Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3251 - 3275 of 3488Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Oct 03, 2012
When it comes to the office of the future, what many people envision is not an office at all -- it's access to the tools and resources they need without going to an actual office. This white paper discusses how to deliver this level of access today.
Tags : 
mobile computing, mobile workforce, mobile office, blackberry
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Uncover the key attributes of one mobile device management solution that delivers the features every enterprise should demand when it comes to security, manageability, stability, and technical/customer support.
Tags : 
mobile device management, mobile solutions, security, mdm, blackberry
    
Blackberry
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management
    
ServiceNow
Published By: CDW     Published Date: Nov 12, 2012
As mobility becomes commonplace, strategies for wireless and wired security must be woven together.
Tags : 
cdw, wireless, wired, security, wlans, endpoints, notebook computers, tablets, smartphones
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
WHEN IT COMES TO DATA CENTER OPTIMIZATION, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. That’s why we partner with leading vendors like EMC. They offer a wide range of devices for primary storage, archiving, backup, recovery and data center management. And with years of experience in EMC deployments, CDW has the experts and the expertise to make them work for you. Together, we give our customers access to the latest technologies that help optimize their data centers to keep their organizations running smoothly.
Tags : 
data, optimization, experts, backup, recovery, technologies, organizations, vendor, experience, deployment, management, storage, archiving, technologies, recovery
    
CDW
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This white paper explains how to utilize these capabilities in order to respond to challenges quickly in complex data center environments. Find out how you can take advantage of these new designs and tools to reduce support costs.
Tags : 
hardware innovation, support automation, intel, complex data, design, support costs reduced, cost savings, it management, enterprise applications, data center
    
Sponsored by HP and Intel®
Published By: Workfront     Published Date: Nov 05, 2014
Most marketing executives know that the creative process is central to their success. Branding, design, messaging, campaigns—so much of what a marketing organization does depends in large part on the work of its most imaginative, innovative employees.
Tags : 
attask, creativity, marketing, innovation, mesaging, branding, design, campaigns
    
Workfront
Published By: McAfee     Published Date: Apr 10, 2013
In this white paper, IDC provides an overview of messaging security and its impact on enterprises.
Tags : 
idc, hybrid email messaging security, on premises, saas, mcafee saas email protection, mcafee saas email continuity, mcafee email gateway, mcafee host dlp protection, mcafee network security platform, security
    
McAfee
Published By: Jive     Published Date: Mar 29, 2013
When it comes to producing collateral and other assets, marketing has been stuck in the past.
Tags : 
marketing campaigns, cmo, social, social media, campaign planning, campaign development, content, sales colateral, product demos, white papers, advertising, social collaboration
    
Jive
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security
    
Arbor
Published By: Work4™     Published Date: Feb 27, 2013
The essence of great recruiting is to fish where the fish are. As times change, the "recruiting waters" get overfished. This is what makes the profession so highly flexible. Over the course of a decade, the success of one technique creates the demand for the next.
Tags : 
facebook recruiting, facebook recruitment, social recruiting, employer branding, social media recruitment, recruiting on facebook, how to post a job on facebook, how to recruit on facebook, facebook job page, recruiting through social media, social media for recruiters, social recruiting strategies, facebook recruiting app, facebook recruiting application, facebook recruiting apps, facebook recruiting solution, facebook recruiting tool
    
Work4™
Published By: Netapp     Published Date: May 03, 2013
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk ddrives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches—including hybrid storage arrays, server flash, and all-flash arrays—that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.
Tags : 
deploying flash, hdd, hard disk drives, enterprise it
    
Netapp
Published By: TIBCO     Published Date: Oct 28, 2013
When a business event occurs, or a priority request for intelligence comes down the pipe, the modern enterprise has to be able to quickly deliver the right information to the right people. Unfortunately, many organizations continually struggle with accomplishing this task, as the size and complexity of their IT infrastructure rapidly expands. In this latest research, Aberdeen recommends actions for organizations currently involved in data integration, or contemplating the adoption of such practices.
Tags : 
tibco, data integration, infrastructure, aberdeen
    
TIBCO
Published By: ExtraHop     Published Date: Jul 25, 2013
Worried about application performance in the cloud? Real-time analysis of wire data provides you with deterministic application response times and detailed L7 metrics. This white paper explains how you can get the visibility you need to manage P2V migrations and cloud performance.
Tags : 
it management, data center
    
ExtraHop
Published By: Dell Software     Published Date: Apr 17, 2013
This white paper includes interviews with three diverse companies using User Experience Monitoring (UEM). It underscores UEM’s diverse appeal, its values to IT, and Dell’s versatility in UEM. The paper shows how Dell is combining critical insights into business outcomes and user behaviors with performance and application design.
Tags : 
foglight, user experience, user experience management, cast studies, dell, quest software
    
Dell Software
Published By: Verint     Published Date: Apr 18, 2013
The vision for Celent’s Model Bank research was to try to answer an apparently simple question: “What would it look like for a bank to do everything right with today’s technology?” Of course, the question is not nearly as simple as it appears. The terms “everything” and “right” will mean very different things to different banks depending on their size, the complexity of their operations and product sets, and their technological starting points. While there is no such thing as a “Model Bank”—every bank does some things well, and others not as well when it comes to technology—it is possible to conceive of a “Model Bank” through real world examples of effective usage of technology.
Tags : 
banking, big data, technology, financial, effective use, analytics
    
Verint
Published By: HP and Intel ®     Published Date: May 03, 2013
HP Cloud Solution for Microsoft is designed to provide a scalable, high-performance integrated infrastructure optimized for virtual environments built on Microsoft Hyper-V. Designed and built according to the Microsoft Private Cloud Fast Track reference architecture, HP Virtual System for Microsoft comes standard with Microsoft Windows Server 2012 (which includes Hyper-V) and is designed to deliver top performance for a wide range of virtualized applications, including Microsoft Exchange, SQL Server, and SharePoint. This paper will focus on ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP Cloud Solution for Microsoft, versus a comparable conventional data center infrastructure comprised of discreet, non-integrated compute, storage, network, and management components.
Tags : 
cloud, virtualization, data center, infrastructure, storage, network, management, migration, network architecture, network management, network performance, network performance management
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides: - A high-level, feature-to-feature comparison of key areas of virtualization and virtualization management. - Modular table-based comparisons. - Information from publicly available resources.
Tags : 
    
HP and Intel ®
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization, bandwidth management
    
Cisco
Published By: Cisco     Published Date: Jul 19, 2013
Betting on the cloud Jeff Brooks, CIO of Muscogee (Creek) Nation Casinos, is using the cloud to unify operations and create new business opportunities.
Tags : 
cisco, cloud, cloud computing, proprietary data, unify operations
    
Cisco
Published By: Dell SecureWorks     Published Date: May 28, 2013
How a CIRP Can Pay for Itself Many Times Over, and Best Practices for Creating One.
Tags : 
    
Dell SecureWorks
Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency
    
Siemens
Published By: Dell & Microsoft     Published Date: Mar 06, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : 
dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
    
Dell & Microsoft
Start   Previous    124 125 126 127 128 129 130 131 132 133 134 135 136 137 138    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.