next generation

Results 226 - 250 of 740Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 18, 2016
State and local governments have always had to recruit, train and retain the next generation of skilled employees. But today, successful talent acquisition and management are more crucial than ever. Read the issue brief to learn how the cloud can deliver modern recruiting and talent management solutions.
Tags : 
    
SAP
Published By: Genesys     Published Date: Feb 27, 2018
Modern contact centers support a variety of digital channels—email, chat, co-browsing, social, video—over multiple digital touchpoints (web or mobile devices). What they lack is the ability to link interactions in a step-by-step journey to provide a personal, contextual experience for each customer. Download this eBook. Learn how you can: • Design a successful digital customer engagement strategy • Provide agents with a 360-degree view of the customer across all digital channels and voice • Deliver omnichannel experiences that are personalized, context-based, and low-effort
Tags : 
digital customer service, contact center, digital channel, ebook
    
Genesys
Published By: Rosetta Stone     Published Date: Aug 18, 2016
World language acquisition is an important component of global competitiveness, but only one in five U.S. public school students study a world language.
Tags : 
    
Rosetta Stone
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : 
palo alto, virtualization, cloud, firewall, security, digital
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
"Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Tags : 
palo alto, automated malware, security, cloud, gartner
    
Palo Alto Networks
Published By: Comcast Business     Published Date: Jul 10, 2017
Healthcare technologies have proven their worth for practitioners and facilities in increasing the quality of patient care while saving time and streamlining operations. In some cases, however, the benefits of these technologies are outweighed by their impact on the network, slowing network performance sometimes to the point of ineffectiveness.Software-defined networking can be the bridge to help healthcare providers update their networks and avoid disruption. SDN helps organizations save money on networking infrastructure, reduces the complexity of managing networks, enhances security through added intelligence and simplifies compliance, among other benefits.
Tags : 
healthcare, sdn, healthcare technology, patient care, technology, reducing costs, improve security, healthcare benefits
    
Comcast Business
Published By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : 
financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs, customer experience
    
Comcast Business
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: LogMeIn     Published Date: Feb 27, 2018
When Facebook released their bot feature, M, the virtual assistant living inside their Messenger platform, it was billed as the next generation of how people connect and interact with the internet. Since then, over 18,000 companies have created their own branded chatbots with the help of Facebook’s platform. Never ones to miss out on a trend, Microsoft, Google and Apple have all been hard at work developing their own integrated chatbot features. Brands of all shapes and sizes, from American Express to 1800-Flowers to Domino’s Pizza, all have their own chatbots, proving the versatility of the concept. As Microsoft CEO Satya Nadella said at the 2016 Build conference, “As an industry, we are on the cusp of a new frontier that pairs the power of natural human language with advanced machine intelligence.”
Tags : 
    
LogMeIn
Published By: Oracle     Published Date: Sep 21, 2018
Choosing the right platform for cloud is a critical decision. You will want the next generation cloud infrastructure; Oracle Cloud is an optimized cloud platform.
Tags : 
    
Oracle
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Mar 01, 2019
Security leaders across all industries face mounting challenges. Cyberattacks are continually growing in volume, complexity, and sophistication, and incident response (IR) teams are pushed to the limit of their time, skill, and resources. Additionally, the average Security Operation Center (SOC) uses more than 75 different security tools – making full visibility nearly impossible and integrating those tools challenging as well.
Tags : 
    
Group M_IBM Q119
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This paper discusses the need for and details of a Zero Trust approach to network security. It also itemizes the essential criteria and capabilities required of a Zero Trust solution, explains how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust design.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks
Published By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : 
data security, security, cyber attacks, threat and vulnerability management
    
Centrify
Published By: Oracle OMC     Published Date: Nov 30, 2017
Demandbase and Oracle Eloqua introduce the next generation of B2B marketing by delivering Account-Based Marketing(ABM) directly into your MAS. Download this whitepaper now to learn more!
Tags : 
    
Oracle OMC
Published By: Oracle OMC     Published Date: Nov 30, 2017
Your marketing budget and sales staff provide a finite set of parameters around how your business creates revenue. You need a way to get the most out of them while delivering on the brand promise and experience your customers expect. Enter Account-Based Marketing (ABM), the truest way to align your sales organization and marketing operations to drive holistic account interactions that yield higher returns. It’s the next generation of B2B marketing automation. According to Demandbase, “ABM is the process of identifying the companies most likely to buy, and then marketing to them. B2B companies understandably want to focus their marketing dollars on accounts with the highest potential to deliver sustainable revenue.”
Tags : 
    
Oracle OMC
Published By: Adobe     Published Date: May 16, 2012
Find out how the Nation's largest high school journalism program uses Adobe Creative 5.5 Master Collection to cultivate the next generation of award-winning print, broadcast, and web journalists.
Tags : 
cs5.5, creative suite, adobe, adobe creative suite, 5.5 master collection, pulitzer, print, broadcast, journalismlo alto, design and facilities
    
Adobe
Published By: Red Hat     Published Date: Apr 18, 2011
This IDC report discusses the clear benefits of cloud computing?and how to best obtain next-generation performance, flexibility, and savings with key technology and process considerations.
Tags : 
cloud computing, portability, and interoperability
    
Red Hat
Published By: Vidyo, Inc.     Published Date: Jul 17, 2009
Personal Telepresence is the next generation in video communication. It delivers affordable, universal, and reliable video communication. The VidyoConferencing system provides the solution to the business and technical challenges of personal telepresence
Tags : 
vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc
    
Vidyo, Inc.
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi, scalability, legacy applications, data management, business technology, data center
    
AMD
Published By: Brainshark     Published Date: Oct 16, 2013
Running low on content for your next campaign? Learn how leading marketers are repurposing existing content and delivering it in a creative, targeted and measurable format that fuels successful lead generation—while also saving time and money.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video, event promotion, creating video, youtube, video seo, mobile, webinar, webcast, podcast, slidecast, video production, online video, tablet
    
Brainshark
Published By: McAfee     Published Date: May 19, 2014
A medida que la tecnología de firewall de próxima generación (NGFW - next-generation firewall) se convierte en más convencional, es el momento de revisar las capacidades y funciones avanzadas que separan a los líderes de los rezagados. En su forma más básica, el consenso de una definición de NGFW incluiría estas capacidades: funciones estándares de firewall como la inspección de estado y la traducción de direcciones de red, prevención de intrusiones integrada, control de aplicaciones y un cierto nivel de inteligencia e integración con bases de datos de vulnerabilidad y reputación.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusos, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, security, it management
    
McAfee
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept