network

Results 1 - 25 of 4732Sort Results By: Published Date | Title | Company Name
Published By: Salsify     Published Date: Mar 15, 2019
With over 10,000 SKUs across two divisions and multiple brands, seasonal and home decor manufacturer and distributor The Gerson Companies needed a better way to organize product market data and expand across hundreds of retailers. After investing in product experience management, the company was able to centralize product information in Salsify and empower its network of independent retailer with the data needed to sell successfully online. Featuring: Orin Borgelt, Chief Technology & Sales Officer Learn more about the step-by-step approach The Gerson Companies team took to take control of their data and increase sales on the digital shelf: Build a centralized, flexible, and accessible source of production information to arm all divisions of Gerson with the most up-to-date product inventory. Meet requirements for retailers. The Gerson Companies uses Salsify to syndicate product information across the digital shelf for their B2C divisions. Develop a new sales channels: Gerson uses Sa
Tags : 
    
Salsify
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Intel     Published Date: Mar 14, 2019
One of the challenges of introducing Network Functions Virtualization (NFV) is the complexity of implementation and integration at three points.
Tags : 
    
Intel
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: Children's Miracle Network Hospitals     Published Date: Mar 13, 2019
With Children's Miracle Network Hospitals' e-commerce Giving Plugin, it can be. See how easy it is to build affinity with customers and make positive local impact on a national scale—all without making changes to your existing website.
Tags : 
    
Children's Miracle Network Hospitals
Published By: Avi Networks     Published Date: Mar 12, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
    
Avi Networks
Published By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
57% of supply chain professionals believe there is room for improvement in supply chain visibility. Today, organizations are under pressure to increase the agility of their supply chain to be able to plan, monitor, and respond to ever-changing market conditions. By connecting data, people, plans, and networks across the enterprise, your business’ supply chain can enable true visibility, improve margins, and drive down costs. The vision of a tightly integrated and truly connected supply chain can be achieved, but it doesn’t happen overnight. Download the white paper to learn the three steps companies can take to evolve their supply chain maturity.
Tags : 
    
Anaplan
Published By: Laser 2000     Published Date: Mar 12, 2019
How the top two network performance data sources stack up on troubleshooting, latency, forensics, and more.
Tags : 
    
Laser 2000
Published By: Laser 2000     Published Date: Mar 12, 2019
End-user experience & network security unifying NetOps and SecOps teams
Tags : 
    
Laser 2000
Published By: Laser 2000     Published Date: Mar 12, 2019
Network
Tags : 
    
Laser 2000
Published By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
    
AI Business
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Today’s globally distributed and diverse workforce needs flexible yet straightforward access to the corporate network, regardless of user location, device type, employee affiliation, and application location (on-premises, SaaS, IaaS). Expedience and fluidity can’t come at the cost of security, especially given the realities of modern cybercrime. Learn more about the five demands you should make of an updated comprehensive application access solution.
Tags : 
    
Akamai Technologies
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
The scalability of its EP-LAN lets MMC Corp seize new opportunities without adding infrastructure. For example, Scales and Trusler are looking at virtual desktops or virtual desktop image [VDI] files for some offices and even job sites. “We’ll probably have to scale some bandwidth internally for that,” Trusler notes, “but if we do the VDI internally or we do it with an external third party, it doesn’t really matter… because we can get them on that EP-LAN network and we can get the bandwidth that we need… quickly.” EP-LAN is scalable. In most cases, adding additional services at a specific customer location can easily be turned up by Spectrum Enterprise remotely. Choosing a fiber EP-LAN over MPLS not only met the challenge to connect MMC Corp locations: it created an IT platform that continues to scale to support rapid expansion and innovation.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com