Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

eva

Results 2601 - 2625 of 2660Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Dell     Published Date: Aug 17, 2016
Windows 10 is the OS of the future and fundamentally changes how PCs and other devices will be used and supported in organizations. However, with different support periods set by Microsoft for Windows 7, each IT and procurement organization need to evaluate what hardware and software combination will best support their workforce if they are not ready to move to Windows 10 right away. Even purchasing new PCs to take advantage of performance improvements and new form factors while downgrading the OS may not be an optimal strategy going forward.
Tags : 
dell, windows 7, procurement, enterprise applications
    
Dell
Published By: CDW     Published Date: Jun 08, 2015
This Technology Spotlight discusses the challenges organizations face in migrating off Windows Server 2003 and key considerations and steps involved in this important strategic IT undertaking.
Tags : 
servers, windows, 2003, upgrade, security, small business networks, data center design and management
    
CDW
Published By: CDW     Published Date: Jun 15, 2015
This Technology Spotlight discusses the challenges organizations face in migrating off Windows Server 2003 and key considerations and steps involved in this important strategic IT undertaking.
Tags : 
servers, windows, 2003, upgrade, server hardware
    
CDW
Published By: Intel Security     Published Date: May 15, 2015
Intel Security has produced a comprehensive guide to help you evaluate the risks and options for securing your business whichever path you choose.
Tags : 
windows server support, end of windows support, intel security, security
    
Intel Security
Published By: Dell     Published Date: Oct 24, 2014
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
server migration, product support cycle, server compatibility, it support
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores Windows Server migration options, hardware/software replacements, and support services to help customers tackle a modernization effort. It also evaluates the benefits that customers can enjoy, thanks to a move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
dell, windows, microsoft, modernization, risk, management, modernization, idc
    
Dell
Published By: Cisco     Published Date: Jan 21, 2015
As the Internet of Everything (IoE) drives exponential change — and opportunity — customers and retailers face a complex maze of shopping journeys. Mobility and apps now represent a disruption similar in scope to what we saw with e-commerce in the late 1990s and early 2000s. In the second quarter of 2014, total discretionary retail spending rose 3 percent; e-commerce rose 10 percent; and mobile commerce rose 47 percent.
Tags : 
digital, shopping, journey, retail, mobility, apps, e-commerce, it management
    
Cisco
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware, security, it management, enterprise applications
    
IBM
Published By: Aerohive     Published Date: Feb 05, 2015
The WLAN Buyer's guide will help you understand how to evaluate enterprise WLAN networks.
Tags : 
wlan networks, evaluate enterprise wlan networks, rfp process, things a wlan must do, the evolution of wlan, wlan's architectures, wlan, wi-fi
    
Aerohive
Published By: SAP     Published Date: Jun 12, 2015
We found that many companies lack the structure, strategy, culture, solutions and resources to manage employees effectively. Download this executive summary and learn that to succeed, they must address the role and relevance of people strategy; changing demographics and evolving definitions of work; leadership ability and cultivation; employee wants and needs; and talent development.
Tags : 
    
SAP
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
We found that many companies lack the structure, strategy, culture, solutions and resources to manage employees effectively. Download this executive summary and learn that to succeed, they must address the role and relevance of people strategy; changing demographics and evolving definitions of work; leadership ability and cultivation; employee wants and needs; and talent development.
Tags : 
    
SuccessFactors, an SAP Company
Published By: Success Factors     Published Date: Oct 07, 2014
Preparing for the 2020 workforce is critical to business strategy, growth, and performance. To understand the challenges and opportunities, Oxford Economics and SAP surveyed over 2,700 executives and more than 2,700 employees in 27 countries during the second quarter of 2014. We found that many companies lack the structure, strategy, culture, solutions and resources to manage employees effectively. To succeed, they must address the role and relevance of people strategy; changing demographics and evolving definitions of work; leadership ability and cultivation; employee wants and needs; and talent development.
Tags : 
successfactors, workforce, sap, strategy, culture, structure, leadership, cultivation
    
Success Factors
Published By: Interactive Intelligence     Published Date: Oct 03, 2011
To create a successful workforce management deployment, the first step is to evaluate your WFM product and determine how you'll use it along with the processes and best practices that support it. Next, consider how your ACD is configured, what type of forecasting and scheduling practices you'll use and goals for various metrics including schedule adherence. For more insights, read how to get the most out of workforce management.
Tags : 
interactive intelligence, workforce management, acd, schedule, forecasting, wfm, processes, best practice
    
Interactive Intelligence
Published By: HERE Technologies     Published Date: Sep 26, 2018
Adsquare offers brands insights into customer behaviours and footfall to underpin digital marketing campaigns. Using a detailed brief of the audience the brand wishes to reach, Adsquare gathers data from a range of mobile, online and offline sources. This rich data gives a brand a stronger opportunity to create relevant campaigns for their audiences. It is critical to adsquare’s success that its data sources are reliable. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is building and sharing real-time location intelligence with adsquare which reveals patterns to show how and why customers make transactions in specific places. and why customers make transactions in specific places.
Tags : 
    
HERE Technologies
Published By: Pure Storage     Published Date: Mar 15, 2018
The all-flash array (AFA) market has undergone significant maturation over the past two years. A high percentage of customers have already committed to an "all flash for primary storage" strategy, and every customer interviewed for this study was among those. In 2017, AFAs will drive over 80% of all primary storage revenue. All of the established storage vendors have entered this space, and there are several start-ups with over $100 million in revenue. With this level of market maturation, multiple segments have developed within the primary flash array space. There are systems targeted for dedicated application deployment, there are systems specifically for web-scale applications, and there are systems intended for dense mixed workload consolidation. These latter systems are driving most of the AFA revenue, and they aspire to become the primary storage platforms of record for enterprises of all sizes. This study evaluates the suitability of 10 vendors' AFA platforms for dense mixed ent
Tags : 
    
Pure Storage
Published By: Dun & Bradstreet     Published Date: Oct 30, 2015
Effectively evaluate a business.
Tags : 
hoover, risk, customers, business, efficiency
    
Dun & Bradstreet
Published By: IBM     Published Date: Jan 09, 2014
Two years ago Clabby Analytics wrote a report that evaluated Cisco’s Unified Computing System (UCS) and revealed shortcomings in the UCS design, stating that Cisco blade environments are “good enough” computing environment. Since then Cisco made improvements to their system design, but the blade market didn’t stand still waiting for them to catch up as IBM announced a new system design: the IBM Flex System. Continue on to this new assessment from Clabby Analytics that compares Cisco’s UCS blade server offering to IBM Flex System’s in a soup-to-nuts evaluation. Also find out how these two major players compare to the competitors in the blade marketplace.
Tags : 
ucs blade server, system manager, cross system, system architecture, virtual machine, cisco, ibm flex system, clabby analytics
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
Two years ago Clabby Analytics wrote a report that evaluated Cisco’s Unified Computing System (UCS) and revealed shortcomings in the UCS design, stating that Cisco blade environments are “good enough” computing environment. Since then Cisco made improvements to their system design, but the blade market didn’t stand still waiting for them to catch up as IBM announced a new system design: the IBM Flex System. Continue on to this new assessment from Clabby Analytics that compares Cisco’s UCS blade server offering to IBM Flex System’s in a soup-to-nuts evaluation. Also find out how these two major players compare to the competitors in the blade marketplace.
Tags : 
ibm, ibm flex system, computing system, blade, compute nodes, computing, storage, networking
    
IBM
Published By: Gigamon     Published Date: Jun 21, 2019
Accelerate your digital transformation journey by giving teams and tools the application visibility needed to monitor and secure modern digital applications. Download this whitepaper to learn how you can Isolate and extract application and component traffic across multiple tiers for monitoring, Provide application metadata to analytics tools, enabling faster detection of customer experience, application performance and security-related issues and send only relevant traffic to the appropriate tools to reduce load and increase effectiveness.
Tags : 
    
Gigamon
Published By: x1     Published Date: Aug 21, 2009
This paper describes a new user-centric approach to managing structured and unstructured organizational documents and data. Focusing on end-user features offers significant benefits to corporations, their employees, and their IT managers.
Tags : 
document management, data management, user-centric, desktop search, search and retreival
    
x1
Published By: Citrix     Published Date: Oct 14, 2010
This planning guide provides best practices for virtualizing Citrix XenApp. Even though these best practices are based on the Hosted Shared Desktop model, they are still relevant in a non-desktop model where users only connect to published applications without the desktop interface.
Tags : 
citrix, xenapp, desktop virtualization, hosted shared desktop, windows servers, data centers, servers
    
Citrix
Start   Previous    93 94 95 96 97 98 99 100 101 102 103 104 105 106 107    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.