guide

Results 301 - 325 of 3917Sort Results By: Published Date | Title | Company Name
By: Limelight Network     Published Date: Aug 12, 2019
As businesses continue to expand their online reach globally, user experience is one of the most important factors for building audience satisfaction and driving revenue. But whether you are delivering videos, web content or even ? les, ensuring engaging online experiences from an increasing variety of devices around the world, is a huge challenge. Organizations have a number of methods for improving user experiences, one of which is leveraging a content delivery network (CDN). But not all CDNs deliver the same level of service. This guide will provide some tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs.
Tags : 
     Limelight Network
By: Dell EMEA     Published Date: Aug 20, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management.
Tags : 
     Dell EMEA
By: Dell EMEA     Published Date: Oct 10, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management. Dell EMC infrastructure powered by Intel®
Tags : 
     Dell EMEA
By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : source, language, english, spanish, speech to text, database, analytics, audio message, support
     IBM APAC
By: Aventri     Published Date: Apr 29, 2019
"Quite a lot has happened since the first edition of The Future of Event Marketing. The second edition of The Future of Event Marketing will help you navigate through the overarching trends in our industry today. We are introducing a new wealth of quantitative and qualitative research as well as an update on our tools section, looking back at what is still relevant in 2019 and what will be relevant going forward. Download the latest guide today!"
Tags : 
     Aventri
By: MobileIron     Published Date: Feb 17, 2015
Ready or not, the global mobility trend is forcing enterprises to enable a mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As IT is quickly impacted by end-user technology decisions, enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. This guide offers practical, step-by-step insight that can help any organization accelerate their journey to becoming a Mobile First enterprise by providing a detailed, best-practice deployment process and recommendations for finding the right enterprise mobility management (EMM) provider.
Tags : mobile, enterprise, emm, mobile management
     MobileIron
By: MobileIron     Published Date: Feb 17, 2015
This eBook is designed to help your organization anticipate, understand and manage these and other questions regarding BYOD in the enterprise. In this four-part guide, we’ll look at best practices for preparing, building, rolling out and sustaining a successful BYOD program over the long term.
Tags : byod, pc sales, mobileiron, risk tolerance
     MobileIron
By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile.
Tags : 
     Akamai Technologies
By: Entrust Datacard     Published Date: Feb 05, 2016
Given the finite lifespan of SSL certificates and their widespread use throughout an organization, there are numerous reasons to take a lifecycle management approach. It’s critical to maintain an accurate accounting of SSL certificates that doesn’t rely on manual processes and tools. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
     Entrust Datacard
By: Dell     Published Date: Aug 17, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how…
Tags : windows 10, best practices, technology, data
     Dell
By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : upgrade, principled technologies, mobility, windows 10
     Dell
By: Dell     Published Date: Nov 19, 2015
Here is a simple guide to help you truly leverage the power of cloud now, without creating stumbling blocks in your overall journey.
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 02, 2015
Today’s IT environment is more complex than ever. The applications that have become critical to business operations require greater processing power, memory, and storage. This guide prepares decision-makers to choose servers that meet their current needs, while building a flexible, reliable, scalable infrastructure to handle future requirements.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: May 12, 2016
Businesses using multiple outdated servers for email, database, file and print workloads can benefit greatly by consolidating these workloads onto a single new server and running them in virtual machines. Read this paper and learn how the latest servers powered by Intel® Xeon® processors, can help you free up data center space, reduce power consumption and lower TCO.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Big data can be observed, in a real sense, by computers processing it and often by humans reviewing visualizations created from it. In the past, humans had to reduce the data, often using techniques of statistical sampling, to be able to make sense of it. Now, new big data processing techniques will help us make sense of it without traditional reduction.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
To compete in this new multi-channel environment, we’ve seen in this guide how retailers have to adopt new and innovative strategies to attract and retain customers. Big data technologies, specifically Hadoop, enable retailers to connect with customers through multiple channels at an entirely new level by harnessing the vast volumes of new data available today. Hadoop helps retailers store, transform, integrate and analyze a wide variety of online and offline customer data—POS transactions, e-commerce transactions, clickstream data, email, social media, sensor data and call center records—all in one central repository.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how to big data more manageable while condensing vast amounts of information into actionable business insights.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper for: • An overview of how manufacturing can benefit from the big data technology stack • A high-level view of common big data pain points for manufacturers • A detailed analysis of big data technology for manufacturers • A view as to how manufacturers are going about big data adoption • A proven case study with: Omneo
Tags : 
     Dell EMC
By: Websense     Published Date: Jul 08, 2014
A white paper on the shortest path to prevention and risk production.
Tags : protecting ip data, dlp implementation, websense data security suite
     Websense
By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : security, perimeter security, zero trust, cloud, enterprise security
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Use this step-by-step guide from Akamai’s CTO, Charlie Gero, to build an inclusive and concrete zero trust architecture, intended to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time and reducing your migration risk profile."
Tags : zero trust, security, cyber security, cloud
     Akamai Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
A buyer's guide for executives.
Tags : it service management solutions, itsm
     CA Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com