wan op

Results 451 - 475 of 624Sort Results By: Published Date | Title | Company Name
Published By: Silver-Peak     Published Date: Mar 21, 2012
This whitepaper shows how you can finally meet your recovery objectives, provide seamless failover between multiple sites, improve remote application performance, and lower your ongoing bandwidth costs.
Tags : 
wan, optimization, technology, network management, bandwith
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
The cloud brings server, storage, networking, and computing together. When deploying cloud, organizations need to look at server virtualization and virtual WAN optimization as a solution.
Tags : 
cloud computing, technology, silver peak, network management, wan
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
Choose the hypervisor flavor of your choice. Download the software. Get the license keys in your mailbox. And off you go. No sales call. No waiting.
Tags : 
wan optimization, wan op, silver peak, technology, network management, network performance, bandwith
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
Limited bandwidth, long distances and poor network quality prohibit cost reductions for today's critical IT initiatives. Your IT organization needs WAN optimization that can be deployed anywhere, on any platform, and for the lowest cost. See how the new Gartner Magic Quadrant for WAN Optimization Controllers can help.
Tags : 
wan optimization, technology, magic quadrant, wan op, wan op controllers, silver peak
    
Silver-Peak
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Need to fix your company's performance management? Want to make woeful performance reviews a thing of the past? Collect actually useful data and actually use it? Build a robust people strategy? Ensure your company's ongoing success? Take over the world (of successful performance management)? Download this paper to learn more.
Tags : 
performance management, human resources
    
CSB by Cornerstone on Demand
Published By: Silver Peak     Published Date: Feb 12, 2013
An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.
Tags : 
virtualization, wan, optimization, data center, network, reliability, high availability
    
Silver Peak
Published By: Silver Peak     Published Date: Feb 12, 2013
If you find yourself in need of a WAN optimization solution you’ll want to download this report to understand what’s new in the WAN optimization market, what vendors are the key players, and which products are most appropriate for your needs.
Tags : 
wan, virtualization, optimization, data center, network
    
Silver Peak
Published By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : 
enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization, application
    
Silver Peak
Published By: Silver Peak     Published Date: Jun 24, 2013
Running multiple data centers can be costly and complex. While using shared WAN links is a viable option for cutting costs, many organizations would rather incur the additional expense of private lines than sacrifice performance. This resource details the challenges of sharing WAN links and explores how WAN optimization – which employs a set of technologies to improve the bandwidth, latency, and loss characteristics of WAN links – can help you achieve the private line performance you need without the high price tag.
Tags : 
data centers, wan links, optimization, technology, improve bandwidth, boost performance, disaster recovery, backup
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
The Enterprise Strategy Group discusses how data center consolidation, virtualization, and cloud architectures are on the rise; however IT budgets are not increasing. This poses a unique challenge: How do you crease a flexible and agile environment without increasing the cost? See ESG’s analysis of WAN optimization benefits and how your peers are increasing their ROI and lowering their TCO.
Tags : 
silver peak, wan, wan optimization, roi, virtualization, cloud architecture, tco
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching
    
Silver Peak
Published By: Silver Peak     Published Date: Apr 18, 2014
Gartner has published its latest Magic Quadrant for WAN Optimization. Be among the first to get complimentary access to this new report now! Silver Peak is leading the way into a new era of software-defined WAN optimization. Now more than ever, organizations like yours depend on the wide area network to connect their data centers, branch offices and the cloud. They see that better network performance means better bottom-line results, and Silver Peak gives them the most comprehensive and flexible options for network acceleration, and the most innovative approach to the next-generation WAN.
Tags : 
wan optimization, silver peak, gartner, software-defined, wide area network, data centers, next-generation wan, netowork acceleration, cloud, cloud computing, magic quadrant
    
Silver Peak
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users
    
Intralinks
Published By: Mobify     Published Date: Jan 27, 2015
We at Mobify want to help you further deepen your understanding of the mobile shopping landscape and the expectations of mobile consumers. In this white paper, you’ll discover: - Why ‘omnichannel’ is not a buzzword, but the new retail reality - What the key differences are between smartphone and tablet users and what this means for your bottom line - Why Millennials are a market that you can’t afford to ignore - How your mobile presence can make or break a customer’s in- store experience
Tags : 
mobile website, responsive ecommerce website, mobile conversion optimization, mobile shopping, mobile retail, mobile e-commerce, omnichannel app, make responsive website, ecommerce mobile, e-commerce mobile, mobile retail website, mobile app development, mobile shopping platform, ecommerce mobile website, retail app development, mobile ecommerce solutions, ecommerce app development, ecommerce mobile site, mobile ecommerce site, mobile ecommerce website
    
