"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cases

Results 226 - 250 of 465Sort Results By: Published Date | Title | Company Name
Published By: Aruba Networks     Published Date: Jul 03, 2013
The increased performance and higher capacity of 802.11ac have tremendous appeal for organizations rapidly approaching the limits of their current Wi-Fi network, or for organizations that are striving to adopt next-generation applications or interactive network experiences. To help identify these opportunities, this brief represents the top use cases for adopting 802.11ac technology today.
Tags : 
802.11n, 802.11ac, ieee, enhancements, reliability, 5-ghz, capacity
    
Aruba Networks
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco, mobile computing, mobile data systems, mobile workers
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities.
Tags : 
wifi, wireless, technology, network, cisco, cvd, deployment, mobile computing, mobile data systems, mobile workers, wireless hardware, wireless infrastructure, wlan
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco, infrastructure, service management, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
networking, api, applications, management, visualizing, best practices, design, cvd, cisco, migration, network architecture, network management, service management, cloud computing, data center design and management
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
This edition of Unleashing IT showcases Cisco’s holistic approach to the future of networking: application Centric Infrastructure (aCI). Promoted by Cisco, Intel®, and ecosystem partners, aCI is a true innovation that changes the way technology is delivered in support of business priorities.
Tags : 
api, applications, monitoring, application management, communications, cisco, infrastructure, best practices, productivity
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
    
Cisco
Published By: Dell Software     Published Date: Feb 20, 2014
Short: Evaluate seven cloud integration platforms from leading vendors for the value they offer organizations in cloud-to-cloud, cloud-to-on-premise and on-premise-to-on-premise application integration use cases.
Tags : 
integration, platforms, application integration, cloud, cloud to cloud, data management
    
Dell Software
Published By: Dell EMC     Published Date: Mar 18, 2016
EMC has recently enhanced its VNX block-based deduplication technology enabling flexible data reduction across a wide variety of use cases from virtual desktops to virtual servers and databases. While block-based deduplication is not new for VNX, this latest enhancement, according to EMC, offers up to a 3x better performance at half the response time.
Tags : 
emc, vnx, hybrid flash, deduplication, block-based, data reduction
    
Dell EMC
Published By: Amazon Web Services     Published Date: Sep 18, 2017
This eBook will introduce you to the compliance capabilities that can be achieved by using AWS services and its featured partners in healthcare and life sciences. In this eBook, you can learn how to build cloud-based healthcare solutions for HIPAA and other frameworks, as well as how to regulate workloads on the cloud for life sciences organizations. Download this eBook to learn more and to read actual customer use cases illustrating how healthcare and life sciences organizations can leverage AWS to help them with their compliance requirements.
Tags : 
    
Amazon Web Services
Published By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : 
genesys, contact center infrastructure, cci, contact center engagement, cec
    
Genesys
Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In today’s highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engaged—employees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit today’s mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Datastax     Published Date: Apr 04, 2017
Graph databases are changing how we use data. But first, an example – you're (probably) a human working on a project and looking at graph databases as a potential solution. While we're a company that has a graph database that hopefully solves your problem. Now we could store that data in a boring relational database, but how do we do more than that? For instance, using that data, when combined with other data points, to find other people like you and recommend our solution to them? This is where a graph can come in handy. The friendly graph data model makes it easy to use patterns of relationships within large data sets. By leveraging those relationships we can analyze, or create better real-time experiences. Why Graph explores why this graph database 'thing' is really a thing, how they compare to other database systems, and the use cases they best support.
Tags : 
graph, database, datastax
    
Datastax
Published By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
    
Mitto
Published By: MemSQL     Published Date: Nov 15, 2017
The Path to Predictive Analytics and Machine Learning This Ebook will be your guide to building and deploying scalable, production-ready machine-learning applications. Inside, you will find several machine learning use cases, code samples to help you get started, and recommended data processing architectures.
Tags : 
data pipelines, analytics, database, machine learning
    
MemSQL
Published By: MemSQL     Published Date: Nov 15, 2017
Data Warehousing in the Age of Artificial Intelligence This Ebook will guide you through building and deploying scalable, production-ready artificial-intelligence applications. Inside, you will find several artificial intelligence use cases, code samples to help you get started, and an outline of high throughput data processing architectures necessary for developing AI applications.
Tags : 
data warehousing, artificial intelligence, data piplelines
    
MemSQL
Published By: Anaplan     Published Date: Sep 07, 2018
The findings of FSN’s Innovation in the Finance Function global survey prove insightful and compelling—and highlight the critical role that innovative planning technology plays in the field of finance. Organizations today are evolving their operating models in conjunction with rising globalization, the value of big data, technological advances, regulatory changes, and demographic shifts. They are also in pursuit of business growth with the same or—in some cases—fewer resources than before.
Tags : 
    
Anaplan
Published By: Infosys     Published Date: May 21, 2018
Ever wondered where your favorite restaurant gets its everyday food supply from? Chances are they are sourcing that caviar and truffle oil from a food service distributor. For our client - a broad-line food distributor delivering over a billion cases of food products to restaurants, healthcare, and educational institutions across the world, every year - ensuring accuracy quality, and compliance was no mean task.
Tags : 
healthcare, products, restaurants, institutions, educational
    
Infosys
Published By: Cisco     Published Date: Apr 08, 2014
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, cvds, vpn wan, it management, knowledge management
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, security, it management, wireless
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
Higher education has come under increasing scrutiny as never before due to rising costs, changes in future job requirements, and new forms of learning opportunities offered by non-traditional companies and institutions. Students and parents are rightfully questioning the value of higher education based on perceived outcomes as well as staggering student loans that in some cases could take a lifetime to pay back. While the value equation debate rages on, there is another phenomenon taking place. It is nothing short of a revolution regarding the advances in technology and how institutions of higher learning along with nontraditional organizations are utilizing these powerful new tools. These new tools include new mobile devices, enhanced and feature-rich learning management systems, data-feeding sensors, 3D printers, smart classrooms, smart buildings, and collaboration tools allowing students and faculty to collaborate just about anywhere face-to-face, virtually.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, it management, wireless
    
Cisco
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations, it management, data mining, networking, network technology, network optimization, business analytics, application, application security
    
Extreme Networks
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The foregoing use cases—all with varying levels of complexity—are an overview of the creative development opportunities afforded by OpenDXL. We hope these have inspired you to start your own OpenDXL project. Bookmark and explore these pages for core resources.
Tags : 
opendxl, integrate, orchestrate, expedite, security, operations
    
McAfee EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Special Report

Learn why next generation ERP should be the center point of all finance processes and how it connects to all parts of the business to provide an up-to-date view of the entire value chain.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory