data

Results 1 - 25 of 12119Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
    
Silver Peak
Published By: Gigaom     Published Date: Jun 25, 2019
Join this webinar to learn how the right data management practices and intelligent archives can boost the value of data and make it reusable for new applications, becoming a tool to improve and simplify the digital transformation journey of your organization.
Tags : 
aparavi, digital transformation, data management, data compliance, data storage, data liability, data regulations, data growth
    
Gigaom
Published By: Genesys     Published Date: Jun 19, 2019
Contact centers often pool agents into large groups of generalists to distribute work evenly. Skills-based routing takes this a step further with specialized groups. But neither approach scales properly to identify all opportunities and drive business outcomes on each interaction. Predictive routing uses artificial intelligence (AI) and machine learning to create balance—meeting targets and giving customers a personalized experience. Read Demystifying AI: Creating an AI partnership that maximizes business results to learn how predictive routing systematically: Evaluates historical and real-time data to make predictions; Makes the best customer-agent match to drive desired outcomes; Keeps agents engaged and reduces handle times.
Tags : 
    
Genesys
Published By: Genesys     Published Date: Jun 19, 2019
Successfully managing a contact center requires a collaborative, multidisciplinary approach to handle a broad range of operational and tactical tasks. Planning, day-to-day operations and quality management must be seamlessly orchestrated, along with human resources functions like recruitment, learning and development, and employee scheduling. Read this executive brief to learn how to transition to an AI strategy that can take your team – and business results – to the next level. See how you can: Create an AI strategy with a single data model that includes routing, interaction analytics, forecasting/scheduling and predictive engagement Harness the power of your data to align customers with the best resource Drive employee effectiveness by ensuring you hire the right people and manage their performance to drive their success over the long term
Tags : 
    
Genesys
Published By: Red Hat     Published Date: Jun 19, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster. The following checklist will assess your needs and possible business impacts to help you choose a cloud-native platform that benefits the business, developers, and IT operations team.
Tags : 
    
Red Hat
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 19, 2019
WE LIVE IN A WORLD WHERE WORK IS NO LONGER A PLACE WHERE YOU GO. It’s what you do — a dynamic activity that people expect to accomplish anywhere, anytime, on any device. Supporting today’s workforce requires a digital platform that empowers productivity and ensures security and management at scale everywhere: on site, on the road, or in the cloud. According to IDC, by 2020, mobile workers will account for 72 percent of the U.S. workforce. And they won’t be just checking email. These workers want to be productive 24/7. That means access to data, documents, and corporate apps anywhere, anytime, on any device. Enterprises, however, are struggling to allow more workers to use additional devices from a multitude of locations.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Office 365 non e’ un’applicazione SaaS come le altre. La sua ‘fame’ in termini di banda larga e la sua sensibilita’ alla latenza rappresentano un vero ostacolo per le appliance tradizionali. Perche’? Perche’ la modalita’ di rete a stella non permette di offrire un’esperienza utente efficiente, aumentando allo stesso momento i costi d’implementazione. Office 365 puo’ trasformare la vostra attivita’, ma solamente con una rete addata al suo utilizzo. Scoprite in questa guida come le soluzioni Zscaler, raccomandate da Microsoft, possono aiutarvi alla migrazione verso Office 365.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
    
Zscaler
Published By: Sierra Wireless     Published Date: Jun 19, 2019
The IoT is transforming the energy industry by eliminating tradeoffs between operation, SCADA systems, maintenance and new services for assets deployed in industrial and power facilities, buildings and across the grid. When it comes to building the best IoT system for your business application, it’s vital to keep your use case and business requirements at the forefront of your technical design strategy. In the energy industry, accessing and collecting data at the edge from disparate, heterogenous, multi-site, fixed topologies and transferring that data efficiently to the cloud to perform analytics and action business decisions is still the greatest challenge. Mission-critical data collected from the edge is integral to energy facility operations and cannot be excluded or corrupted.
Tags : 
    
Sierra Wireless
Published By: Sierra Wireless     Published Date: Jun 19, 2019
By simplifying the ability of companies to securely extract, orchestrate and act on data from when it is generated by energy assets to when it is transmitted to the cloud, Octave simplifies the development and commercialization of Energy IoT applications. With Octave, energy companies are empowered to realize the Energy IoT’s tremendous potential, with new demand response, energy efficiency optimization, predictive maintenance and other applications that maximize the value created by energy assets and minimize their environmental impact. In doing so, these Energy IoT applications can reduce energy costs, improve customer engagement, lower greenhouse gas emissions and increase energy reliability. Start with Sierra to learn more about how our Octave D2C data orchestration solution can help you bring to market Energy IoT applications that reimagine the future of energy.
Tags : 
    
Sierra Wireless
Published By: MuleSoft     Published Date: Jun 18, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
In today's digitalized economy, web applications and the browsers that connect to them predominantly rely on the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt sensitive business information and personally identifiable information (PII) – such as customers’ credit card details, user account passwords, corporate sales and payroll data, etc. – before sending them securely over the internet. SSL/TLS encryption ensures information transmitted over the internet through e-mails, e-commerce and online banking transactions and a myriad of cloud and online services are kept secure.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Cybersecurity has been the #1 higher education IT concern for three straight years. Find out why identity plays an integral role in providing easy access to applications and files, while also securing sensitive data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: Barracuda     Published Date: Jun 18, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
    
Barracuda
Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise
Published By: Darktrace     Published Date: Jun 17, 2019
The self-learning capability of Darktrace’s Enterprise Immune System allows TruWest to stay ahead of today’s sophisticated attackers, affording the credit union and its clients confidence in the integrity of their data and in the security of their assets. And with Darktrace’s coverage of Office 365, TruWest’s entire digital environment is protected by world-leading cyber AI.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Law ?rms and legal services organizations have faced some of the costliest data breaches in recent years due to ?nancial penalties and the high rate of customer defection following compromise
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.