Mobify
Published By: NetApp     Published Date: Dec 05, 2016
With customers demanding higher service levels, enterprise applications need to be fast and available at all times. Flash storage is the obvious choice if you want to make the best use of your IT resources and get the most from your applications, but which flash solution should you choose? This eBook discusses nine specific areas where NetApp ONTAP flash storage systems enable business breakthroughs. Topics include nondisruptive operations, cost economies, business agility, and providing a bridge to the hybrid cloud.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform
    
Acquia
Published By: Gigaom     Published Date: Oct 02, 2019
Hyperconvergence is now at the core of many IT infrastructures. No matter the size of your organization, you need to protect infrastructure, applications, and the data necessary to run your business and compete at its best. There are several solutions to protect your data, retrieve and reuse it when necessary. Ease of use, speed, and efficiency are at the base of modern backup tools, but there is now more to take into account if you want to transform a liability into an asset. In this free 1 hour webinar, GigaOm analyst Enrico Signoretti will be joined by Alan Conboy from Scale Computing and Jon McCarrick from Acronis to talk about modern data protection strategies and solutions aimed at simplifying infrastructure while increasing the value of data. In this 1-hour webinar, you will discover: Why data protection should be integrated into your HCI Data protection options: Snapshots, backups, DR and beyond New threats and new solutions Backup as a tool to make more of your data
Tags : 
    
Gigaom
Published By: Jobvite     Published Date: Mar 31, 2015
The recruiting industry is not what it used to be. Jobs, technology, candidates, and strategies have all changed immensely over the past few years, as STEM positions proliferate, social media explodes, and a new generation of workers—complete with new habits, wants, and needs—has emerged. You've probably felt the impact of this evolution firsthand, and you've realized that it doesn't matter how many people are actually out there looking for jobs (or not looking for them, as the case might be). If you’re having trouble finding the right candidates for the right positions at the right times, you’re dealing with a talent shortage. In this eBook, we outline four critical ways you can ensure the development of a rich talent pool.
Tags : 
talent pool, recruiting, technology, strategy, hiring, jobseekers, social media, employment, experience, sourcing, talent pools
    
Jobvite
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security
    
Code42
Published By: IBM     Published Date: Mar 28, 2016
Attracting talented job candidates is one of the biggest challenges facing HR in the next 10 years.1 Understandably, organizations want top talent and they are highly focused on recruiting strategies that enable them to hire the very best. One increasingly popular strategy is mobile recruitment. As mobile devices become ever more ubiquitous, potential candidates are starting to look more favorably at organizations offering a mobile recruitment option.2 But are all candidates created equal when it comes to mobile recruitment? We decided to take a look at the coveted members of the workforce and explore their use of and attitudes towards mobile recruitment. Using the high-potential employees subset of our global WorkTrends™ survey data, we were able to compare top talent, who significantly outperform their peers and demonstrate a stronger capacity to succeed,3,4 with other employees. The results provide new insight into mobile recruiting and guidance for organizations looking to attract
Tags : 
ibm, recruiting, mobile recruiting, mobile recruitment
    
IBM
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
• Do you want to win with AI in the hybrid, multi cloud world? Are you tackling data, algorithms and apps to drive business value from AI? We got you covered. Come and learn how you can simplify and scale your AI projects on Watson Studio. Hybrid cloud use cases spanning cloud, desktop and local are featured. Key Takeaways: • Open, trustworthy and secure approach to put AI to work for business • Go live and scale faster with AI-infused platform • Build train and deploy models across hybrid, cloud environments – including popular public cloud environments like AWS and Azure • Flexibility for cloud, on-premise and desktop deployment, bringing algorithms to wherever data resides • Progressing your AI/data science with Watson Studio • Register now and get ready to simplify and scale your AI investments to work for your business.
Tags : 
    
Group M_IBM Q119
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.