Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

call

Results 1 - 25 of 2153Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Oct 11, 2016
For many enterprises, the data center powering their workflow is located someplace far removed from where the people using it are located. Typically the data center is either close to inexpensive power, or located in a facility that is off campus somewhere not necessarily convenient to those administering and using it. This brief explores remote power management as a way of ensuring that your data center works for you and not the other way around.
Tags : 
networking, it management, data center
    
Server Technology
Published By: SimpliVity     Published Date: Jan 07, 2016
There’s no denying that hyperconverged infrastructure is hot right now, promising to dramatically shift the way infrastructure is procured, deployed and managed. But questions remain. Is it actually addressing the real-world concerns faced by real-world customers? What are the catalysts driving organizations to evaluate hyperconvergence and are they finding that the results match the hype when they actually do deploy? Get the fast facts from this SimpliVity eBook based on research from ActualTech Media, segmented and re-analyzed just for EMEA.
Tags : 
desktop virtualisation, cloud computing, cloud management, networking, data center
    
SimpliVity
Published By: Anixter     Published Date: May 22, 2015
Whether it’s for business or education, entertainment or shopping, nearly every financial transaction, phone call or text, movie download or Internet search either now takes place or is recorded in a data center. With nearly everyone’s professional and personal lives dependent upon a healthy ecosystem of data centers, it is only natural that data centers are now targeted by thieves, spies and others maliciously seeking to cause damage or to steal the information contained within a data center.
Tags : 
security strategy, asset management, physical security, data center, data centre, security, risk, risk management, best practice, compliance, cost, capex, opex
    
Anixter
Published By: LeGrand     Published Date: Oct 18, 2016
Efficiency is a key objective when designing a data center. Efficiency gains are typically focused completely on power and cooling. Efficiencies can be realized in many other areas resulting in additional cost savings, reliable network performance, easier maintenance, flexibility, and scalability.
Tags : 
data center, connection, design, performance, time, space, experience, legrand, networking, security
    
LeGrand
Published By: Server Technology     Published Date: Dec 07, 2015
It has been obvious for some time that the power distribution system within the data center is the key opportunity to focus upon in order to actively manage the rising costs of power and more specifically, identify problems and waste in real-time. With future-thinking organizations sharing knowledge between Facilities and IT, the push for more intelligence within this rack-based power infrastructure has become urgent with higher rack power densities. In fact, proactive power management at all stages in the distribution chain within enterprise data centers has become the requirement to feed efficiency studies and data center infrastructure management (DCIM) style optimization initiatives.
Tags : 
data centers, power, pdus, dcim, data center design and management
    
Server Technology
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Published By: PGi     Published Date: May 03, 2019
As businesses give employees more power to work wherever and whenever they want, IT and business leaders are tasked with creating connected, collaborative work environments that are optimized for all devices. Rather than investing in point solutions that employees may or may not use, many organizations are investing in Unified Communications (UC) — more specifically, UC as a Service (UCaaS) or UC services delivered through the cloud.
Tags : 
    
PGi
Published By: Uberall     Published Date: Apr 12, 2019
New data from Google¹ reveals that 5 out of every 10 consumers who search online locally for goods and services will visit a store within 24 hours. If your business does not have a strong online presence locally, a large portion of ‘good fit’ consumers who are motivated to buy products or services you supply are potentially visiting your competitors’ stores.
Tags : 
guide, uberall, location marketing, mobile search, local seo
    
Uberall
Published By: Workday APAC     Published Date: May 08, 2019
"Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now."
Tags : 
    
Workday APAC
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: CheckMarx     Published Date: Apr 03, 2019
Following a paper released by the US Department of Homeland Security, software security is fundamentally a software engineering issue that must be addressed systematically throughout the software development lifecycle.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
There can be no doubt that the architecture for analytics has evolved over its 25-30 year history. Many recent innovations have had significant impacts on this architecture since the simple concept of a single repository of data called a data warehouse. First, the data warehouse appliance (DWA), along with the advent of the NoSQL revolution, selfservice analytics, and other trends, has had a dramatic impact on the traditional architecture. Second, the emergence of data science, realtime operational analytics, and self-service demands has certainly had a substantial effect on the analytical architecture.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
In our always-on, always-connected world, healthcare consumers expect instant access to customer service, not just from 9 AM to 5 PM. It’s often no longer good enough for health plans to staff call centers during standard business hours. Members today typically want to be able to log in and help themselves to the answers they need from self-service channels whenever they want — and they want the experience to be highly personal. One contact center benchmark study (see next page) revealed self-service channels can be a win-win for both businesses and consumers.1 When done well, self-service solutions can help businesses improve customer satisfaction while reducing costs. And consumers appreciate the convenience of getting answers quickly and efficiently.
Tags : 
    
Group M_IBM Q2'19
Published By: Oracle     Published Date: Jun 04, 2019
Finance leaders believe data management is a burden on businesses. Yet less than half of organisations have a data management strategy in place. But data management strategies positively impact security across all lines of business. Poor data management practices inevitably lead to poor outcomes, with bad decisions based on bad data. Data must also be protected, with weak practices leading to cyber breaches. And the reputational damage to an organisation’s brand cannot be underestimated. However, when managed well, data offers a competitive advantage. In the past, data was typically informed historical reporting, with internal needs and compliance taking priority. There is a new data paradigm. Data is the new currency in the digital age.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 10, 2019
In our recent report, we look into the reasons why HR feel less than confident in their ability to manage the volume of data securely and ethically. From extracting the right type of insights to improving employee productivity and engagement to managing the skills pipeline. We look forwards to how HR can improve their systems by using automated technologies such as artificial intelligence and machine learning. Read the survey today to see how your organisation compares to your peers.
Tags : 
    
Oracle
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.