Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

all ict

Results 351 - 375 of 375Sort Results By: Published Date | Title | Company Name
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Shell     Published Date: Aug 15, 2018
Globally, the demand for power is increasing, driven by a growing population, mass urbanisation, and rapid industrialisation of nations like China and India. The consequence for those in the business of power generation, transmission and distribution is a need to achieve greater productivity and reliability, in a challenging climate of stricter environmental targets, severe penalties for supply interruptions, tighter budgets and tougher operating conditions.
Tags : 
power, urbanisation, industrialisation, power generation, equipment reliability, turbines, transformers, stationary engines
    
Shell
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Flash floods, tornadoes, users: The essential survival guide. Of all the natural disasters known to man, users are the most difficult to predict. Find yourself in awe at the destructive potential of the weather and the users who choose to ignore it. Download this guide and read more!
Tags : 
    
Lenovo and Intel®
Published By: Lenovo and Intel     Published Date: Jan 19, 2017
Flash floods, tornadoes, users: The essential survival guide. Of all the natural disasters known to man, users are the most difficult to predict. Find yourself in awe at the destructive potential of the weather and the users who choose to ignore it. Download this guide and read more!
Tags : 
lenovo, user, business technology
    
Lenovo and Intel
Published By: IBM     Published Date: May 02, 2013
The explosion in IT demand has intensified pressure on data center resources, making it difficult to respond to business needs, especially while budgets remain flat. As capacity demands become increasingly unpredictable, calculating the future needs of the data center becomes ever more difficult. The challenge is to build a data center that will be functional, highly efficient and cost-effective to operate over its 10-to-20-year lifespan. Facilities that succeed are focusing on optimization, flexibility and planning—infusing agility through a modular data center design.
Tags : 
modular, data center, efficient, optimization, flexibility, cost-effective
    
IBM
Published By: Dell Storage     Published Date: Apr 17, 2012
A scale-out storage architecture helps organizations deal with demands for growing data capacity and access. Dell engineers put DellT EqualLogicT scale-out storage through its paces to demonstrate its scalability in both file and block I/O scenarios.
Tags : 
    
Dell Storage
Published By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : 
traffic, virtualization, it infrastructures, bandwidth management, infrastructure, local area networking, monitoring, network architecture
    
Riverbed
Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, cloud computing
    
Citrix Systems
Published By: HP     Published Date: Oct 09, 2008
Despite its six syllables, 'virtualization' is a straight - forward concept. It can enable your organization to get more value not only from computer and storage hardware but also from the labor required to keep your systems up and running. Virtualization is an approach to pooling and sharing IT resources so the supply of resources—processing power, storage, networking and so on—can flexibly and automatically meet fluctuating business demand. Virtualization can improve the quality of your IT services, enabling more consistency and predictability of operational availability.
Tags : 
mission critical, virtualization
    
HP
Published By: Dell     Published Date: Jul 08, 2016
Organizations looking to implement desktop and app virtualization traditionally play a guessing game where storage is concerned. When considering local and physical storage, determining what would be necessary for the virtualized world is difficult and can be overwhelming. This is especially true when determining how virtualizing desktops will impact the storage architecture. Organizations risk over sizing their environment thereby wasting CapEx, or under-sizing and potentially ruining the user experience. Software-defined storage solutions, such as VMware Virtual SAN, provide simplified solutions with high performance data stores that offer fine-grained scalability with linearly-predictable performance as demand grows. Dell’s validated and certified desktop virtualization solutions incorporate vSphere and Virtual SAN, and provide a complete end-to-end solution that allows companies to grow and expand without large capital investments in SAN hardware.
Tags : 
technology, best practices, data, virtualization, storage, data
    
Dell
Published By: Domino Data Lab     Published Date: May 23, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Gleanster Research     Published Date: Jul 02, 2014
In this Deep Dive we will explore what sales leaders should actually be demanding from marketing automation tools. In fact, survey data paints a very compelling picture about how sales should be evaluating the impact of marketing automation on sales performance. We'll explore why sales might be resistant in the first place, and how Top Performing organizations overcome these challenges to help support the collaborative pursuit of top line revenue growth between marketing and sales.
Tags : 
gleanster, sales, marketing, marketing automation, revenue, marketing automation tools, sales performance, sales analytics
    
Gleanster Research
Published By: ChannelAdvisor     Published Date: Aug 21, 2018
As e-commerce continues to grow at a remarkable rate of 24%, manufacturers are faced with what’s arguably the biggest challenge yet: How to create meaningful connections with consumers while simultaneously maintaining relationships with retailers and minimizing channel conflict. It may be new territory, but armed with the right knowledge and tools, it’s possible to create a successful mix of digital marketing, selling and fulfilling activities. In this white paper, we cover the four critical components that all brands should be watching, including: - Relationships with retailers - Connections with consumers - The importance of quality of product content - How to maximize sales on marketplaces
Tags : 
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
As e-commerce continues to grow at a remarkable rate of 24%, manufacturers are faced with what’s arguably the biggest challenge yet: How to create meaningful connections with consumers while simultaneously maintaining relationships with retailers and minimizing channel conflict. It may be new territory, but armed with the right knowledge and tools, it’s possible to create a successful mix of digital marketing, selling and fulfilling activities. In this white paper, we cover the four critical components that all brands should be watching, including: - Relationships with retailers - Connections with consumers - The importance of quality of product content - How to maximize sales on marketplaces
Tags : 
    
ChannelAdvisor
Published By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : 
symantec, cloud, backup, technology, system failure, recovery
    
Symantec.cloud
Published By: Radius Intelligence     Published Date: Jun 15, 2015
Market expansions are a viable strategy when a company’s growth in an existing market has stalled. However, marketers often rely on intuition and qualitative data to inform decisions around market fit and size. In this whitepaper, marketing technology expert, David Raab, explores how the shift in data and predictive solutions streamlines the market expansion process. The paper will reveal 4 keys to a successful market expansion, common mistakes to avoid, and show marketers how to win customers in new market segments.
Tags : 
predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition
    
Radius Intelligence
Published By: Urban Airship     Published Date: Oct 08, 2013
While free apps proliferate, many fall victim to the download-try-delete cycle, making the average lifespan of an app just 30 days. How can brands keep their place on a customer's mobile device? This whitepaper discusses how an app can deliver value to maintain its place on a customer's phone, and how added value can prompt customers to share some private information and opt in to push notifications. Dig deeper into the key performance indicators (KPIs) for apps that achieve this privacy-value exchange.
Tags : 
mobile value exchange, mobile marketing, mobile relationship management
    
Urban Airship
Published By: NetApp     Published Date: Oct 12, 2018
Big data needs both high availability and protection. The amount of data created and replicated globally is predicted to increase ten-fold by 2025, according to IDC research. You may be wondering where to store that big data, as well as how to ensure your data is highly available and protected. In this eBook, explore why cloud-based disaster recovery (DR) improves data availability, eases the processes associated with DR management, and creates a more economically efficient solution for today’s data-driven companies.
Tags : 
    
NetApp
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: IBM     Published Date: Nov 03, 2017
Ironically, the most important business decisions are too often based not on the best available data and analysis, but on the judgment calls of HIPPOs — the highest-paid people in the organization. In large part, these individuals became HIPPOs in the first place because, over the course of their professional careers, their intuition and gut feel has tended to be more right than wrong. This approach may have sufficed in simpler, slower-moving times. But modern enterprises are too connected and too fast-paced for important business decisions to be made strictly on individual intuition and gut feel. For better-informed decision-making, your organization’s decision-makers need timely access to information they can rely on.
Tags : 
hippo, ibm, decision-makers, modern enterprise
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.