"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cases

Results 51 - 75 of 487Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 12, 2015
This business-oriented white paper explains four options for starting your Hadoop journey. This paper also outlines the benefits of Hadoop and highlights some of the many use cases for this new approach to managing, storing and processing big data.
Tags : 
    
Dell EMC
Published By: Zebra     Published Date: Oct 12, 2011
This white paper outlines the requirements for kiosks - optimizing design, placement and component selection - in order to help you and your business meet specific use cases, various environments and goals.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, business analytics, business intelligence
    
Zebra
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Sitecore     Published Date: Mar 04, 2016
Start your WCM selection process by documenting your goals and desired outcomes to refine your definition of success. Then prioritize use cases according to your goals, and use this report to identify the WCM system that best matches your needs. Register today!
Tags : 
    
Sitecore
Published By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within K-12 education can be a challenge with so many uses and options available. This use case guide takes into consideration the specific needs within K-12 education environments. Whether seeking the best fit devices for STEM labs, looking to create interactive learning spaces, or fulfilling the design needs of today’s interactive classrooms, the uses are varied and there is not a one size fits all approach. Download this guide to learn how the computing choices made can facilitate the teaching and learning environments via the Dell™ OptiPlex™ family of devices. Learn which solutions are recommended for different use cases within the K-12 education world.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
    
Dell EMC
Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation, network architecture, network management, network performance, traffic management, tunneling, virtualization, infrastructure
    
Brocade
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: Pega     Published Date: Apr 04, 2016
In today’s “always on” digital world every point of engagement with a customer—from a service call to a marketing email—is a critical moment for retail banks where the customer relationship is put to the test over and over again. And while in most cases banks are delivering satisfactory customer service to their clients, they are missing key opportunities to provide deeper personalization. With nearly one in four consumers saying they would start looking for a new bank if they received poor customer service, banks need to evolve with their customers and always be looking at innovative ways to communicate and service them more efficiently. Download this research study and get a deeper understanding of the challenges facing today’s banks and the technology solutions they must embrace to keep pace with consumer demands.
Tags : 
    
Pega
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Oracle     Published Date: Nov 08, 2017
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. Explanation of the Oracle IaaS solutions and cases studies.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
    
Entrust Datacard
Published By: Pega     Published Date: May 24, 2016
In today’s “always on” digital world every point of engagement with a customer—from a service call to a marketing email—is a critical moment for retail banks where the customer relationship is put to the test over and over again. And while in most cases banks are delivering satisfactory customer service to their clients, they are missing key opportunities to provide deeper personalization. With nearly one in four consumers saying they would start looking for a new bank if they received poor customer service, banks need to evolve with their customers and always be looking at innovative ways to communicate and service them more efficiently. Download this research study and get a deeper understanding of the challenges facing today’s banks and the technology solutions they must embrace to keep pace with consumer demands.
Tags : 
    
Pega
Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security, enterprise applications
    
ForeScout
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
Business models are less durable than they used to be… [they] are subject to rapid displacement, disruption, and, in extreme cases, outright destruction. The basic rules of creating and capturing economic value were once very rigid. Companies tried to execute the same business models better than their competitors did. That doesn’t have to be the case anymore. Unlike product and service innovations, business-model innovations travel well from industry to industry
Tags : 
    
Oracle Commerce Cloud
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence, storage, network management, network performance, analytical applications, information management
    
SolidFire_NetApp
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
Published By: HPE APAC     Published Date: Feb 23, 2017
Read this extract and the full reports to find out people's perceptions regarding hyperconverged infrastructure and includes overall IT challenges, sentiment around the technology and an in-depth look at key uses cases that are supported by the technology.
Tags : 
hyperconverged infrastructure, data center, storage, it challenges
    
HPE APAC
Published By: Sitecore     Published Date: Mar 27, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
    
Sitecore
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: IBM APAC     Published Date: Aug 25, 2017
New seismic and disruptive events are upending the pace of innovation – and leading companies are jumping into the fray, trying to differentiate themselves through emerging business models. But here is the hard truth: Enterprises are wasting money, resources and time putting on a facade of innovation that falls short of customer and shareholder expectations. There is an inherent expectation that these incremental, and in many cases “siloed,” investments or initiatives will lead to sustained business impact. The time has come to move beyond “innovation theater” into a more mature adoption of innovation that drives measurable business results. Now is the time for Innovation 2.0.
Tags : 
corporate culture, accountable business, risk, leveraging market differentiators, portfolio, investments
    
IBM APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory