 1 - 25 of 669Sort Results By: Published Date | Title | Company Name
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies, it management
    
BLADE Network Technologies
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : 
reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers
    
ServiceSource
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: IBM     Published Date: Oct 13, 2015
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, ibm managed security services, cyber security, data, threat, malware, index, security
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, threat, data, security
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cyber security, overview, threats, security, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security, knowledge management
    
IBM
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: IBM     Published Date: May 12, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
retail solutions, merchandising, customer experience, supply networks, operations, digital commerce, e-commerce, website development
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence, enterprise applications, business technology
    
IBM
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
Published By: Secureworks     Published Date: Oct 04, 2017
Secureworks has been tracking cybercrime activity for more than 10 years and, as we monitor this activity to protect our clients, we collect a large amount of data on both the criminals and their infrastructure and systems. This annual report presents an overview of the cybercrime landscape and trends we observed primarily from the period of mid-2016 to May 2017, in addition to a handful of other trends ranging from 2015 to 2016.
Tags : 
    
Secureworks
Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker, email marketing, emerging marketing
    
eDataSource
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed
    
Intel
Published By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : 
intel, 3rd generation, core vpro
    
Intel Corp.
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch
Published By: CodeBaby     Published Date: Nov 27, 2012
Healthcare organizations are integrating intelligent virtual assistants to enhance online experience and reduce costs. This guide overviews the capabilities and benefits of using virtual assistants to engage, optimize, and complement existing service channels.
Tags : 
online self-service, customer experience, customer service, intelligent virtual assistants, conversion optimization, tech support, crm, web self-service
    
CodeBaby
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability
    
Scalebase
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top