Skip to main content
 

domain

Results 26 - 50 of 265Sort Results By: Published Date | Title | Company Name
Published By: Dell DnCP     Published Date: Mar 06, 2019
À l’avenir, dans le monde professionnel, il sera de plus en plus question d’offrir des expériences de qualité supérieure à la fois aux employés et aux clients. Mettre à disposition des effectifs une meilleure technologie, notamment des écrans adaptés, est l’une des façons d’améliorer ces experiences. Nous offrons un large éventail d’écrans adaptés aux besoins et aux budgets métiers variables. Quel que soit votre domaine d’activité, Dell vous aidera à être plus productif.
Tags : 
    
Dell DnCP
Published By: Genesys     Published Date: Feb 12, 2019
Sur un marché des centres de contacts cloud aussi vaste que changeant, il est souvent difficile de trouver la solution adaptée à votre entreprise. C’est pourquoi Ovum a conçu un outil intitulé « Matrice décisionnelle Ovum : comment sélectionner une solution de centre de contacts multicanal dans le cloud (édition 2017-18) ». Ce document a pour but de dresser un comparatif des grands acteurs de ce marché sur la base de leurs fonctions de routage des appels voix et de service client multicanal. Vous y découvrirez comment Genesys s’est imposé parmi les leaders grâce à des solutions pour les entreprises de toutes tailles et de tous secteurs à travers le monde. Au sommaire de la Matrice décisionnelle Ovum : Comparatif des plateformes technologiques des différentes solutions de centre de contacts dans le cloud Évaluation des capacités des fournisseurs dans les domaines de la gestion des interactions clients multicanaux et de l’analytique des données clients et d’entreprise Identification
Tags : 
    
Genesys
Published By: Oracle     Published Date: Jan 28, 2019
Traditionally, the best practice for mission-critical Oracle Database backup and recovery was to use storage-led, purpose-built backup appliances (PBBAs) such as Data Domain, integrated with RMAN, Oracle’s automated backup and recovery utility. This disk-based backup approach solved two problems: 1) It enabled faster recovery (from disk versus tape) 2) It increased recovery flexibility by storing many more backups online, enabling restoration from that data to recover production databases; and provisioning copies for test/dev. At its core, however, this approach remains a batch process that involves many dozens of complicated steps for backups and even more steps for recovery. Oracle’s Zero Data Loss Recovery Appliance (RA) customers report that total cost of ownership (TCO) and downtime costs (e.g. lost revenue due to database or application downtime) are significantly reduced due to the simplification and, where possible, the automation of the backup and recovery process.
Tags : 
    
Oracle
Published By: Visier     Published Date: Jan 25, 2019
John Schwarz founded Visier to address what he saw as the major failing of business intelligence and big data analytics. He had a front row seat in this market while leading Business Objects, the largest global business intelligence provider (acquired by SAP). John and co-founder Ryan Wong’s vision was to completely reinvent the approach to analytics, providing instant and complete, domain-specific applications to business leaders, answering their important strategic questions and leading them to adopt best management practices. Their applied business analytics project is working. Today, more than a hundred blue chip companies have selected Visier as their people strategy platform and are achieving incredible results. And that’s just the beginning.
Tags : 
    
Visier
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Nov 02, 2018
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 02, 2018
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. In fact, respondents to ESG’s ongoing research consistently cite cost reduction as one of the top business drivers affecting their IT spending. When asked in a research survey how their organizations intended to contain costs in 2017, 27% of respondents said that they would be purchasing new technologies with better ROI. 1
Tags : 
    
Dell
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Anaplan     Published Date: Sep 26, 2018
Les entreprises modernes doivent évoluer à un rythme sans précédent. Certaines peuvent réagir rapidement, d’autres doivent lutter. D’où la question : pourquoi certaines entreprises réussissent, mais pas d’autres ? La Harvard Business Review a interrogé 385 lecteurs représentant des entreprises de plus de 500 employés à propos des défis rencontrés dans le domaine de la planification, ainsi que des outils qu’ils utilisent. Le verdict est sans appel : 9 sur 10 utilisent des tableurs, et seulement 22 % sont satisfaits du résultat. « La planification basée sur des feuilles de calcul en silos n’est plus adaptée à la rapidité d’évolution, ni à l’envergure du business d’aujourd’hui », conclut la Harvard Business Review. Heureusement, une solution existe ! Dans l’étude approfondie publiée par HBR sous le titre « The New Game Plan for Strategic Planning », vous lirez des entrevues avec des experts de l’industrie, et découvrirez une analyse des conclusions de l’enquête, des illustrations clair
Tags : 
    
Anaplan
Published By: Dell     Published Date: Sep 24, 2018
Read this paper from Dell EMC and Intel® to learn the business value of Data Domain and how it can... • Speed up your backups • Improve disaster recovery • Save valuable floor space ...and so much more!
Tags : 
solutions, data, domain, dell, emc
    
Dell
Published By: Dell     Published Date: Sep 24, 2018
The top data protection mandates from IT leaders are focused on improving the fundamental reliability and agility of the solution(s) in use. The mandate that follows closely behind is cost reduction, which is also seen as a top priority among data protection implementers. These challenges should not be seen as contradictory or mutually exclusive; in fact, they can all be addressed by improved data protection solutions that are engineered as much for efficiency as they are for reliability and capability.
Tags : 
economic, value, data, domain, idpa
    
Dell
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk
Published By: Anaplan     Published Date: Sep 07, 2018
Les entreprises modernes doivent évoluer à un rythme sans précédent. Certaines peuvent réagir rapidement, d’autres doivent lutter. D’où la question : pourquoi certaines entreprises réussissent, mais pas d’autres ? La Harvard Business Review a interrogé 385 lecteurs représentant des entreprises de plus de 500 employés à propos des défis rencontrés dans le domaine de la planification, ainsi que des outils qu’ils utilisent. Le verdict est sans appel : 9 sur 10 utilisent des tableurs, et seulement 22 % sont satisfaits du résultat. « La planification basée sur des feuilles de calcul en silos n’est plus adaptée à la rapidité d’évolution, ni à l’envergure du business d’aujourd’hui », conclut la Harvard Business Review. Heureusement, une solution existe ! Dans l’étude approfondie publiée par HBR sous le titre « The New Game Plan for Strategic Planning », vous lirez des entrevues avec des experts de l’industrie, et découvrirez une analyse des conclusions de l’enquête, des illustrations clai
Tags : 
    
Anaplan
Published By: Lenovo     Published Date: Aug 22, 2018
This paper will explore ways HPC systems are being used in a wide range of business domains and disciplines to solve complex problems efficiently with related research and statistics.
Tags : 
hpc, compute workloads, blades, blade computing, racks
    
Lenovo
Published By: Dell PC Lifecycle     Published Date: Aug 14, 2018
Wenn Sie kein Risiko eingehen möchten, sollten Sie die Data Protection einem Anbieter mit einer umfassenden Lösung anvertrauen. Holen Sie das Optimum aus Dell EMC Data Domain heraus – mit der leistungsfähigen Data Protection Suite.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 09, 2018
For total peace of mind, trust your Data Protection to a vendor with a complete solution. Get the most out of Dell EMC Data Domain by leveraging the power of the Data Protection Suite Family .
Tags : 
    
Dell PC Lifecycle
Published By: Workday Italy     Published Date: Aug 07, 2018
What is the current state of cloud adoption for Financial Applications? Financial applications have been slower to move to the cloud compared to other domains such as human capital management and procurement. However this is changing, Gartner predicts that within 4 years, 47% of total expenditure on financial management applications will be on cloud applications. That will be up from 30% in 2015. We have included four reasons why we see this tipping point happening right now.
Tags : 
    
Workday Italy
Published By: Workday France     Published Date: Aug 03, 2018
Tous les grands partenariats connaissent des hauts et des bas. Lennon et McCartney, ou Laurel et Hardy ont eux aussi connu des divergences de vues. Travailler ensemble implique de partager les mêmes objectifs, mais cela ne signifie pas toujours une harmonie totale et une reconnaissance des qualités et de la contribution de l'autre. Cette observation peut également s'appliquer aux fonctions financières et RH de toute entreprise : ce sont deux composantes clés de l'organisation mais historiquement deux domaines opérationnels très différents.
Tags : 
    
Workday France
Published By: Microsoft     Published Date: Jul 20, 2018
You’re running a lot of your business on Windows Server today— mission-critical apps, Active Directory, Domain Name Servers, not to mention virtual machines and storage. For more than 20 years, in fact, Windows Server has been the operating system of choice for enterprise workloads. This guide shows you how you can use your Windows Server expertise to give your organization a boost in the age of cloud computing, addressing these topics and others: • Why move to the cloud? • What are some ways to use Azure for Windows Server workloads? • What about security? • Who else is doing this? • How do I get started?
Tags : 
    
Microsoft
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.