Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

location

Results 576 - 600 of 810Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Nov 30, 2017
Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft.
Tags : 
forrester, microsoft, polycom, communication integration, voice solutions, office 365, cloud pbx
    
Polycom
Published By: Polycom     Published Date: Dec 18, 2017
Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft.
Tags : 
forrester, microsoft, polycom, communication integration, voice solutions, office 365, cloud pbx
    
Polycom
Published By: HP Inc.     Published Date: Jul 03, 2019
The digital revolution has altered every aspect of modern life, and the way people work is no exception. Today’s workplace would be unrecognizable to the average worker of the past. In fact, the modern work environment has transformed substantially in the last 10 years alone, and the revolution in the way people work means IT faces more complexity than ever before. Employees are no longer viewing the traditional 9 to 5 day as the norm, with almost two thirds of workers valuing work-life balance over salary.1 As the popularity of flexible working rises across different sectors,2 what was once confined to an office can now be completed from home, from off-site locations, on the go and even from the other side of the world.
Tags : 
    
HP Inc.
Published By: Business.com     Published Date: Oct 09, 2012
You have been asked to arrange a meeting of a group of people in your company. But these individuals are scattered across the country or globe, and can't afford the time or money to congregate in one location.
Tags : 
teleconferencing, recording calls, sharing files, teleconferencing providers
    
Business.com
Published By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
    
Frontier Communications
Published By: CyrusOne     Published Date: Jan 19, 2012
This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston
    
CyrusOne
Published By: NetApp     Published Date: Sep 24, 2013
"Storage system architectures are shifting from large scale-up approaches to scale-out of clustered storage approaches. The need to increase the levels of storage and application availability, performance, and scalability while eliminating infrastructure or application downtime has necessitated such an architectural shift. This paper looks at the adoption and benefits of clustered storage among firms of different sizes and geographic locations. Access this paper now to discover how clustered storage offerings meet firms’ key requirements for clustered storage solutions and the benefits including: Non-disruptive operations Secure multi-tenancy Scalability and availability And more"
Tags : 
storage infrastructure, clustered storage, technology, scalability, application, storage solution, data center
    
NetApp
Published By: Internap     Published Date: Jul 15, 2011
Download this webcast featuring Tier1 Research and learn the various approaches to solve your data center footprint and power capacity challenges
Tags : 
managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud, infrastructure, cloud computing, data center design and management, colocation and web hosting
    
Internap
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: Comcast Business     Published Date: Feb 09, 2018
Software-defined WAN technology unlocks the potential of broadband to create a foundation for transformation across business locations
Tags : 
    
Comcast Business
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat, ip networks, network management, servers, tcp/ip protocol
    
BlueCat
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk, security
    
Riverbed Technology, Inc.
Published By: Riverbed     Published Date: Feb 26, 2015
Nobody can afford to lose data. But managing data, including backup and availability, in locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn’t have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the globe in any location without putting data at risk.
Tags : 
data center, lose data, infrastructure, data backup, infrastructure
    
Riverbed
Published By: Riverbed     Published Date: Mar 23, 2015
Branch offices and remote locations generally lack the protections typically employed by data centers to keep out the unwanted and those who intend harm organization’s data.
Tags : 
    
Riverbed
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
    
Cisco
Published By: OneLogin     Published Date: Oct 24, 2017
In this ebook, we dive into how identity management streamlines access to the cloud while protecting corporate data. The location of many resources is changing to the cloud, yet companies still need central management of those resources. Trying to maintain security and order in a chaotic free-for-all use of cloud apps and bring-your-own-device culture is like a black hole sucking in IT’s time—time they could be dedicating to other projects. OneLogin’s cloud identity management platform spans the entire application portfolio with secure single sign-on (SSO), multi-factor authentication (MFA), user provisioning, integration with common directory infrastructures such as Active Directory (AD), Lightweight Directory Access Protocol (LDAP), and various cloud directories, and more. We recommend the following: • IT departments leverage OneLogin for all their identity management needs • IT departments educate users about security and safe sharing • App owners enable Security Assertion M
Tags : 
    
OneLogin
Published By: HERE Technologies     Published Date: Mar 22, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 28, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Juniper Networks     Published Date: Jun 22, 2017
Businesses increasingly recognize that their customers and workers are engaging in ways that were inconceivable when their essential applications were first architected, according to Chris Rechtsteiner, vice president of marketing for ServerCentral. “A group in one country has to have the exact same service levels as a location in another country, and half the people are internal end users, while the other half are external customers,” he says. As their businesses have globalized, their most strategic applications have struggled to keep pace. “Companies are coming to us, asking ‘How do we do this? How do we solve this problem?’ That’s really what it comes down to.”
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Comcast Business     Published Date: May 07, 2018
Companies today are as distributed as their customer base, with branch offices and satellite locations scattered well beyond traditional boundaries. For many, these distributed sites are the face of the company to the customer, with most—if not all— customer interactions occurring in these locations and not in the corporate headquarters. Banks and finance centers, retail stores and even urgent care centers all fit within the category of the branch office, with each location connected to the corporate headquarters and, increasingly each other. Together, they make up the distributed enterprise. However, each location is its own entity and must be able to operate independently of headquarters to ensure business can continue even if one or other locations experience technical issues. Distributed locations, therefore, must be equipped to handle all manner of customer interactions – and evolving customer expectations—and do so in a way that anticipates what the customers want next. From pers
Tags : 
    
Comcast Business
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.