Skip to main content
 

high volumes

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: Ixaris OTA     Published Date: Jan 25, 2018
Travel agents, tour operators and travel wholesalers are typically spending thousands in unnecessary costs each year. And in a fiercely competitive market operating on high volumes and low margins, ensuring efficiency with sales and purchasing systems is no easy task. Especially when it comes to payments. If you want to find out where you’re losing money, how efficient your platform really is and the simple way to eliminate these costs, read this white paper. It explores the top three areas where you could be overspending. And it reveals the statistics behind your unnecessary costs – giving you the information you need to save money and drive efficiency.
Tags : 
    
Ixaris OTA
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Ixaris     Published Date: Jan 25, 2018
Why travel agencies are losing 20% of their profits to unnecessary costs. Travel agents, tour operators and travel wholesalers are typically spending thousands in unnecessary costs each year. And in a fiercely competitive market operating on high volumes and low margins, ensuring efficiency with sales and purchasing systems is no easy task.
Tags : 
    
Ixaris
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Compression algorithms reduce the number of bits needed to represent a set of data—the higher the compression ratio, the more space this particular data reduction technique saves. During our OLTP test, the Unity array achieved a compression ratio of 3.2-to-1 on the database volumes, whereas the 3PAR array averaged a 1.3-to-1 ratio. In our data mart loading test, the 3PAR achieved a ratio of 1.4-to-1 on the database volumes, whereas the Unity array got 1.3 to 1.
Tags : 
    
Dell PC Lifecycle
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge It is not uncommon for SAP system copies, including any post-editing, to take several days to complete. Meanwhile, testing, development and training activities come to a standstill, and the large number of manual tasks in the entire process ties up highly skilled SAP BASIS staff. Opportunity Enterprises are looking to automation as a way to accelerate SAP system copies and free up staff. However, this is only one part of the problem: What further complicates the system copy process is the need to safeguard sensitive data and manage huge data volumes while also ensuring that the data used in non-production systems adequately reflects the data in production systems so the quality of development, testing and training activities is not compromised. Benefits This white paper explains how a considerable portion of the SAP system copy process can be automated using the CA Automic Automated System Copy for SAP solution and SNP T-Bone, helping enterprises become more agile.
Tags : 
    
CA Technologies_Business_Automation
Published By: HERE Technologies     Published Date: Mar 28, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 11, 2019
On-demand services that transport people in high volumes over short distances have a crucial role to play in changing urban transportation. New technology and data bring a wealth of opportunity for new mobility service providers to optimize, keep customers satisfied and achieve the operational superiority for which they’re all striving. This ebook looks at the critical role location intelligence can play in helping on-demand organizations make that extra drop-off each hour. By reading this ebook, you will discover: - How accurate location, asset and routing data can aid fleet optimization and improve service response times - How accurate pick-up and trip destination ETAs ensure time isn’t wasted connecting users with drivers - How services can calculate the fastest possible route between multiple waypoints to maximize journey efficiency
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Published By: IBM Watson Health     Published Date: Nov 30, 2015
The transition from fee-for-service to value-based reimbursement has been a challenge for many providers. Financial incentives that favored high service volumes must now be re-focused to accommodate alternative models such as bundled payments and accountable care organizations (ACOs).
Tags : 
ibm, watson health, phytel, population, health management, accountable care organizations, finances, value-based, finance, information technology
    
IBM Watson Health
Published By: HP Inc.     Published Date: Jul 17, 2017
HP builds large-format inkjet printers for corporate clients, print service providers and others with high print volumes. Purchasing a printer in this category is an important decision. HP’s latex technology offers excellent quality and reliability and, with the right print volume, outstanding economics. The engineers who build HP’s 2D printers began thinking about how they could use 3D printing to help reduce costs and innovate more quickly.
Tags : 
3d printing, 3d design, digital materials, 3d prototyping, product design, print services, hp technology, printer, print solution
    
HP Inc.
Published By: Here Technologies     Published Date: Mar 29, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: PitneyBowes     Published Date: Sep 22, 2010
Focus on your most critical, high-value mail while streamlining the delivery of lower-value mail. As a result, your mail management volumes stay more in line with your budget.
Tags : 
pitney bowes precision mail services, simplified delivery, mailing services, postage, mail management
    
PitneyBowes
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organizations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: -Terminate Zombie Assets -Rightsize EC2 Instances & EBS Volumes -Upgrade instances to the latest generation -Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas, iocs, evalueserve, real-time siem
    
McAfee
Published By: Silverpop     Published Date: Feb 04, 2013
High-tech marketers have a specific set of challenges which include driving high volumes of leads through thought leadership, complex sales cycles and a number of decision makers. Learn how to see exactly when a lead is ready with Silverpop.
Tags : 
social media, sales
    
Silverpop
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.