"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cases

Results 276 - 300 of 487Sort Results By: Published Date | Title | Company Name
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: VMware     Published Date: Nov 04, 2016
This 11-page whitepaper discusses the agility needs of today’s business, how IT is choosing a hybrid cloud approach to meet demand, and how hybrid cloud brings more agility but also increases management complexity in an environment that encompasses traditional architectures, private clouds, and public clouds. The paper outlines the role of a cloud management platform with vRealize® Suite for enabling faster and secure provisioning with monitoring and policy-driven controls. It highlights the 3 use cases (Intelligent Ops, Automated IT to Iaas, DevOps-Ready IT), the need for Day 1 and Day 2 capabilities, and how vRealize Suite helps automate IT.
Tags : 
    
VMware
Published By: VMware     Published Date: Nov 04, 2016
Managing a mix of private, public, and hybrid cloud environments is a challenge for even the most robust IT departments. An enterprise-grade cloud management platform (CMP) puts you back in charge. It allows you to manage heterogeneous multi-cloud environments as one, enabling rapid delivery of infrastructure and applications with no loss of control. This paper reviews the top three ways a cloud management platform from VMware can help you manage your environment more efficiently.
Tags : 
    
VMware
Published By: VMware     Published Date: Nov 07, 2016
In today’s digital economy, the ability to bring new software applications and updates to market quickly is a key to competitive advantage. For companies in diverse industries, the goal is the same: Get high-quality software into production as fast as possible. In this quest to accelerate release cycles, organizations must get beyond historical barriers that impede the rapid delivery of the software that keeps an enterprise competitive. In too many cases, processes tend to be inefficient, slow, and prone to failed releases. Much of the blame for the problem can be laid at the feet of organizational structures that mandate conflicting goals for the two key departments at either end of the application development chain: development/testing (dev/test) and operations. Where dev/test teams want to push their applications and updates into production quickly, operations teams want to go more slowly in order to maintain control and keep applications and systems available.
Tags : 
    
VMware
Published By: Tracx     Published Date: Mar 08, 2017
"With more than 2.3 billion active users worldwide, social media has officially gone from a ""nice-to-have"" to a ""must-have"" — and not just for consumer-facing companies. Listen as a panel of experts has a no-holds-barred discussion of how B2B CMOs can build A+ social businesses from the top down. In this webinar, you'll learn: *The biggest areas of opportunity for B2B social media *The 3 types of social CMOs *How to manage expectations and find your internal champions *Real-world use cases and best practices from CMOs just like you Hear from three socially savvy CMOs with a diverse range of experiences at companies large and small: Nick Panayi, Head of Global Brand & Digital Marketing at CSC; Jason Jue, CMO at Triblio; and Jenifer Kern, CMO at Tracx."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
    
Tracx
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
This short eBook provides a quick overview on specific use cases related to cloud application development such as Development and Testing in the Cloud, Extending SaaS Apps and Cloud Native Development.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IBM     Published Date: Sep 18, 2008
Unique serial numbers must now be applied to individual bottles of drugs and the cases that carry them in California, due to new tracking requirements. Read this white paper to learn how the IBM Serialization Pilot Kit with TAGSYS RFID is helping companies achieve compliance in less than a year.
Tags : 
compliance, rfid, radio frequency, ibm, ibm mmdg, inventory, wireless
    
IBM
Published By: SAS     Published Date: Aug 03, 2016
Failing to contain financial crime hits banks with the double impact of crime-related losses and fines imposed by regulators and law enforcement agencies. Depending on the magnitude of a bank’s failure to stem financial crime, fines can run into hundreds of millions of dollars – and even higher in exceptional cases. More importantly, institutions are keen to protect their brand from association with transnational organized-crime rings and scandals related to corruption.
Tags : 
best practices, productivity, finance, financial crime, security, business analytics, business intelligence
    
