public

Results 1 - 25 of 1103Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Anwendungsperformance und Bereitstellung haben sich geändert. Sollten Sie Ihr Netzwerk anpassen? Mit der Cloud ändert sich grundsätzlich die Art, wie IT-Teams Anwendungen bereitstellen und deren Performance managen. Anwendungen werden immer häufiger an Standorten fernab der Nutzer installiert. Bei der Übertragung werden häufig Netzwerke durchquert, die nicht direkt von der IT kontrolliert werden können. Statt in Unternehmensrechenzentren befinden sich viele Anwendungen nun in Public und Hybrid Clouds. Es gibt sogar eine ganz neue Art von Anwendungen: solche, die auf Microservices und Containern basieren.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Google     Published Date: Nov 04, 2019
"Modernizing apps on the cloud isn’t an “all or nothing” decision. Businesses want the option to modernize on-premises or choose multi-cloud solutions that meet their needs. That’s why we created Anthos, a new solution which lets you run your applications, unmodified, on existing on-prem hardware investments or in the public cloud. So that you write once and deploy anywhere. Download “Application modernization and the decoupling of infrastructure, services and teams” to find out more."
Tags : 
cloud as a service, cloud computing, enterprise security, cloud infrastructure, cloud providers
    
Google
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
A number of recent surveys indicate that cloud costs are becoming a major concern for businesses, many of whom have found cloud computing to be more expensive than they thought. The surveys align with Gartner’s 2017 prediction that “through 2020, 80% of businesses will overshoot their cloud infrastructure as a service (IaaS) budgets due to a lack of cost optimization approaches”. This could be due to a lack of understanding about cloud pricing, or a lack of knowledge about the full range of measures that can be taken to reduce cloud costs. The one area in which businesses are struggling to control costs more than any other is the hybrid cloud. Analysts attribute hybrid cloud overspend to the complexity of operating a private or public cloud in conjunction with an on-premises infrastructure. Businesses using VMware Cloud (VMC) on AWS don’t experience as much operational complexity in their hybrid environments, but they can still be guilty of overspending. This eBook will offer 6 Ways to
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014… • The seminal DevOps book—Gene Kim’s The Phoenix Project—was one year old • Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 • "Continuous Testing” just started appearing in industry publications and conferences2 • Many of today’s popular test frameworks were brand new—or not yet released • The term “microservices” was just entering our lexicon • QC/UFT and ALM were still sold by HP (not even HPE yet) • Only 30% of enterprise software testing was performed fully “in house”3 • There was no GDPR restricting the use of production data for software testing • Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadn’t even been announced Times have changed—a lot. If the way that you’re testing hasn’t already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
    
Tricentis
Published By: IBM APAC     Published Date: Oct 04, 2019
Companies across the world are adopting a hybrid cloud environment as part of their digital transformation initiative. They need a platform that provides the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. IBM’s LinuxONE is an enterprise-grade Linux server with a unique architecture designed to meet the needs of a vast range of enterprise computing workloads within a multi-cloud environment. Here are just a few reasons why you should consider LinuxONE: • Differentiating your cloud services • Reduced costs • Security everywhere Download the e-book for more details.
Tags : 
    
IBM APAC
Published By: Flexential     Published Date: Oct 11, 2019
Enterprises that put all of their workloads into a single infrastructure solution such as public clouds are realizing there are limitations. As requirements around security, compliance and cost management grow, businesses are “boomeranging” back to hybrid IT models.
Tags : 
    
Flexential
Published By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
The adoption of cloud BI and analytics is reaching a tipping point. According to the new report from Dresner Advisory Services, there are now more cloud-based deployment options than on-prem offerings available. To learn more about the rising tide of cloud BI, and how sentiment is changing around these offerings, read this new research report based on a 2019 market study. The report covers: A summary of the current cloud BI and analytics landscape An overview of changing user sentiment in the market How organizations are planning to deploy public, private, or hybrid cloud models Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
Published By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 04, 2019
Life is coming at us fast, so our thinking about policy solutions for the future needs to be bigger, bolder and much more imaginative. We have just launched the second edition of Reimagine public policy. 20 truly, disruptive and innovative ideas to help solve today’s policy challenges. Four of them are brand new for this year – Reimagine high streets, digital platforms for life-long learning, workforce and migration. The Reimagine ideas show how to: • Revitalise the Great British High Street • Remove the need for any family to choose between heating and eating • Match hirers and firers to give workers facing redundancy new skills
Tags : 
    
KPMG
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Masergy     Published Date: Nov 04, 2019
Driven by the need to save money, improve agility, and take rapid advantage of emerging technologies to improve internal collaboration and customer engagement, organizations are quickly adopting Unified Communications-as-a-Service (UCaaS) and Contact Center as a Service (CCaaS). UCaaS and CCaaS enable businesses to deliver a modern communications environment, without large capital investment, and in a manner that provides for rapid scaling, easy expansion into new sites and geographies, and deployment flexibility. Unfortunately, many enterprise networks are not optimized to deliver the performance and reliability required to support cloud-based applications, including UCaaS and CCaaS. As a result, IT leaders are rapidly adopting Software-Defined Wide-Area Network (SD-WAN) technologies. With SD-WAN’s ability to virtualize underlying network services and to build enterprise-grade WANs using both public (Internet) connectivity and private WAN connectivity, IT leaders can leverage it to su
Tags : 
    
Masergy
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This paper examines how cities are using cloud technology to address public challenges, using the framework of the global coalition, Smart Cities Council. This framework promotes three core values for smart cities: livability, providing clean, healthy living conditions without pollution and congestion; workability, providing an enabling infrastructure (energy, transportation, internet connectivity) and high-quality jobs; and sustainability, doing so at no cost to future generations, as the Council puts it. This paper proposes a fourth core value, inclusivity: provisioning services to all city residents regardless of their background.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Government agencies often look to promote new technology for cost-savings and efficiency, but it does not stop there. The second and third-tier effects of technology can be long lasting for citizens, businesses, and economies. When public institutions adopt the cloud, they experience an internal transformation. Inside an organization, cloud usage drives greater accessibility of data and information sharing, increases worker productivity, and improves resource allocation. The external benefit of the cloud is recognized through a government’s ability to put reclaimed time and resources toward serving citizens. This includes provisioning public services, such as occupational-skills training, quicker and more effective service delivery, a pathway to a more productive workforce, and ultimately, a boost to local development. This whitepaper examines the enterprise-level benefits of the cloud, as well as the residual impact on economic development. The U.S. Economic Development Administration
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) provides rapid access to flexible and low-cost IT resources. With cloud computing, public sector organizations no longer need to make large upfront investments in hardware, or spend time and money on managing infrastructure. The goal of this whitepaper is to help you gain insight into some of the financial considerations of operating a cloud IT environment and learn how to maximize the overall value of your decision to adopt AWS.
Tags : 
    
Amazon Web Services APAC
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
Published By: DigitalOcean, LLC     Published Date: Nov 04, 2019
Over the last several years, DigitalOcean has built out its feature set in a way that has taken it from a provider of cheap and simple virtual machines (VMs) to a legitimate public cloud alternative, most recently adding support for Redis and MySQL to its managed database services. As its services evolve, it continues to experience healthy growth and maintain popularity among the independent developer audience. Over the past two years, DigitalOcean has accelerated the velocity of its feature development, looking to better meet the needs of a business audience. By emphasizing a simplified feature set, pricing structure and user experience, even as it expands its competitive footprint in the shadow of public cloud vendors such as Amazon Web Service (AWS), Microsoft Azure and Google Cloud Platform (GCP), Digital Ocean continues to help define what it means to be an alternative public cloud in a market dominated and largely defined by hyperscalers.
Tags : 
    
DigitalOcean, LLC
Published By: Submittable     Published Date: Nov 06, 2019
Reviewing content submissions can be a long, overwhelming process of sifting through emails, attached files, and other time-consuming tasks. It’s led many publications to seek a more seamless, efficient content submission and review process. It’s integral to make sure the entire process properly showcases the integrity of the brand and creates a positive experience for both submitter and reviewer, so that you can find the best content for your needs However, finding the best content is only half the battle. You should also give your reviewers the proper tools to help them easily, quickly, and accurately review submissions allowing them to find the perfect fit. Submission management software streamlines all of your submissions, consolidating the review process, and ensuring prompt communication with your submitters. This software can also increase the quality and quantity of submissions by making the process easier for all parties, from the submitters to the review team to your admi
Tags : 
    
Submittable
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.