Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

asics

Results 51 - 75 of 162Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire
    
Tripwire
Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
This 30- minute webcast recording reviews the basics of project management and reporting for government contractors. Based on content from the Deltek Special Edition Government Contracting for Dummies e-book.
Tags : 
project management, government contractors, reporting, spending, budget management, project execution
    
Deltek - Nethawk
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: Reputation.com     Published Date: Jun 29, 2018
There’s no getting around it: Managing your online reputation is critical to a successful marketing strategy, as well as to the health and continued growth of your business. According to recent research, 87 percent of Americans say they trust online reviews to help them choose which local businesses or services will receive their hard-earned dollars. What’s more, eCommerce agency Corra found 88 percent of consumers have avoided a company because of a bad review. As consumers increasingly rely on online reviews, businesses that leave their online reputation to chance are at a severe disadvantage versus those with solid Online Reputation Management (ORM) programs in place. But where do you start? What You’ll Learn in This Guide Online Reputation Management is a discipline that you can take on easily — step by step.This guide will take you through the basics of launching an ORM program in your organization. You’ll learn about: • Defining your goals • Where to focus your efforts • How t
Tags : 
    
Reputation.com
Published By: Workday UK     Published Date: Apr 25, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle – especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: McAfee     Published Date: Feb 06, 2013
The next-generation of hybrid data centers will integrate physical, virtual, and cloud infrastructures to deliver IT services more flexibly, affordably, and adaptively, and require a new generation of flexible security architectures.
Tags : 
    
McAfee
Published By: BMC Software     Published Date: Aug 18, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations.
Tags : 
consumerization, enterprise, it service, best practices, it management
    
BMC Software
Published By: Genesys     Published Date: Jun 27, 2019
Your call center tech stack is a mess, and it’s hard to figure out where you even start to unravel it all. This ebook covers the basics of consolidating technology, where to begin and what to consider as you develop your plan to streamline your infrastructure and tech. There are many things to consider including: Infrastructure, both aging and new Existing tech and limitations IT support Users, training and business needs This ebook provides an overview to get your wheels turning in preparation for a move to better technology. Read it now if your future holds new call center tech.
Tags : 
    
Genesys
Published By: CollabNet     Published Date: Jan 13, 2013
Come to this fast-paced webinar to learn the basics of Kanban, how it compares to Scrum and when you should consider using it.
Tags : 
scrum, kanban, software development, agile, process management
    
CollabNet
Published By: CDW Symantec     Published Date: Sep 06, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery
    
CDW Symantec
Published By: CDW Quantum     Published Date: Sep 07, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery
    
CDW Quantum
Published By: CDW Quantum     Published Date: Sep 07, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery
    
CDW Quantum
Published By: Hubspot     Published Date: Apr 23, 2013
Whether you're just getting started with internet marketing or you want to brush up on the basics, this ebook can serve as your essential guide to setting up and implementing a successful internet marketing strategy, step by step.
Tags : 
online marketing, keyword strategy, website optimization, seo, search engine optimization, blogging, lead generation, social media
    
Hubspot
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: Lenovo and Intel®     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre, networking
    
Lenovo and Intel®
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: IBM     Published Date: Apr 22, 2008
This IBM white paper discusses how virtualization tools can help you build an infrastructure that is simpler, more cost efficient and more flexible. It covers the basics of virtualization – how it works, how the technologies relate to each other and how they are commonly implemented, including real-world examples.
Tags : 
virtual, virtualization, spend management, it spending, infrastructure, ibm, ibm opt it, opt it
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Service Oriented Architecture (SOA) makes technology a true business enabler and empowers business and technology leaders to respond to change with increased agility. This eBook introduces you to the basics of SOA in context with the real life experiences of seven companies.
Tags : 
service oriented architecture, ibm, soa for dummies, basic soa
    
IBM
Published By: Cisco     Published Date: Jan 28, 2009
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.
Tags : 
cisco, networking basics, routing and switching, essential networking basics, switches, routers, virtual private network, vpn
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Small business VoIP, or voice over Internet Protocol, is getting a lot of attention these days. In essence, small business VoIP combines voice and data together on a single, secure network foundation. The following is a guide to why you might want to consider a small business VoIP system.
Tags : 
cisco, voip, small business voip, unified communications system, voice and data networks, secure network foundation, networking, network security
    
Cisco
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.