paradigm

Results 76 - 100 of 138Sort Results By: Published Date | Title | Company Name
Published By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
VMware, Inc
Published By: Polycom     Published Date: Mar 06, 2017
Education today is described as between paradigms from the traditional to the digital. Students expect a highly engaging interactive learning environment, not stagnant instructor-led designs. Learning technologies, and changing pedagogical methods, are not only changing the way we teach but also the physical environments we teach in. Download now to learn more.
Tags : 
polycom, education, education technology, students, public sector, global connectivity, education sector, enterprise applications
    
Polycom
Published By: Lenovo and Intel®     Published Date: May 02, 2017
Body cam technology produces terabytes of data to manage and maintain. It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content?—?and that makes HUGE demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions.
Tags : 
    
Lenovo and Intel®
Published By: IBM     Published Date: Aug 26, 2019
Cyberspace is extremely difficult to secure. The basic approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon. In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: Menlo Security     Published Date: Nov 11, 2019
"Secure Cloud Transformation: Adopt SaaS applications and Manage Large Increases in Traffic Volumes without Sacrificing Security Traditional cybersecurity solutions continue to use outdated and ineffective detect-and-respond strategies—a risky security approach for organizations moving critical business systems to the cloud. Menlo Security sees enterprises transforming their infrastructure driven by the adoption of SaaS. The adoption of SaaS is happening faster than people anticipated in the average enterprise. Secure cloud transformation is about how you can take control of this sea change and undertake the transformation on your terms. Read “Secure Cloud Transformation” to Learn: - Why security has moved to the cloud yet has failed to adapt to the changing cloud paradigm - How a cloud security platform powered by isolation fundamentally changes the way organizations protect users - The top four requirements of a cloud-based security platform It’s clear that security isn’t keeping
Tags : 
    
Menlo Security
Published By: AWS     Published Date: Dec 03, 2019
Cities both produce large amounts of data and also consume large amounts of data. Analyzing this data can help policy-makers make more informed decisions and may uncover opportunities to optimize processes and systems and to reduce costs. It might also ultimately contribute towards better city planning, improving the quality of life of citizens. This white paper describes what is making cities “smarter”, how this modernization benefits citizens and the technologies behind these transformations. To fully take advantage of the technological revolution, leaders in each city need to better understand how to leverage all the data that is gathered, as well as the technologies behind the new “smart cities” paradigm. Local leaders need a holistic strategy to harness the power of this newly available data by removing unnecessary barriers for data processing and usage while taking into account security concerns.
Tags : 
    
AWS
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: MuleSoft     Published Date: Apr 15, 2019
The healthcare industry has been affected by disruption and the need for healthcare innovation. Legislative, market, and technology pressures make it imperative for healthcare organizations — including hospitals and health systems, payers, and life sciences companies — to become more agile. IT teams in the industry are considering a microservices-based architecture as a means of accelerating healthcare innovation and increasing project delivery speed. MuleSoft research suggests that application development productivity increases of up to 10x are possible. Healthcare specifically stands to benefit from this architectural paradigm. This whitepaper will address: Why microservices matter for healthcare IT teams and for healthcare innovation Design principles for a microservices architecture How Anypoint Platform can help you implement microservices best practices
Tags : 
    
MuleSoft
Published By: Darktrace     Published Date: Apr 02, 2019
As organizations increasingly rely on cloud services and SaaS applications to streamline business practices, the familiar paradigm of the network perimeter has dissolved, leaving a porous and ever-changing digital estate in its wake. While the benefits of cloud computing will ensure that migrations continue apace, the unique security challenges presented by the cloud will not only require a more agile mindset, but also self-learning technologies that can move at the speed of cloud deployments and spot subtle deviations indicative of a threat, while providing complete, real-time visibility across the digital business. Darktrace’s world leadership in the field of artificial intelligence for cyber security makes it the most effective and proven solution to detect unprecedented threats and anomalous cyber-incidents in the cloud. Whether faced with an insider threat, an attacker targeting sensitive data in test containers, or a significant misconfiguration that could be exploited in the fut
Tags : 
    
Darktrace
Published By: Comcast Business     Published Date: Mar 24, 2015
New research findings, new technologies, and the evermore urgent needs for speed and cost-efficiency are converging to drive a revolution in medicine. Supporting this convergence are high-speed secure telecommunications networks, enabling unprecedented teamwork among institutions, researchers, practitioners and patients to create a new paradigm: telemedicine, the exchange of medical information via electronic communications among dispersed facilities and patients to improve patient health. Download this white paper to learn more about telemedicine.
Tags : 
bandwith, ethernet communications, medicine, telemedicine, telecommunications, healthcare technology, networking, it management
    
Comcast Business
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, business technology
    
Intralinks
Published By: NetApp     Published Date: Sep 24, 2013
Many organizations have adopted virtualization as a standard for server workloads. But virtualization has not proven to be the “game changer” many organizations had envisioned. IT departments face huge challenges related to server sprawl, which has actually increased with virtualization. Although virtualization has brought benefits beyond the physical paradigm of one operating system per server, the true optimal infrastructure for organizations comes with adopting a private cloud infrastructure. Check out this white paper to learn the benefits of a private cloud and discover how deploying one private cloud solution can provide: Consolidated resources Flexible services Easy provisioning of new environments And more
Tags : 
best practices, private cloud, netapp, cloud, technology, windows server, security, data center
    
NetApp
Published By: Aon Hewitt     Published Date: Apr 22, 2014
Download our business brief to learn more about the changing health care landscape and how private health exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees and providers.
Tags : 
corporate health exchange, active health exchange, private health exchange, aon hewitt exchange, aon exchange, aon health exchange, corporate health care, health benefits
    
Aon Hewitt
Published By: Vertica     Published Date: Oct 30, 2009
Independent research firm Knowledge Integrity Inc. examine two high performance computing technologies that are transitioning into the mainstream: high performance massively parallel analytical database management systems (ADBMS) and distributed parallel programming paradigms, such as MapReduce, (Hadoop, Pig, and HDFS, etc.). By providing an overview of both concepts and looking at how the two approaches can be used together, they conclude that combining a high performance batch programming and execution model with an high performance analytical database provides significant business benefits for a number of different types of applications.
Tags : 
vertica, analytical computing, adbms, mapreduce, application management, data management, data mining
    
Vertica
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization
    
HP and Intel® Xeon® processor
Published By: Sophos     Published Date: Jul 01, 2013
The BYOD paradigm has rapidly moved from novelty to near inevitability. Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms. Learn about where BYOD stands, where it’s headed, core challenges and how to build a BYOD action plan.
Tags : 
mobile, byod
    
Sophos
Published By: SAS     Published Date: Oct 18, 2017
Financial organizations are deploying artificial intelligence and machine learning in the fight against financial crimes. David Stewart, Director of Pre-Sales for the Global Security Intelligence Practice at SAS, offers tips to help separate fact from market hype when reviewing new data analytics tools. You’ll learn about: • The new industry intrigue with artificial intelligence and machine learning. • How these emerging solutions can benefit financial institutions. • The SAS approach of “crawl, walk, run” when it comes to adopting new analytics tools.
Tags : 
    
SAS
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio, business technology
    
Navisite- A Time Warner Cable Company
Published By: CDW     Published Date: Mar 31, 2015
A wireless network is a platform for enabling enterprise-wide access to an organization's applications and data. Wireless infrastructure allows users to take the office with them wherever they go. The wireless network provides employees and guest workers with untethered access to voice, video, data and applications regardless of their physical location. With the influx of mobile devices and increase in Wi-Fi connections, organizations are already starting to see a paradigm shift to "wireless by default" and "wired by exception." Watch this video to see how our solution architects upgraded the Shawnee Mission School District's aging network infrastructure.
Tags : 
wireless network, networking, applications, data, infrastructure, update, it management, wireless
    
CDW
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management
    
Qualys
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability.
Tags : 
virtualization, data management, it infrastructure, cloud computing, business technology
    
Sponsored by HP and Intel®
Published By: Skillsoft     Published Date: Mar 03, 2015
Read this white paper to learn about how Skillsoft's acquisition of SumTotal Sytems LLC is a huge step forward to deliver relevant, real-world support to the modern workforce where they are working and when they need it in a new combined content, service, and software delivery paradigm.
Tags : 
workforce support services, employee experience, communication mechanisms, enterprise, service performance, technology performance, business practices
    
Skillsoft
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: LandslideCRM     Published Date: May 16, 2012
This whitepaper chronicles Boston Mutual Life Insurance Company, the first sales organization to embark on CRM 3.0, bypassing CRM 2.0, representing a paradigm shift in strategy, people, and technology management. We outline how this bridged approach was achieved and how your organization can do the same.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management
    
LandslideCRM
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.