Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

instant

Results 201 - 225 of 330Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
IBM Lotus® Sametime® software is an award- winning platform for realtime collaboration. For years, organizations of all types have taken advantage of the Lotus Sametime platform’s powerful, security-enhanced features, such as integrated presence awareness, instant messaging (IM), Web conferencing, voice and video, to help people quickly find, reach and collaborate with each other.
Tags : 
security-enhanced features, instant messaging (im), web conferencing, voice and video, sharepoint
    
IBM
Published By: Savvis     Published Date: Jul 07, 2010
The cloud services market is now directly addressing the needs of application developers, with an emerging class of services that provides fast, on-demand provisioning; instant scale up and down capabilities, and support for multi-tier application architectures, as well as workload migration capabilities and a pay-as-you go model.
Tags : 
savvis, software development, cloud testing, application architecture, workload migration, saas, software-as-a-service, cloud computing, virtual data center, migration, data center design and management
    
Savvis
Published By: IBM     Published Date: Jan 09, 2013
TD Bank used IBM Social Collaboration tools to facilitate instant social communication and collaboration between its employees who are spread across North America. Learn how TD Bank improved social media with IBM connections.
Tags : 
social, td bank, ibm social collaboration, ibm connections, social media, connection, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment. Challenging economic times have facilitated a do more with less corporate mentality.
Tags : 
experience, employee, web experiences, simplify, ibm intranet experience suite, it management, enterprise applications
    
IBM
Published By: Plantronics     Published Date: Oct 18, 2013
Voice is at the heart of enterprise collaboration. Plantronics provides a comprehensive portfolio of audio devices for the mobile professional delivering superb call clarity working anywhere. Advanced Smart Sensor Technology and Software deliver a superior user experience. InstantMeeting software allows for easy, one-touch joining of audio conference calls
Tags : 
plantronics, effectively collaborating, virtual collaboration, mobile working, accurate presence status, simply smarter mobile, wireless calls, enterprise collaboration, plantronics audio devices, smart sensor technology and software, instantmeeting software, audio conference calls, wireless, telecom
    
Plantronics
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security, it management
    
CDW-Trend Micro
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: 8x8 Inc.     Published Date: Feb 24, 2017
Before moving to 8x8, MOBI had a premises-based telephone and contact center system. “We had a lot of points of failure inside of our building. And because our help desk and contact center is so critical we absolutely had to do something about it.” Mobi wanted one system to handle all interactions with their customers, primarily phone calls and instant messaging. According to Mobi, “What stood out about 8x8 was that everything was managed under one roof.” Mobi has been able to achieve this with 8x8’s integrated Virtual Office and Virtual Contact Center solutions.
Tags : 
8x8, mobi, webinar, contact center, customer interaction
    
8x8 Inc.
Published By: CrowdStrike     Published Date: Nov 28, 2018
Guidance for taking any organization to the highest level of endpoint protection regardless of internal resources Organizations today have a wealth of security tools available to them but many struggle to take full advantage of the technology they have. Too often, this results in a damaging breach that could have been avoided if their solutions had been configured and updated properly or if detections had been noticed and acted on. How well your organization is doing at fully implementing its security solutions, particularly endpoint protection technology, is a reflection of your cybersecurity maturity. This white paper, “CrowdStrike Falcon Complete: How to Achieve Instant Cybersecurity Maturity for Organizations of all Sizes,” explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size an
Tags : 
    
CrowdStrike
Published By: HP     Published Date: Dec 04, 2012
By combining communications tools such as instant messaging, presence, telephony, unified messaging, video conferencing, data sharing, and email, the technology known as unified communications (UC) lets your employees communicate and collaborate,
Tags : 
communications, video conferencing, collaborate, unified messaging, decisions, benefit, unify, networking, platforms
    
HP
Published By: HP     Published Date: Dec 04, 2012
If your company already uses Microsoft Lync for instant messaging, web presence and conferencing, you probably know that unified communications and collaboration (UC&C) means running all communications vehicles on a single, common, unified platform.
Tags : 
collaboration, productivity, conferencing, unified, common, management, networking, software development
    
HP
Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
How-to vidoes explain the inner workings of JRules and BRMS, from writing rules to invoking decision services.  Become an instant expert!
Tags : 
ibm, jrules, brms, video, rules, decision making, services, systems, control, data, customer, customer service, enterprise applications
    
IBM ILOG.
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new white paper examines the key challenges remote developers and teams face while exploring the advantages of leveraging an online collaboration solution to instantly connect, eliminate travel and expedite projects.
Tags : 
citrix gotomeeting, remote developer, online collaboration, remote access, remote network management
    
GoToMeeting
Published By: Microsoft Corporation     Published Date: Nov 23, 2010
The company replaced Google Apps with the Microsoft Business Productivity Online Standard Suite, which gives employees access to a range of enterprise-class services from email to unified instant messaging.
Tags : 
microsoft exchange, google apps, business productivity online, unified instant messaging, email, enterprise-class services
    
Microsoft Corporation
Published By: Silver-Peak     Published Date: Mar 21, 2012
Cloud architectures. Remote access to big data. Application performance in an increasingly networked world. A renewed focus on DR/BC based on instant replication between multiple data centers. All are driving a need for more flexible WAN optimization that can be cost effectively deployed across both private and public networks.
Tags : 
wan, optimization, data management, data center, silver peak, technology, network, network management, bandwidth management, network performance, wide area networks, data center design and management
    
Silver-Peak
Published By: IBM     Published Date: Oct 01, 2012
Today's office is everywhere. Remote devices have created a 24/7, instantaneous response, work environment.
Tags : 
intranet, web experiences, customer experience, web content management, content delivery
    
IBM
Published By: Polycom     Published Date: Sep 24, 2014
Microsoft Lync is transforming enterprise communications. A 2013 ZK Research study shows that 43 percent of organizations have deployed Lync in at least part of their organization, with another 17 percent of organizations planning to do so in the next 12 months. If you’re in this group of organizations that have deployed Lync, you probably deployed instant messaging (IM) and presence. Now that Lync IM and presence has been running for a while, you’re thinking about taking the next step with Lync Enterprise Voice.
Tags : 
investment, voice, maximize, organization, deployed, research, lync, transforming, enterprise, communications, group, percent, instant messaging, software development, enterprise applications
    
Polycom
Published By: TIBCO     Published Date: Aug 05, 2014
This ebook explains how the TIBCO Fast Data architecture delivers the right information—and the right decision—at the right place and time.
Tags : 
tibco, tibco software, big data, business intelligence, esb, enterprise service bus, soa, application integration, service management, decision making
    
TIBCO
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q418
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices, security
    
Qualys
Published By: Taridium     Published Date: May 22, 2007
Take advantage of this free information by Taridium and see how comms platform allows service providers to offer instant retail VoIP service and host virtual PBX’s with all of today’s most advanced features.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, pbx, phone, ip networks, taridium
    
Taridium
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.