Skip to main content
 

networks

Results 101 - 125 of 1783Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Nov 07, 2014
Fournissez de nouveaux services métier sécurisés et améliorez l’expérience client. De plus en plus d’entreprises adoptent le Cloud, la technologie mobile et les réseaux sociaux pour élargir leurs activités, créer de nouveaux canaux commerciaux et améliorer les services aux clients.
Tags : 
accelerate service engagement, improve customer engagement, cloud, social networks, secure services, improve the customer experience
    
CA Technologies
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Polycom     Published Date: Sep 04, 2012
As new visual communication applications are created to harness the power of next-generation broadband, a new model for government is emerging - one that will bring interpersonal interaction into cyberspace.
Tags : 
video collaboration, government, broadband networks, video conferencing, multi-point video, point-to-point video, telepresence, tele-services
    
Polycom
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: Cisco     Published Date: Oct 08, 2015
Businesses looking to transition to 802.11ac Wave 2 should fully understand the new technology’s requirements for the wired network and choose a solution provider that can minimize the disruption to the business.
Tags : 
wi-fi networks, cisco, wifi speed
    
Cisco
Published By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Keen and current language skills and attention to detail, as well as first-hand knowledge of cultural innuendo, local customer and market expectations would be essential. Read this case study to find out more.
Tags : 
jonckers, language and culture, cultural innuendo, local customer, translation
    
Jonckers Translation & Engineering
Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues, ad targeting, target audiences, social media audience, spend forecast, social media, internet marketing
    
Adobe
Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce, enterprise networks, sensitive documents, productivity ecosystem, lockdown, document solutions, cloud, cloud-based, hybrid it, enterprise mobility
    
Adobe
Published By: Silver Peak     Published Date: Sep 26, 2016
In this eGuide, Network World and Computerworld explore the trends in software-defined networks and offer in-depth advice on addressing the key limitations of today’s VPNs. See how software-defined WANs could help your company maximize its investments in the cloud and address today’s hyper-connected, cloud-based environments demanding greater agility and efficiency.
Tags : 
sd-wan, networking, it management, network architecture, silver peak
    
Silver Peak
Published By: SAP     Published Date: Sep 19, 2017
SAP S/4HANA Retail for merchandise management is at the core of a comprehensive suite of retail offerings designed to help retailers meet the demands of a digital economy. It supports retail core processes end to end, starting with master data down to point-of-sales (POS) connectivity. It allows insights into operational retail data, empowering users with contextual, real time information for faster and better decision making. Processes can easily be extended to connect to business networks to form a digital ecosystem and collaboratively drive business model improvements. Equipped with a simple and intuitive user experience, the solution offers better support for headquarters users as well as store associates to drive compelling customer experiences.
Tags : 
master data, management, retail price, merchandise buying, collaboration, vendor agreement, forecasting, sap
    
SAP
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device
    
Symantec.cloud
Published By: Oracle Corp     Published Date: Oct 02, 2012
With four out of five Americans now using social networks, the era of social networking clearly has arrived, creating significant implications for enterprises.
Tags : 
social media, social networking, enterprises, customer service. customer care, crm
    
Oracle Corp
Published By: Cisco     Published Date: Mar 17, 2017
There’s a war being waged on all our networks, and security researchers around the world are on the front lines. Here’s the inside story of how our elite security-research team neutralized one of the biggest threats in years.
Tags : 
cyersecurity, security, treat and vulnerability management, networks, cybercriminals, attacks
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Oracle     Published Date: Aug 08, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: May 04, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: May 04, 2018
PwC surveyed 235 IT leaders and interviewed another 35 from large, medium, and small enterprises to understand the buying decisions of IT leaders, across a wide variety of networking components (i.e., switches, SDN, and infrastructure monitoring solutions) within the data center. This report highlights the survey and interview insights to help Enterprise IT leaders understand the trends and implications of multi cloud environments.
Tags : 
    
Juniper Networks
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Juniper Networks     Published Date: Oct 25, 2017
As IT becomes the cloud, and ever more central to business success, projects to transform the IT systems, and more specifically the data center, have become strategic and a competitive differentiator. A crucial piece of the data center transformation puzzle, and one which is too often left until the end, is the network. As the central nervous system of the data center, its transformation must be an integral part of the entire data center transformation project.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
THE FUTURE IS WHAT YOU MAKE IT. Juniper Networks creates innovative technologies to help customers connect their ideas, compete, and thrive in an ever-changing world. Partner with Juniper Networks and start creating the road map to your future-ready network. VISIT JUNIPER.NET/UNITE TO START LOOKING TOWARD THE FUTURE, TODAY.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
Supporting multiple internal clients and all of their requirements for testing and production networks in more than 1,000 cities around the world—these are the unrelenting challenges for the 12 brands that comprise eBay Classifieds Group. Activating new platforms and features can take a lot of time; with the Juniper solution, turnaround time has been reduced to a few hours—sometimes less—which helps eBay Classifieds turn innovation into a real competitive advantage every single day.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.