Skip to main content
 

media

Results 251 - 275 of 2253Sort Results By: Published Date | Title | Company Name
Published By: Salesforce Commerce Cloud     Published Date: Sep 13, 2016
What makes millennial customers loyal? Reaching millennials isn’t your biggest retail challenge, it’s retaining them. 38% of businesses say they’re agile enough for millennials. How do you compare? Find out by downloading our latest research paper.
Tags : 
demandware, social, millennials, impressions, social media, social influence, traditional marketing, retail
    
Salesforce Commerce Cloud
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: RedHat     Published Date: May 10, 2017
By establishing an environment based on an enterprise-ready, open-source operating system — Red Hat® Enterprise Linux® — and a hardware platform based on Intel® architecture, organisations can immediately obtain benefits by migrating select workloads to a standardized environment. More ambitious modernization efforts can yield additional benefits, but the heart of every project should be a solid, proven foundation.
Tags : 
red hat, linux, enterprise linux, open source, open source platform
    
RedHat
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: -Discover the 3 critical steps to building an effective vulnerability remediation plan -Explore the pitfalls of popular prioritization approaches -Learn next steps you can take today to dramatically reduce the list of vulnerabilities you need to remediate If you’re looking for answers to questions like “Where should we prioritize based on risk?” and “Which vulnerabilities are likeliest to be exploited?” this quick read is an excellent way to get started. Download the free ebook now."
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's what’s expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the “How to Prioritize Cybersecurity Risks: A Primer for CISOs” ebook now to learn: -How to adopt a risk-based approach to prioritization – beyond what CVSS scores tell you -Why visibility into all your company’s IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from “How many vulnerabilities do we have?” to “Which vulnerabilities pose the greatest risk?”"
Tags : 
    
Tenable
Published By: Red Hat     Published Date: Feb 25, 2019
Linux se ha convertido en el sistema operativo estándar para la infraestructura de cloud y en el medio de entrega preferido para las aplicaciones modernas. Esto se debe, en parte, a que es un entorno fiable que ofrece escala, seguridad y un sólido soporte de aplicaciones. Red Hat Enterprise Linux amplía esta confianza y credibilidad mediante la oferta de un entorno empresarial reforzado y compatible, que ofrece costes operativos menores, mayor fiabilidad y disponibilidad, y mejor escalabilidad. Esto se traduce en un mejor retorno sobre la inversión para nuestros clientes empresariales. En el caso de IDC, "El valor comercial de Red Hat Enterprise Linux", se entrevistó a 12 organizaciones para conocer cómo están usando Red Hat Enterprise Linux para respaldar sus operaciones comerciales. Estas organizaciones informaron que Red Hat proporciona un entorno operativo rentable, eficiente y fiable. Se puede ganar mucho con Red Hat Enterprise Linux: Promedio de retorno sobre la inversión en
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
En este informe de analistas de IDC, descubrirá el desafío que supone para los clientes el hecho de encontrar el equilibrio entre la inversión en los centros de datos existentes y la adopción de técnicas de implementación y desarrollo de las nuevas tecnologías. IDC también analiza cómo, mediante la estandarización y la modernización, las empresas pueden optimizar sus operaciones, experimentar mejoras considerables en la productividad de los desarrolladores y la agilidad operativa, así como reducir los costos de gestión del ciclo de vida. Todo ello gracias a una infraestructura que admite las cargas de trabajo existentes y futuras.
Tags : 
    
Red Hat
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
La transformación digital se está produciendo cada vez en más organizaciones y las pequeñas y medianas empresas no pueden permitirse el lujo de ignorarla. En el caso concreto de RR. HH., las barreras para el éxito de la transformación son las personas, el conocimiento y la cultura. Guste o no, el negocio confiará en que el departamento de RR. HH. apoye estas iniciativas y haga que esto suceda desde la base de empleados.
Tags : 
    
SAP SuccessFactors
Published By: IBM APAC     Published Date: Aug 25, 2017
Consumerization of IT and the Internet of Things (IoT) are revolutionizing how people live. Users are increasingly becoming accustomed to instant gratification when using technology in their personal lives, whether for gaming, shopping or managing their daily activities. And they want the same kind of immediate service when they go to work. To address this expectation, IT support needs to adapt, evolve and even revolutionize itself or become outdated. In short, IT support must reinvent itself into a friendly, proactive service that is tied directly to a business’ profitability.
Tags : 
cognitive it support, transactions, system of engagement, soa, omnichannel support, ibm
    
IBM APAC
Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
In today’s world, your firewall must be able to take immediate action based on known or emerging intelligence.
Tags : 
juniper, cloud, data center, security intelligence
    
Juniper Networks
Published By: Intel     Published Date: Jun 07, 2017
Using the Integrated Analytics Hub, data analytics projects have already accounted for an estimated quarterly savings on marketing digital-media expenditures of approximately USD 170,000. Download this white paper to find out more.
Tags : 
intel, analytics, data, data analytics, data science
    
Intel
Published By: Butler Technologies     Published Date: Jul 02, 2018
A Next-Generation Approach to Attack Remediation
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Workday Spain     Published Date: Feb 04, 2019
Las empresas medianas con limitaciones de presupuesto pueden optimizar el uso de su software de recursos humanos con tecnología cloud moderna. Gracias a las innovaciones de la tecnología cloud, las empresas pequeñas disponen de una alternativa útil para continuar su desarrollo y mantener su competitividad. Descargue el documento técnico para averiguar cómo puede conseguirlo.
Tags : 
workday, workforce technology, digital strategy
    
Workday Spain
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Dell EMC     Published Date: Apr 18, 2017
Read this ESG report to find out what companies are more likely to buy CI/HCI solutions from the combined Dell EMC.
Tags : 
dell emc, cloud, hyperconverged solutions, hyperconvergence
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
Read this ESG report to find out what companies are more likely to buy CI/HCI solutions from the combined Dell EMC.
Tags : 
dell emc, cloud, hyperconverged solutions, hyperconvergence
    
Dell EMC
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. New Possibilities Outside. Learn more about Dell EMC enterprise solutions in collaboration with Intel® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Dec 15, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
Dell and VMWare
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.