wan

Results 1 - 25 of 1352Sort Results By: Published Date | Title | Company Name
Published By: Aligned Data Centers     Published Date: Oct 12, 2015
The traditional data center model is like the old cable TV and music models, which forced you to buy and pay for all 189 channels and all ten songs, even if you only wanted a few. The evolved data center model, in contrast, is like the new TV and music models – you only buy the show or the song you want. Where the traditional colocation model locks you into long-term contracts for power you may not use, the evolved payfor-use model eliminates the need to forecast IT demand and provides control over capacity. As a result, you reduce waste and align your data center to the needs of your business. Aligned Data Centers is the first to bring this evolved data center model to the marketplace. The pages that follow explain how.
Tags : 
aligned datacenter, evolved datacenter, pay for use model
    
Aligned Data Centers
Published By: FORTRUST     Published Date: Aug 14, 2015
THE TOP 10 CRITERIA TO DISCUSS WHEN TOURING A DATA CENTER Choosing a data center or colocation provider to house your company’s critical IT infrastructure is a huge decision. Unfortunately, colocation providers don’t make it easy to differentiate between them. Many data center tours will have the same components: a sales rep will show you their data center’s battery rooms, cooling equipment, security measures, and generators, all the while assuring you that they are highly secure, reliable, well maintained, invulnerable to natural disasters, and capable of high density computing. After a few tours, it may seem as though there isn’t much difference between one data center and the next. This couldn’t be further from the truth. It’s important to know what to look for so you can make an informed decision. Migrating your IT environment is risky, often expensive, and certainly time consuming — you want to make the right choice the 1st time
Tags : 
    
FORTRUST
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location— across time zones or simply across the conference table. Cisco Webex makes working together what it should be - intuitive. Teams can work faster, smarter, and more effectively than ever, while providing the peace of mind that solution administrators want.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 05, 2018
This Technology Spotlight highlights the tangible benefits achieved by early SD-WAN adopters across key use cases and outlines a vision for sustained ROI and value creation from the solution.This paper also looks at the role of Cisco in the strategically important SD-WAN market. SD-WAN has arisen as the WAN's response to the migration of enterprise apps to the cloud. As the march of enterprise apps to the cloud gathers momentum,it is inevitable that SD-WAN gets the spotlight.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Apr 13, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Do you want to bring continuous delivery to your organization? Or would you simply like to begin your automation Journey? CA Technologies Automation Solutions (formerly Automic) proposes a fourstage blueprint to continuous delivery to assist enterprises at any stage of their DevOps journey. This e-book sets out a plan that can take a company of any maturity level all the way up to enterprise-scale continuous delivery using a combination of CA Continuous Delivery Automation, 40-plus years of business automation experience, and the proven tools and practices the company is already leveraging.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge Enterprises today face the major challenge of how to fully orchestrate the apps that define their business and automate the IT processes underpinning them when much of the infrastructure used to run them is outsourced to cloud providers. Opportunity Some cloud service providers offer their own orchestration tools, and each on-premises tool has automation capabilities. But while we own our apps, providers are interchangeable depending on what they can offer and for what price. We should be able to switch between cloud providers and between cloud, on-premises and hybrid infrastructure as and when the business requires, with minimal effort and without losing any control. Sometimes we might want to use more than one provider at the same time, leveraging the advantages of each provider simultaneously. Benefits What is needed is an orchestration layer that remains constant while cloud services come and go; one that enterprises own along with their core apps.
Tags : 
    
CA Technologies_Business_Automation
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Ask the average business user what they know about Business Intelligence (BI) and data analytics, and most will claim to understand the concepts. Few, however, will profess to know how analytics works or to have the skills needed to put it into practice. Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn’t stop them from wanting to have a go. This situation has led to ease of use and accessibility becoming the main focus for recent updates from all the leading BI vendors—but making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work. Unfortunately, the
Tags : 
    
TIBCO Software APAC
Published By: Groove     Published Date: May 16, 2018
From equipping them with accurate data to efficiency-driving tools to impactful training, you want to find the best systems to help your reps soar. As the market floods with technology (and a lot of lofty claims), it may be tough to know what you actually need and where to start your research process to help — not hinder — your team. You’ve probably heard a lot of buzz about sales engagement platforms, and there are quite a few to choose from. But what is it? What does it do? In sales, time is money. If you find that your team’s time is tied up in manual or administrative tasks, consider looking into a sales engagement platform. The right sales engagement platform will power outreach quality and quantity, ultimately helping your team crush their goals and boost the bottom line. In this guide, we’ll help you think through what features you should look for and what questions to ask as you begin to compare your options.
Tags : 
    
Groove
Published By: Gelato     Published Date: Jul 02, 2018
Operating across multiple countries is complex, as is shipping printed material. When our customers shared their stories with us, we knew we needed to act. In April 2017, Gelato entered each BRIC country. By establishing legal entities and print partners within Brazil, Russia, India, and China, Gelato gives customers an easy way to get printed material to colleagues and customers within those borders. The specific considerations in each BRIC country are numerous and often cumbersome. And who better to share insights on the state of local printing than the Gelato country managers on the ground? This ebook is for global enterprises than need to get prints in the BRIC countries, for those that are considering starting up sales and marketing operations in the regions for the first time, and also for domestic businesses that simply want to improve their local print processes.
Tags : 
    
Gelato
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: IBM     Published Date: Jun 04, 2018
"Today’s business users want to use all types of data to create compelling, shareable visualizations. But charts and graphs alone may not convey all the information, especially when they are part of a complex series. An audience can best understand analytic results when those results tell a story that connects all the pieces together. The right visuals can also reinforce the lessons buried in the data. Stories are powerful mechanism to communicate with people. Stories stick and make insights actionable, so it goes without saying that storytelling is a very powerful (soft) skill. In this webinar, you'll learn how to effectively apply storytelling best practices to get your message across. Especially in the world of BI, it is getting more and more important to effectively communicate business results. Watch this webinar to learn how to use IBM Cognos Analytics to: · Create the important elements of a good story · Put the data in context · Select the best type of ch
Tags : 
data analytics, data storytelling, business intelligence
    
IBM
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: Zebra ABM     Published Date: Dec 14, 2017
When shoppers are ready to checkout at the grocery store, the last thing they want is a long wait time at the cash register. In order to meet the high expectations of today's customer, you need to keep checkout lines moving with the most efficient handling of every transaction. This means that cashiers need to be able to instantly capture bar-codes, even ones that are damaged or dirty. They need to quickly weigh produce without spending precious time positioning and re-positioning it on scale to ensure the capture of accurate weight - and cost.
Tags : 
scan, volume, barcodes, simplicity, mp7000, industry, imaging, file, zebra
    
Zebra ABM
Published By: HireVue     Published Date: May 16, 2018
OVERVIEW Unilever is a global player in the fast-moving consumer goods (FMCG) sector, with nearly a third of the world’s population using its products every day. The company has more than 169,000 employees working around the world, and its leaders estimate that within three years, as many as 60 percent of those employees will be Millennials. Critical to Unilever’s ongoing success will be its ability to attract these recent college graduates. For its signature Future Leaders Programme, the company wanted its recruitment efforts to get ahead of the curve. The existing process was rooted in paper-based applications, phone interviews with recruiters, and manual assessment tests. It took four to six months to sift through 250,000 applications and ultimately hire 800 individuals. The company sought to radically transform this process using online gamification, digitally recorded interviews, and science-based assessment tests and data analysis. In this case study, we: • Explain the chal
Tags : 
    
HireVue
Published By: Workday     Published Date: Jan 16, 2018
Financial transformation by definition is not something you can bolt on—it requires a willingness to question long-held assumptions and envision where you want to go and a total technology rethink. In the next blog, we’ll take a closer look at how one, unified, cloud-based system can create the perfect environment for finance to handle transaction processing and compliance and control while delivering the answers the business needs.
Tags : 
financial, technology, innovation, optimization, business, workday
    
Workday
Published By: Workday UK     Published Date: Mar 08, 2018
Career management is at a crossroads. What employees and organisations want and need has shifted drastically in recent years, leading to big changes in how companies approach career development. What’s causing these seismic shifts? And how are today’s organisations responding? Read this report, full of research findings and real-world examples, to learn: •Why organisations are overhauling their strategies •The six shifts impacting career management •The challenges organisations face when modifying their approaches If you’re looking to better develop your workforce and adapt to changing employee expectations, this guide is for you.
Tags : 
    
Workday UK
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: NEC     Published Date: Aug 25, 2009
This is a case study which shows how Voorhees College implemented a revolutionary communications solution based around a service-orientated Unified Communications architecture from NEC to provide students, faculty and staff in five locations with software-based voice and desktop communications tools to achieve a 40 percent savings over its previous traditional telephony solution.
Tags : 
voorhees, nec, desktop communications, communications, service orientated, widearea network, wan, unified communications architecture, tco, soa
    
NEC
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com