"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cases

Results 1 - 25 of 385Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Jan 16, 2018
Everywhere you turn there’s another thought leader or business strategist talking about the importance of digital transformation. In an IT survey conducted by MuleSoft, more than two-thirds of IT decision makers (ITDMs) said they were undertaking digital transformation initiatives. One of the key factors to achieving digital transformation is organizational agility. In this whitepaper we will discuss the measurable and quantifiable benchmarks to achieving greater agility and show how, by implementing an application network, companies in numerous industries were able to meet and, in many cases, exceed those benchmarks.
Tags : 
    
MuleSoft
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: SAP     Published Date: Jun 18, 2011
To stay ahead of the competition in a global marketplace, firms are increasingly speeding up operations, in many cases adopting real-time systems and tools to allow for instant decision-making and faster business cycles. Download here to learn how.
Tags : 
real-time business analytics, faster decision making, business automation, business metrics, analytical data, sap, best practices, business analytics
    
SAP
Published By: Cyren     Published Date: Jan 03, 2018
Cyren examined 11.7 million inbound emails at companies using various email security solutions to measure any possible “security gaps” in their protection,and identify any potential risks for the companies. Solutions tested ranged from hosted email services with included security filtering to on-premises email security gateways. The study was conducted during September and October 2017, and revealed that, on average, 10.5% of email delivered to users after being scanned by their current email security solution was spam, phishing, or malware email. The report also summarizes results for three separate cases, which illustrate how penetration rates can vary across different companies.
Tags : 
anti spam, email security, email fraud, email archiving, office 365, cyber threats, phishing, malware
    
Cyren
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Entry-level package options For organizations looking for protection with more basic functionality, we have three additional Umbrella packages designed for entry-level use cases.
Tags : 
performance, protection, enforcement, visibility, management, platform package exclusive
    
Cisco EMEA Tier 3 ABM
Published By: SAP     Published Date: Nov 17, 2016
Gartner’s Critical Capabilities for Human Capital Management (HCM) evaluates solutions in the context of specific, important use cases and provides a comparative analysis. SAP SuccessFactors received highest use case scores for Core HR+Talent HCM Suites for Larger Global Org and European HQ’d Midmarket HCM Suite.
Tags : 
sap, human resources, gartner, employee, cloud, hcm, enterprise
    
SAP
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 12, 2017
The ways in which the Internet supports our everyday lives have become richer, more engaging, and more mobile. This innovation is driven by the visionaries, designers, developers, and managers of the web experiences that users consume every day. By exploring new ways to solve challenges and improve products and services that enrich our lives, developers and business owners have stretched the Internet to support use cases for which it was never designed. In order to succeed, modern web experiences must seem simple to end-users, even though most ultimately require complex design and technology to deliver.
Tags : 
web experience, web design, mobile, internet supporters
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid-state arrays (aka Flash Storage) are improving at a rapid pace, while costs are of Flash Arrays are declining. Gartner has analyzed 19 Solid-State Array products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
    
Hewlett Packard Enterprise
Published By: Samsung     Published Date: Dec 18, 2015
This paper will outline the value of the Internet of Things, highlight several key use cases, address the issues of privacy and security, and offer best practices for achieving success.
Tags : 
    
Samsung
Published By: Cisco     Published Date: Dec 04, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wan, applications, design guide, summary, technology, infrastructure, network architecture, network management
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking, it management
    
Cisco
Published By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking, software development
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities.
Tags : 
cisco, wan, design guide, dmvpn, qos, networking, security, enterprise applications
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
customer engagement, business practices, technology, design management, wireless communications, best practices, business intelligence, customer experience management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
business models, development, business solutions, best practices, business intelligence, business process management, productivity
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
design guide, customer engagement, design management, system management, best practices, business intelligence, productivity, project management
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
The Internet of Things can bring big benefits. But what exactly is IoT, and how are different industries taking advantage of it? This TDWI e-book explores in detail what IoT and the Industrial IoT (IIoT) do for retailers, the automotive industry, state and local governments working with utilities firms, and the manufacturing industry. Common themes include connectedness, data-driven insights, predictive capabilities and transformation.
Tags : 
    
SAS
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega
Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management
    
Pega
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory