deployed

Results 51 - 75 of 280Sort Results By: Published Date | Title | Company Name
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Global corporate enterprise AI practitioners are clearly still dealing with infrastructure issues related to talent and technology. End-to-end processes remain stubbornly carbon-based. Rule-based automation is truly not yet globally scaled across the majority of organizations. Double the AI And yet, the AI & Intelligent Automation Network members went from 21%, having deployed Intelligent Enterprise solutions to over 44% in just one year’s time. Over 4/5 expect to deploy AI in under two years The stated goal for deployment is just under 83% by the end of 2020. Considering the fact that they’ve essentially got two years, and those ranks have doubled in one year – doubling again in two years is achievable. Incidentally, that same number was only 67% a year ago. 50% expect to be established, globally scaling or refining AI in under two years Global corporate enterprise is in fact slowly but surely transforming into the intelligent enterprise of tomorrow. Having said that, it will be
Tags : 
    
Automation Anywhere APAC
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC
Published By: HP Inc.     Published Date: Jun 15, 2018
Intent on providing options for customers, Forecast 3D offers nine different production methods. But HP Multi Jet Fusion technology is the leader of the pack. Learn how Forecast 3D has deployed HP Jet Fusion 3D printers to change the way its customers are manufacturing. Download the Case Study
Tags : 
    
HP Inc.
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: HERE Technologies     Published Date: Dec 04, 2018
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
ota, ota technology, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 10, 2018
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
ota, ota technology, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 26, 2019
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
over the air technologies, location data, auto, mapping
    
HERE Technologies
Published By: Zscaler     Published Date: Oct 26, 2018
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them. Download this whitepaper today to find out more.
Tags : 
    
Zscaler
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: NetApp     Published Date: Sep 24, 2013
"Today, enormous amounts of data are being created from a variety of sources, such as applications, new mobile devices, big data analytics, and the cloud. This is changing the speed with which business gets conducted and the scale in which it occurs. Moreover, the digital explosion shows no sign of slowing and IDC expects the amount of data being stored to grow in excess of 50% per year over the next few years. Discover how flash technology is being deployed to improve performance and efficiency for these demanding environments. Access this IDC whitepaper to learn more about the role of flash technology and the importance of flash solutions that are designed specifically for the enterprise."
Tags : 
data, cloud, data centers, mobile devices, flash technology, flash solutions, netapp
    
NetApp
Published By: NetApp     Published Date: Dec 09, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions
    
NetApp
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
    
Hewlett Packard Enterprise
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report
    
Fiserv
Published By: Fiserv     Published Date: Nov 07, 2017
Learn how loan onboarding can become more efficient and accurate by eliminating manual data validation with automation technology that is poised to transform mortgage servicing. From end-to-end, tools can simplify workflow processes, driving time and cost efficiencies. Trained staff can be deployed to greater effect and can be crucial to eliminating servicing errors. In the process, servicers improve data quality, save time and money, and deliver a better borrower experience.
Tags : 
loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, lending efficiency
    
Fiserv
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Amazon Web Services has a long history of successfully supporting Microsoft workloads, with hundreds of thousands of customers across a wide variety of industries running their Microsoft workloads on AWS. Customers have successfully deployed virtually every Microsoft application available on the AWS Cloud, including (but not limited to) Microsoft Office, Microsoft Windows Server, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft Skype for Business, Microsoft Dynamics products, and Microsoft Remote Desktop Services. This guide covers the benefits of moving Microsoft workloads to the Cloud and how to get started.
Tags : 
cloud, amazon, web services, microsoft, security, customer success
    
Amazon Web Services
Published By: Here Technologies     Published Date: Apr 02, 2019
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
over the air technologies, location data, auto, mapping
    
Here Technologies
Published By: Pure Storage     Published Date: Jul 18, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: Teradata     Published Date: May 02, 2017
Should the data warehouse be deployed on the cloud? Read this IDC Research Spotlight to learn more.
Tags : 
data warehouse, data storage, data management, data analytics, data preparation, data integration, system integration
    
Teradata
Published By: Pure Storage     Published Date: Jul 26, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
    
Vormetric, Inc.
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders
    
CA Technologies
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface area—and leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library