Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

internet

Results 251 - 275 of 1523Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Jan 22, 2017
Alors que vous pensiez avoir  ni dexplorer tous les domaines du digital, le paysage a de nouveau changé. Sachant que les ventes sur Internet et via les canaux mobiles représenteront presque 40% du total des ventes à compter de 2018, il est impératif que les canaux digitaux génèrent du chi re da aires.
Tags : 
    
Adobe
Published By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : 
media, media companies, broadcasters, content, create content, audience, deliver content, content management
    
Equinix
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content, content management system
    
Equinix
Published By: iPass     Published Date: Dec 20, 2012
Today’s distributed enterprises find themselves with two primary WAN options for consideration: MPLS or an Internet IP VPN solution.
Tags : 
network, wan, vpn, mpls, enterprise, connectivity, networking
    
iPass
Published By: AppDynamics     Published Date: Sep 20, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
secure, performance, portable, architecture, software, hardware, java
    
AppDynamics
Published By: Schneider Electric     Published Date: Apr 23, 2019
The supply chain for manufacturers and distributors is facing challenges around increased analytics, multichannel fulfillment, talent shortages, and the use of new technologies such as wireless, augmented reality, robotics and machine-to-machine (M2M). At the same time, there is continued focus on cost reduction and sustainability. The Industrial Internet of Things is driving a huge transformation as it increases the interconnection between connected devices and analytics. The smart manufacturing enterprise can seize opportunities to maximize efficiency and safety through networking and intuitive collaboration with its users. This eBook shares practical steps to follow for a smart material handling and logistics approach.
Tags : 
material handling, logistics, conveying
    
Schneider Electric
Published By: Schneider Electric     Published Date: Apr 24, 2019
The fourth industrial revolution is well underway. It focuses on digital transformation and creation of the Industrial Internet of Things (IIoT). A key part of this revolution is technology that enables new realities—including virtual reality (VR), augmented reality (AR), and mixed reality (MR). These new realities are already being applied in industrial settings and are poised to grow exponentially in the next few years. This storyscape dives into use cases for each type of reality and presents the benefits of each in relation to industrial automation.
Tags : 
augmented reality, industrial revolution
    
Schneider Electric
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise
Published By: Teradata     Published Date: Jan 30, 2015
Data from the Internet of Things makes an integrated data strategy more vital than ever.
Tags : 
teradata, internet, things, iot, data, warehouse, analytics, patchwork
    
Teradata
Published By: Oracle     Published Date: Aug 17, 2017
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
Oracle
Published By: Cisco     Published Date: Jun 10, 2015
Read Pay Attention IT: A New Convergence Is Afoot to learn about the necessary steps you need to take now for your organization to best benefit from the Internet of Everything.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, iot, convergence
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
Read Pay Attention IT: A New Convergence Is Afoot to learn about the necessary steps you need to take now for your organization to best benefit from the Internet of Everything. Take this opportunity to ensure that your team’s continued mission of IT in government is successful.
Tags : 
convergence, iot, government, itil, productivity, service management
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Internet of Everything is driving transformation.
Tags : 
transformation, network, dod, application integration, business integration, business intelligence, productivity
    
Cisco
Published By: Cisco     Published Date: Sep 17, 2015
Understanding the Internet of Everything
Tags : 
convergence, iot, government, network architecture, cloud computing, data center design and management
    
Cisco
Published By: Cisco     Published Date: Sep 17, 2015
The Internet of Things (IoT) stands to fundamentally transform public sector service delivery.
Tags : 
convergence, iot, government, network architecture, data center design and management
    
Cisco
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Published By: Dyn     Published Date: Apr 27, 2016
In this report, author and middle-mile expert Andy Still maps your cloud journey from initial preparation to having your own highly performant cloud-based system. At each stage, you’ll learn the best methods for optimizing Internet Performance by understanding: • The nature of your application • The characteristics of your end users • The way various cloud providers can connect one to the other
Tags : 
dyn, internet performance management, online performance, cloud migration, hybrid cloud, cloud computing
    
Dyn
Published By: Dyn     Published Date: Apr 27, 2016
Download the newest TechTarget whitepaper and learn how to: - Optimize infrastructure spend - Overcome foundational business challenges - Gain and retain new customers - Increase brand loyalty and partner relations...and more
Tags : 
dyn, internet, internet performance, customer relations, cloud, it efficiency, network performance, network performance management
    
Dyn
Published By: Dyn     Published Date: Apr 27, 2016
Download this whitepaper and learn: - The six macro trends driving the need for application, network and Internet performance management solutions - Key insights you've been missing when it comes to your portfolio of online assets, and how they interact with the public Internet - How you can receive a true "end-to-end" view into Internet performance and ensure availability and implement advanced traffic steering capabilities to your existing infrastructure
Tags : 
dyn, internet performance, internet performance management, network management, network performance, network performance management, cloud computing
    
Dyn
Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security, internet security, security, enterprise applications
    
Mimecast
Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security, cyber attacks, security, enterprise applications
    
Mimecast
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search