SAS
Published By: Gleanster Research     Published Date: Nov 21, 2013
This benchmark report from Gleanster Research showcases the benefits of Online Customer Community Solutions. You'll learn what to look for, how to overcome challenges, as well as analyst commentary on the full vendor landscape.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Jul 25, 2012
It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management, ip storage, storage management, storage virtualization, cloud computing
    
IBM
Published By: IBM     Published Date: Aug 01, 2012
Read this white paper to learn how you can detect and prevent fraud and focus audits on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, ibm, tax adjustments, tax fraud, prevent fraud, detect fraud, technology
    
IBM
Published By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, storage, data management, technology, data center
    
SunGard
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
    
CDW
Published By: CDW     Published Date: Jun 14, 2016
Mobile devices and apps have transformed the way enterprises operate in recent years, improving productivity, communication and collaboration, and in many cases completely changing how work gets done. To help optimize mobility initiatives, many organizations turn to trusted IT partners that can help maintain mobile deployments and free up staff to focus on innovation.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, productivity, mobile computing, mobile data systems, wireless communications, contact management, content delivery
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
IT decision-makers at most enterprises understand the benefits that the cloud has to offer: increased agility and more predictable budgeting, among others. In many organizations, in fact, “cloud first” has become the mantra when seeking out new software solutions. But often, enterprises are less clear on the specific use cases of Infrastructure as a Service (IaaS) and how providers can help deliver IT capabilities that meet their needs and help them to achieve desired business outcomes.
Tags : 
technology, cloud, data, productivity, enterprise, business management, best practices, business analytics, business intelligence, data center
    
CDW
Published By: McAfee     Published Date: Apr 25, 2014
McAfee® Threat Intelligence Exchange and the McAfee Security Connected Platform can help integrate workflows and data to overcome siloed operations and shift the security model to agile, intelligent threat prevention. This paper describes three use cases to illustrate the benefits.
Tags : 
advanced malware, security, suspicious files, dynamic sandboxing, static analytics, threat prevention, mcafee network security, mcafee web gateway, mcafee email gateway, it management
    
McAfee
Published By: Polycom     Published Date: Apr 30, 2013
This research note identifies the key trends, the video-enabled business applications that enterprises need to implement now, and describes how to develop a video strategy. Knowing how video is currently being used will help managers identify use cases, understand what users need to get their jobs done, and choose the right solutions for their enterprises.
Tags : 
enterprise, video collaboration, research, consumerization, mobile, cloud, video conferencing, wireless hardware, best practices, change management, collaboration
    
Polycom
Published By: Tripp Lite     Published Date: Sep 11, 2014
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. Users may assume that they need to increase cooling capacity, but this is expensive and often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
cooling, efficiency, heat-related, server rooms, data center, computing, equipment, performance, shutdowns, airflow, downtime, optimize, haphazard, rack enclosures, spot cooling, rack cooling, best practices
    
Tripp Lite
Published By: NetApp     Published Date: Sep 24, 2014
41% of ESG research respondents reported that the cloud enabled them to realize IT cost reductions with 26% seeing improvements in productivity.  Learn how you can achieve these benefits by reviewing common IT scenarios detailed in private and hybrid cloud, data protection, BYOD and data movement use cases.
Tags : 
data center, cloud, cost efficient, cloud delivery model, it costs, productivity improvement, enterprise applications, data management
    
NetApp
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, security
    
Intel Security
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Spend more time building great apps and less time managing server infrastructure. Get your solutions to market faster using Azure Functions, a fully managed compute platform for processing data, integrating systems, and building simple APIs and microservices. In this e-book you’ll find use cases, hands-on steps, and tutorials for quickly configuring your own serverless environments. Explore best practices for Functions, and learn how to: Develop event-based handlers on a serverless architecture. Test, troubleshoot, and monitor Azure functions. Automate administrative tasks from development through to deployment and maintenance. Integrate Functions with other Azure services. Build stateful serverless apps and self-healing jobs using Durable Functions. Download the 325-page serverless computing e-book and get access to dozens of step-by-step recipes for quickly building serverless apps.
Tags : 
    
Microsoft Azure
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory