aps

Results 176 - 200 of 448Sort Results By: Published Date | Title | Company Name
By: Landis + Gyr     Published Date: Mar 17, 2016
The rapid acceleration of Distributed Energy Resources (DER) presents a range of challenges for electric utility management. The good news is that a strategic approach, one that taps the power of data analytics, can meet the rising need to manage DER. Download this white paper, to learn about the current state of DER and how to get started with a smart grid analytics solution: • Cost-benefit analysis • Challenges of integrated DERs • Planning considerations • Advanced analytics tools and predictive grid analytics benefits • Choosing a platform
Tags : cost-benefit analysis, der, analytics, platform, utility, smart grid
     Landis + Gyr
By: Adobe     Published Date: Mar 02, 2017
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines.
Tags : adobe, stock, image, customer experience, social media, creative production, enterprise
     Adobe
By: Kofax     Published Date: Aug 24, 2017
Mobile is an essential component of every digital transformation strategy. However, many point or black box mobile capture solutions leave dangerous and potentially costly gaps in functionality and in your infrastructure that can create unexpected barriers in the future. In “Navigating the Digital Transformation Maze: Let Mobile Capture Take the Lead in Customer Onboarding,” you will discover: • Why it is so important to lead with mobile • How to choose the best digital transformation path for your business • The 4 must-have mobile onboarding priorities • How to leverage your existing infrastructure to digitally transform your business Get your copy today
Tags : digital transformation, mobile, onboarding, functionality
     Kofax
By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, it’s getting harder to gauge your organization’s DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
     Incapsula
By: Incapsula     Published Date: Nov 06, 2017
Does your website load in two seconds or less? If not, you could be disappointing nearly half of your customers. According to Kissmetrics, 47 percent of e-commerce users expect websites to load in less than two seconds – and nearly a quarter of them will abandon your website entirely if it takes longer than four seconds. Additionally, 50 percent of customers shop on their mobile phones. In other words, your website needs to load fast and be optimized or your customers will leave. The reality is that an e-commerce company can increase revenue by up to 7 percent just by making the load time one second faster. So, how can your company improve its site performance and make it faster? The best practices outlined in this whitepaper can reduce your site’s loading time, improve your user experience, and ultimately increase your company’s revenue.
Tags : 
     Incapsula
By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
     Incapsula
By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
     Incapsula
By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
     Trend Micro
By: Riverbed     Published Date: Feb 26, 2015
Here's a snapshot of Riverbed’s application performance management portfolio.
Tags : application performance, performance management, business value
     Riverbed
By: IBM APAC     Published Date: May 12, 2017
With these facts in mind, the need to help different age groups work well together is clear. Younger generations have fundamentally different views about work and the world in general, which can be problematic when they’re expected to work alongside older workers. You must find ways to bridge the gaps between generations, while empowering individual generations to work in the manner that best suits them. Read on to learn more.
Tags : workplace, mobile workplace, mobile environment, remote working, workplace environment, digital transformation
     IBM APAC
By: Burton Group     Published Date: Apr 08, 2008
Server virtualization is a technology that has taken hold with amazing speed and is now firmly entrenched with overwhelming success in many data centers. This perspective document recaps why you should be moving ahead quickly with virtualization (if you haven’t already done so), what the implications are for IT and the business, and what the future holds as the ramifications of virtualization become apparent.
Tags : burton group, server, servers, virtual, virtual machine, virtual server
     Burton Group
By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : big-ip, tool, application, system, device, installation, upgrade, production, testing, reboot, go live, stage, administrator, knowledge, solution
     F5 Networks Inc
By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
     HP Data Center
By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
     VMware
By: VMware     Published Date: Feb 26, 2009
CA ARCserve® Backup, CA XOsoft™ Replication, and CA XOsoft™ High Availability provide several key features that enable you to both protect virtualized servers and benefit from server virtualization in your overall recovery management strategy
Tags : ca arcserve backup, ca xosoft replication, ca xosoft high availability, virtualization support, recovery management strategy, virtual machines, vms, vmware consolidated backup (vcb), protecting virtual machines, backup agent, esx server, physical-to-virtual, p2v, disaster recovery hosts, stand-by servers, vss snapshots, security
     VMware
By: Cornerstone OnDemand     Published Date: Dec 10, 2014
What do we mean by agility? It’s how powerfully your organization can react to changes in the marketplace, recognize and close employee skill gaps, and align the right people in the right places to handle any pivots in business strategy. How can you make your organization more agile? There are several critical things you must do. Learn about it all in this whitepaper.
Tags : cornerstone ondemand, agility, organizations, business agility, business strategy, employee skills, productivity
     Cornerstone OnDemand
By: EMC Corporation     Published Date: Mar 11, 2011
Learn how EMC is filling the gaps through smart acquisitions and integrations that address customer needs.
Tags : emc, esg, data protection
     EMC Corporation
By: CollabNet     Published Date: Jan 11, 2013
This paper is written to provide guidance for teams new to continuous integration or wanting to explore ways to improve their implementations.
Tags : agile, software development, integration, process, continuous integration, value stream maps, antipatterns
     CollabNet
By: Oracle Global Marketing     Published Date: Jul 13, 2012
Nextgen was looking for a reliable, fast-to-deploy database solution with minimal support and maintenance costs.
Tags : nextgen, database application, database imlpementation, simple database platform, reliable database platform, affordable database platform, oracle, value added distributor, vad, database solutions
     Oracle Global Marketing
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : vistaprint, case study, counteract, endpoint compliance, real time visibility, physical and virtual machines
     ForeScout
By: BMC Software     Published Date: Aug 18, 2014
"“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change. strategy."
Tags : customer satisfaction, it support, communication, business users
     BMC Software
By: BMC Software     Published Date: Oct 23, 2014
In a first-of-its-kind study, IDC has docu­mented the costs of business risks cre­ated when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models.
Tags : costs and risks, communication, enterprises, it service delivery models
     BMC Software
By: BMC Software     Published Date: Oct 23, 2014
Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.
Tags : itssm, strategic partners, it organizations, itsm integration, saas
     BMC Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com