Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Resource Library

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

Maximizing Database Performance to Improve Customer Experience

by DellOct 27, 2020

Customer experience is king. Yet surprisingly, many organizations don't think about their data architecture as the foundation of customer experience. Database latency and performance drive satisfaction - or dissatisfaction - with online shopping experiences, payment transactions, ad clicks and streaming media. Evolving data architecture to stay ahead of customer demand can be costly and time consuming if pursued in traditional ways. The good news is, a highly efficient, easily deployed


Redefining the Enterprise Security Perimeter

by Ribbon Communications Inc.Oct 26, 2020

Attacks on voice over IP (VoIP) traffic continues to increase and these new VoIP attacks are costing service providers and enterprises billions of dollars each year in toll fraud, theft of service, ransomware payments and more. The market now demands a unified security perimeter that combines the capabilities of next generation firewalls with the capabilities of best-in-class session border controllers. Only by unifying the visibility and policy enforcement across voice and data domains can you

  • Ribbon Communications Inc.
  • Enterprise
  • Unified Communications
  • IP Telephony and Unified Communications
  • Details

Run and Transform

by Micro FocusOct 26, 2020

Digital Transformation is at the top of virtually every organization's list of objectives and concerns in 2020. The rules of business — and public sector — are being rewritten nearly every day as a combination of technology advancements, evolving customer expectations, process enhancements (e.g. digitization), and new business models are forcing executives to rethink prior IT strategies.

See how some customers are adapting to the COVID-19 economy by balancing the need to

  • Micro Focus
  • IT Strategy
  • Executive Insights & Innovation
  • Digital Business
  • Details

2020 Digital Transformation Report

by Micro FocusOct 26, 2020

Throughout 2020, Micro Focus has been inviting industry professionals to respond to our Digital Transformation Survey. Already, we have heard from many organizations about their digital transformation (DX) plans and progress.

Get this ebook report to discover: Initial business insights and DX strategies Organizations' biggest DX challenges Where organizations are in their DX journey now and where they want to be in a year Our six key takeaways from customers' responses

  • Micro Focus
  • Executive Insights & Innovation
  • IT Strategy
  • Digital Business
  • Details

World Wide Technology: Digital Transformation Customer Journey

by Micro FocusOct 26, 2020

The rules of business are constantly being rewritten. Technology advancements, evolving customer expectations, process enhancements, and new business models are forcing executives to rethink their IT strategies.

Fundamentally, organizations want to move faster, have greater agility, secure what matters most, and leverage insights to drive value.

Read this real-life example of how Micro Focus has helped customers run their businesses, while transforming them at the same time.

  • Micro Focus
  • IT Strategy
  • Executive Insights & Innovation
  • Digital Business
  • Details

IDC FutureScape: Worldwide Digital Transformation Predictions

by Micro FocusOct 26, 2020

DX is at the heart of business strategies for companies of all sizes. IDC surveyed over 6,000 companies through their worldwide digital transformation executive sentiment, MaturityScape benchmark, and digital transformation investment guide studies to uncover specific trends.

Read the report to discover: IDC's top 10 digital transformation predictions What separates the leaders in transformation from the laggards Strategies, actions, and reactions to the portfolio of new digital

  • Micro Focus
  • Executive Insights & Innovation
  • IT Strategy
  • Digital Business
  • Details

Ribbon Analytics: Fraud protect

by Ribbon Communications Inc.Oct 26, 2020

Unified Communications fraud continues to cost carriers and enterprises tens of billions of dollars per year. Bad actors typically commit telecom fraud for financial gains. In order to meet their objectives, bad actors often cover a broad set of call scenarios — from IP-PBX hacking, to subscription fraud, to Wangiri (one ring and cut) and other use cases. FraudProtect analytics application provides you with the insight and tools needed to identify and stop the UC fraud in your network.

  • Ribbon Communications Inc.
  • Enterprise
  • Unified Communications
  • Details

Ribbon Analytics: Application Portfolio

by Ribbon Communications Inc.Oct 26, 2020

The Ribbon Analytics application portfolio consists of Operations, Security and Monetization solutions that deliver numerous use cases for services assurance, security and subscriber growth. Powered by Ribbon Protect, a big data analytics platform, you can grow your investment with numerous out of the box applications to speed up deployments and provide a significant return on investment. This suite of applications enable you to secure your RTC network, monetize subscriber data with third

  • Ribbon Communications Inc.
  • Unified Communications
  • Enterprise
  • IP Telephony and Unified Communications
  • Details

Ribbon Analytics - TDoSProtect

by Ribbon Communications Inc.Oct 26, 2020

Telephone Denial-of-Service (TDoS) attacks are increasing every day. They are often part of an extortion scheme where a bad actor demands payment, then launches a continuous stream of phantom calls that block normal calls in your business until payment is received. Usually, the attacks start and stop randomly until the ransom is paid. Frequent targets include hospitals, government offices and public-safety answering point offices. Ribbon Analytics TDoSProtect application uses granular tracking

  • Ribbon Communications Inc.
  • Unified Communications
  • Enterprise
  • IP Telephony and Unified Communications
  • Details

How a Platform Approach can Solve Today’s Security Conundrum

by CBTSOct 22, 2020

How a platform approach can solve today's security conundrum.

Cisco SecureX connects the breadth of an integrated security portfolio and your entire security infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens security across your network, endpoints, cloud, and applications.

Learn the pros and cons of the 3 approaches to security platforms: Solution-based platforms. Technology-based platforms (SIEM and SOAR). Integrated,

  • CBTS
  • Endpoint Security
  • Cloud Security
  • Cybersecurity
  • Applications
  • Details