traditional

Results 1 - 25 of 1346Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
Cylance
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The Cisco Meeting and TeamCollaborationExperienceThe workplace has changed and today themost agile workforces outperform traditional setups. But the reality of modern business life is, ifyou want a culture of innovation, you have tomake it yourself.Teams need a workplace that’s focussed oninnovation and speed. Introducing Cisco WebexTeams, a platform that helps teams to do it all.Essential kit for forward-thinking smallbusinesses.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The Cisco Meeting and Team Collaboration Experience The workplace has changed and today the most agile workforces outperform traditional set ups. But the reality of modern business life is, if you want a culture of innovation, you have to make it yourself. Teams need a workplace that’s focussed on innovation and speed. Introducing Cisco Webex Teams, a platform that helps teams to do it all. Essential kit for forward-thinking small businesses.
Tags : 
    
Cisco EMEA
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn smarter approaches to data protection and recovery. See how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Now is the time to take a smarter approach to data protection an recovery. Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
    
Avi Networks
Published By: BetterUp     Published Date: Mar 06, 2019
Research suggests that up to half of the investment your organization is making in Learning & Development (L&D) is being wasted. Employees unfortunately lose up to 75% of the information they receive through traditional L&D approaches (including learning management systems, episodic trainings, and workshops) — an effect known as the training transfer problem. In this report, discover the five critical requirements for effective behavior change and leadership development.
Tags : 
    
BetterUp
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Forcepoint     Published Date: Mar 04, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: TIBCO Software     Published Date: Mar 04, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
The convergence between new technologies - like AI, blockchain, intelligent sensors, and edge computing - have the potential to disrupt, transform and streamline traditional supply chain operations. Join Supply Chain experts to learn: - Successes and failures of manufacturer’s to-date - Tips for selecting the best use case for your business - Industry best-practices for applying AI and blockchain
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q119
Published By: Denodo     Published Date: Mar 01, 2019
With the advent of big data and the proliferation of multiple information channels, organizations must store, discover, access, and share massive volumes of traditional and new data sources. Data virtualization transcends the limitations of traditional data integration techniques such as ETL by delivering a simplified, unified, and integrated view of trusted business data. Learn how you can: • Conquer siloed data in the enterprise • Integrate all data sources and types • Cope with regulatory requirements • Deliver big data solutions that work • Take the pain out of cloud adoption • Drive digital transformation
Tags : 
    
Denodo
Published By: Denodo     Published Date: Feb 27, 2019
Organizations continue to struggle with integrating data quickly enough to support the needs of business stakeholders, who need integrated data faster and faster with each passing day. Traditional data integration technologies have not been able to solve the fundamental problem, as they deliver data in scheduled batches, and cannot support many of today’s rich and complex data types. Data virtualization is a modern data integration approach that is already meeting today’s data integration challenges, providing the foundation for data integration in the future. Download this whitepaper to learn more about: The fundamental challenge for organizations today. Why traditional solutions fall short. Why data virtualization is the core solution.
Tags : 
    
Denodo
Published By: TIBCO Software     Published Date: Feb 26, 2019
MoneyLIVE’s annual survey of over 600 banking professionals found that traditional banks face a significant challenge when it comes to building AI-powered customer journeys. 75% believe that as the use of AI intensifies, banks will struggle to recruit the necessary expertise. 84% fear regulatory and liability issues surrounding AI. Just 7% think their organization’s use of AI is highly sophisticated. But for banks to keep pace with challengers and FinTechs, it’s crucial that they harness this continually evolving technology. Download this chapter of MoneyLIVE's The Future of Retail Banking Report 2018/19 now and understand how TIBCO’s Connected Intelligence Platform, with the use of AI and machine learning algorithms, can help with banks’ digital transformation needs.
Tags : 
artificial intelligence, machine learning, financial services, retail banking
    
TIBCO Software
Published By: Workday     Published Date: Feb 25, 2019
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs – one using on-premise software and one using Workday.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Equinix APAC     Published Date: Feb 25, 2019
Security and Resilience in Cloud, Hybrid and Multicloud Deployments This white paper describes the challenges and motivations facing cloud, hybrid and multicloud users as they consider how to deliver traditional levels of security and robustness, while maintaining the API-enabled virtues of flexibility and short lead-times of cloud-enabled IT. Key Highlights: • Critical considerations associated with cryptographic key management for multicloud users • Implement solutions that are capable of maintaining an always-on service
Tags : 
    
Equinix APAC
Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
At IBM Watson Marketing, we believe deeply in this practice and have dedicated a large effort to provide some of this critical data to marketers. The newest IBM Watson Marketing annual report of marketing benchmarks is bigger and better than ever with mobile marketing metrics data in addition to email marketing metrics. This year’s report includes traditional benchmark metrics such as email marketing open, click-through and unsubscribe rates, as well as email client and device data and engagement/read rates. New this year to the report are delivery and message frequency metrics for SMS and open and clickthrough rates for mobile push messages.
Tags : 
    
Group M_IBM Q119
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Ask anyone in business, higher education or the medical community what their top objectives are and they’ll probably say it’s to achieve more, to solve more problems, faster than what’s possible now, while saving money in the process. Ask what’s holding them back and you’ll probably find a diverse variety of obstacles in their day-to-day work processes that hinder them in meeting those goals. Having the right tools to do the job is one crucial element in solving problems and becoming more efficient and productive. Additive manufacturing, widely known as 3D printing, is one of those tools that has helped businesses, educators, health care providers and researchers improve how they design, manufacture and perform research. While no tool is an all-in-one solution, 3D printing is a strong step in that direction, particularly in its most sophisticated forms. 3D printing makes it possible to manufacture things that aren’t feasible with traditional processes like machining or injection moldi
Tags : 
    
Stratasys EMEA
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Factory production lines know the right jig or fixture speeds production, which increases productivity. But that’s just the beginning. Well-designed tools are more ergonomic, offering both increased worker safety and productivity, as well as cost savings. Traditional machining produces heavy, costly, multi-piece tools that become an even greater liability as repetitive motion injuries erode line productivity with worker disability. Redesign means even more protracted timelines for machined parts. While essential to efficiency, accuracy and safety, jigs and fixtures are often considered a necessary evil in the overall production process. Costly, protracted timelines for machined jigs and fixtures are the culprit here, especially for the often complex designs necessary to meet unique part needs. This, along with certain complex designs that simply cannot be manufactured using traditional methods are a reality on the production floor. But there is a better way. 3D printed jigs and fixture
Tags : 
    
Stratasys EMEA
Published By: Apstra     Published Date: Feb 21, 2019
Modern data centers based on hyperscale, leaf-spine switching architectures are growing so large and complex they are outstripping the capacity of operators to engineer, configure and manage these networks using traditional tools and techniques. As a result, data center operators are looking for new ways to automate workflows, maximize uptime and increase operational agility while reducing operating costs
Tags : 
acg, data center efficiency
    
Apstra
Published By: Oracle     Published Date: Feb 20, 2019
6 Reasons Supply Chain Leaders Move to the Cloud To meet market needs and effectively compete, organizations demand visibility, agility, and integration from their supply chains. Traditional SCM platforms simply can’t keep up—and leaders are leveraging the cloud to build more adaptable models.
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept