information

Results 1 - 25 of 3001Sort Results By: Published Date | Title | Company Name
Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. While these remain important aspects of an effective security plan, they are part of a broader, more integrative approach to security in today’s dynamic environment. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. This paper has examined the elements and organization of a holistic approach to security. Digital Realty views security as an integrated process, consisting of the subprocesses of physical security, information security, incident management, business continuity and compliance, enabled by the systems, processes and people providing quality of delivery and reliability of performance. Absent any of these elements, security becomes a series of loosely related tasks lacking in cohesive effectiveness.
Tags : 
    
Digital Realty
Published By: CommScope     Published Date: Apr 15, 2016
This technical paper provides an overview of the most prevalent networking and storage applications in modern data centers. Additionally, it offers information about the different structured cabling systems capable of running these applications and also functions as an application reference book for network cabling designers in data centers.
Tags : 
    
CommScope
Published By: CyrusOne     Published Date: Jul 06, 2016
CyrusOne’s quick-delivery data center product provides a solution for cloud technology, social media and enterprise companies that have trouble building or obtaining data center capacity fast enough to support their information technology (IT) infrastructure. In trying to keep pace with overwhelming business growth, these companies often find it hard to predict their future capacity needs. A delay in obtaining data center space can also delay or stop a company’s revenue-generating initiatives, and have significant negative impact on the bottom line.
Tags : 
    
CyrusOne
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Modern networks are vast and complex, spanning the globe to make information available to everyone within an organization and have begun to encompass new areas of technology. The Internet has unlocked tremendous new capabilities and technologies, but these innovations require persistent and reliable network connectivity. Salesforce’s© Customer Relationship Management (CRM) cloud product for example is now widely used by businesses for its significantly lower cost and overhead when compared to on-premise predecessors. The cloud is driving an insatiable demand for faster, more reliable network access, and for IT organizations the pressure is on.
Tags : 
management, scalability, business, enterprise, technology
    
Cisco EMEA Tier 3 ABM
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Apr 05, 2018
Im April kündigte Microsoft die Lösung Microsoft Relationship Sales an, die Microsoft Dynamics 365 for Sales mit LinkedIn Sales Navigator kombiniert. Vertriebsmitarbeiter haben Zugriff auf Informationen aus dem weltweit führenden professionellen Netzwerk, damit sie einfacher Interessenten finden und Beziehungen zu stärken. Die Lösung bietet: -Zugriff auf 500 Millionen LinkedIn-Profile mit Fotos sowie Informationen zu aktuellen und früheren Tätigkeiten der Mitglieder. Damit können Vertriebsmitarbeiter einen besseren Eindruck von ihren aktuellen Kunden erhalten und über das Netzwerk neue Leads finden. -Empfehlungen für die nächsten Schritte der Benutzer in Dynamics 365 auf Basis von Signalen aus E-Mail, Customer Relationship Management (CRM)-Software und LinkedIn. Diese basieren auf künstlicher Intelligenz (KI) und enthalten Vorstellungs- und Vernetzungsvorschläge sowie Vorschläge für InMail und Nachrichten.
Tags : 
crm strategy, crm-strategie, linkedin, dynamic sales
    
Microsoft
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
As organizations seek to extract more strategic value from their data, many are starting to view data governance as an enabler of insight rather than an impediment to its creation. This report explores a leading approach to data governance and the impact it can have on today’s most data-rich organizations.
Tags : 
data governance, data-rich organizations
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
Published By: Pure Storage     Published Date: Apr 18, 2018
Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning- especially deep neutral networks- make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject but also helps you get started building efficient deep learning networks.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Apr 18, 2018
In today’s world, it’s critical to have infrastructure that supports both massive data ingest and rapid analytics evolution. At Pure Storage, we built the ultimate data hub for AI, engineered to accelerate every stage of the data pipeline. Download this infographic for more information.
Tags : 
    
Pure Storage
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Genesys     Published Date: Feb 22, 2018
Is Your IT Team Ready to Enable Digital Transformation? Customers want fast access to information and immediate problem resolution on any device, from any location, at any time. It’s up to IT to build the foundation for this digital transformation—and increasingly, it’s cloud-based. Make sure your IT team is on track to deliver. An omnichannel contact center platform gives you a single, integrated view of the entire customer journey. And as a cloud-based solution, IT has the flexibility to deploy advanced features fast and cost-efficiently. Read this white paper from Frost & Sullivan for a pragmatic approach to: • Identify process changes and goals with lines of business • Benchmark your current infrastructure and technology gaps • Consider cloud omnichannel solutions for easier deployments and simple scalability
Tags : 
frost & sullivan, customer engagement, contact center, omnichannel
    
Genesys
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : 
digital experience, ibm, software
    
Group M_IBM Q1'18
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Magento     Published Date: Mar 28, 2018
Recommendations to Discuss with Your Development Team and Technology Partners. When buying products online, shoppers have to put their trust into eCommerce stores. They have to trust that their information won't be stolen, that the order will go through and that it will be shipped on-time, to the correct location. When a site is slow, not only does it frustrate online shoppers, it takes away the legitimacy of the site and their trust in it. Poor site performance can cost you sales, revenue, customers, and even a high ranking on search engines. Download the guide to learn how you and your development team can boost site performance.
Tags : 
site, performance, servers, worldwide, network
    
Magento
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer support is predicated on the instances when customers can’t solve their problem or get answers to their question(s) on their own. In some of those cases, such as phone calls or live chats, it can be difficult for agents to identify and resolve the issue without additional visual assistance. With co-browse, agents can see what the visitor sees, provide guided assistance by highlighting items or filling out forms on a visitor’s behalf. Sensitive fields like social security numbers and passwords can be blocked from the agent’s view so private information remains just that, private. Bold360’s co-browse allows agents to follow visitors behind secure fields i.e. signing into their account – providing an extra level of support to customers.
Tags : 
browse, web, customers, security
    
LogMeIn
Published By: LogMeIn     Published Date: Feb 27, 2018
The rise of mobile devices have changed the way we communicate, the way we work, and the way we shop. Mobile devices give power to the consumers. Constant connectivity allows for easy access to endless information providing customers with multiple purchase options. In eCommerce, mobile shopping is sharply rising. According to Forrester, 29% of all U.S. eCommerce transactions will occur on a tablet or mobile phone this year, totaling $114 billion. By 2018, that percentage will rise to 54% of the total $414 billion in eCommerce sales.i All of this information points to the fact that mobile is not just a trend, it's a reality. A reality that forces businesses to change the way they engage with their customers.
Tags : 
mobile, applications, reporting, deployment, chat, device
    
LogMeIn
Published By: LogMeIn     Published Date: Feb 27, 2018
Customer engagement is seamless when agents focus exclusively on the customer and not the myriad of systems needed to access information. The simpler, the better. Our Zendesk integration simplifies the agent’s workflow by providing agents with the necessary information to effectively communicate with customers from Bold360’s easy-to-use interface. By connecting these systems together agents can find information quickly, update ticket statuses, and serve customers more effectively.
Tags : 
zendesk, integration, steamline, workflow, information
    
LogMeIn
Published By: Outreach.io     Published Date: Apr 09, 2018
Modern business-to-business (B2B) buyers have unprecedented access to information to support their buying process and, as a result, have become more self-reliant in the evaluation process. This has made B2B sellers’ jobs harder; not only do they have less control in earlier stages of the sales cycle, but they have to work harder to connect and engage with buyers, turning prospects into customers. Sales technologies have helped modernize how sellers and sales leaders manage their pipelines and execute contracts, but technology gaps around engagement persist, making it difficult for sellers to keep pace with, connect with, and support buyer engagement. The common outcome: Sellers become slaves to their CRM systems, focused more on updating reports and logging their activities than they are in driving business results.
Tags : 
    
Outreach.io
Published By: Workday     Published Date: Feb 27, 2018
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business. System complexity is increasing, though. Enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks.
Tags : 
business, enterprises, cloud, organisations, cybercrime
    
Workday
Published By: IBM APAC     Published Date: Mar 19, 2018
Plenty of Fish, one of the largest online dating companies, accelerate the delivery of fresh information to its four million daily users so that they can connect and interact almost in real time. Read how they use IBM Flash Storage to load webpages in just four milliseconds, connecting its 100 million users faster providing a seamless experience for users looking for love.
Tags : 
    
IBM APAC
Published By: Workday UK     Published Date: Mar 08, 2018
It’s no small feat for CIOs to balance efforts to support agility, contain IT costs, and keep data safe and secure. Moving to the cloud delivers on those first two priorities, but what about security? Can the cloud really keep your information safe? In the CIO.com report “Demystifying Cloud Security,” you’ll learn why the cloud is your best bet for data security and discover additional benefits your business could experience by moving to the cloud. Read the report to learn more.
Tags : 
    
Workday UK
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com