Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ip world

Results 126 - 150 of 203Sort Results By: Published Date | Title | Company Name
Published By: Apple Corporation     Published Date: Dec 05, 2013
Explore the world of business apps for iPad and start transforming the way you work. Discover apps to stay productive in the office or on the go. There are a world of possibilities with in-house app development for iPad. Explore what businesses are creating in-house and get started building breakthrough apps for your employees. With apps from the app store or in-house apps, you'll always have the right information at the right time. You can even learn about different ways on how apps can be distributed in your organization. There will also be a Q&A segment where viewer questions will be answered by Apple Business Experts skilled in iPad integration and deployment.
Tags : 
apple, free online seminar, business, apps for ipad, it management
    
Apple Corporation
Published By: IBM     Published Date: Jul 19, 2012
Transform your businesses to be smarter, greener and more cost effective by renewing your Software Subscription and Support. Watch our video and learn about the benefits of renewing on-time direct from Debbie Landers, Vice President, Worldwide Client Support, Information Management Software
Tags : 
ibm, technology, business management, information management, software, support
    
IBM
Published By: SAP     Published Date: Jul 17, 2012
Loyal and satisfied employees are the foundation of successful business performance, particularly as organizations increasingly look to their employees to drive productivity gains and stir innovation. Yet, new research shows employee loyalty slipping worldwide. The importance of building and rebuilding employee loyalty is paramount for organizations that want to retain their top talent and avoid the high costs associated with high turnover. In this white paper, we offer 10 strategies to foster employee engagement and motivation.
Tags : 
sap, white paper, employees, performance, satisfaction, employee engagement, employee motivation
    
SAP
Published By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : 
customer, trust, banking, retail
    
IBM
Published By: Adobe     Published Date: Aug 09, 2017
Detailed craftsmanship. Unexpected angles. Authentic stories. See what’s trending in the world of images in our Visual Trends: Volume 1 report. You’ll learn all about: • How artists are using digital technology in fine art • The increased use of drones in aerial photography • Female stereotypes being challenged on both sides of the camera
Tags : 
    
Adobe
Published By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : 
cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data, networking, it management
    
Cyveillance
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense, security
    
LogicNow
Published By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
Published By: QuinStreet     Published Date: Feb 09, 2009
Most businesses realize a significant return on their investment within eighteen months of implementation of VoIP. According to a recent study by PC World, businesses realize an average net savings of 20 to 30 percent when they switch from their legacy phone system to VoIP. The initial investment can come with a hefty price tag, however.
Tags : 
quinstreet, voip, save with voip, ip telephony, voip savings, pstn, public switched telephone network, enterprise applications
    
QuinStreet
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Oracle     Published Date: Nov 14, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics
    
Oracle
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Published By: Workday     Published Date: Nov 03, 2017
The CIPD is the professional body for HR and people development. The not-for-profit organisation champions better work and working lives and has been setting the benchmark for excellence in people and organisation development for more than 100 years. It has more than 140,000 members across the world, provides thought leadership through independent research on the world of work, and offers professional training and accreditation for those working in HR and learning and development.
Tags : 
    
Workday
Published By: Appcelerator     Published Date: Jun 20, 2012
Transform your customer relationships by understanding how to create a world-class mobile app experience that will keep users coming back for more. Download the white paper to learn the 4 steps to driving customer loyalty today.
Tags : 
apcelerator, mobile app, strategy, mobile, revolution, wireless
    
Appcelerator
Published By: Rackspace     Published Date: Jan 19, 2016
TeamSourcing is a global company based in Ecuador that has become one of the leading providers of mobile content and services in Latin America. When CEO Armando Coronel founded TeamSourcing in 2002, its 5-person team was focused principally on the Ecuadorian market. Since then, TeamSourcing has grown to a team of nearly 60, and its reputation for world-class products and services has helped it expand throughout the region. TeamSourcing now does business in 10 Latin American countries, working with mobile operators in Ecuador, Peru, Chile, Guatemala, Honduras, Panama, Mexico, El Salvador, the Dominican Republic, and Colombia.
Tags : 
rackspace, openstack, teamsourcing, mobile, it management, data center
    
Rackspace
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the issues addressed by the new international banking standard known as the Basel Committee on Banking Supervision (BCBS or Basel II), and find out how Tripwire can help meet all requirements of Basel II compliance even before it becomes a worldwide banking regulation.
Tags : 
tripwire, basel ii, compliance, banking, standard, committee bcbs, banking supervision, supervision, requirement, worldwide, regulation, security, control, documentation, audit, accountability, management, risk, data, system
    
Tripwire
Published By: IBM     Published Date: Jul 29, 2016
Read this white paper to learn how to: - Use B2C best practices to meet buyer expectations for enhanced online experiences - Deliver multiple combinations of products and services for faster, streamlined quoting and ordering - Support complex buying cycles and selling executions across channels and markets—and around the world
Tags : 
ibm, b2b, b2b commerce, commerce, b2c, online retailers, ecommerce, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Read this white paper to learn how to: - Use B2C best practices to meet buyer expectations for enhanced online experiences - Deliver multiple combinations of products and services for faster, streamlined quoting and ordering - Support complex buying cycles and selling executions across channels and markets—and around the world
Tags : 
ibm, b2b, business to business, commerce, b2b commerce, online shopping, online commerce, b2c, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : 
mssp, idc, idc marketscape, global managed security services, ibm, security, it management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.