Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

paper based

Results 351 - 375 of 424Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics, security
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
This paper examines various technologies and strategies that have traditionally been the basis for DR planning, as well as new methodologies that have arisen around the public cloud. For those situations where a cloud-based DR strategy makes sense, specific best practice recommendations and implementation steps are described.
Tags : 
recovery, public cloud, cloud storage, gateways, dr planning, recommendations, implementation
    
Riverbed
Published By: eDataSource     Published Date: Jan 05, 2015
Download this white paper today and learn about the key features of Inbox Tracker 2.0 and how it uses real time data from your customers to tell you if they received your communication. This solution is not only more accurate than traditional seed based monitoring when it comes to inbox delivery, but a solution that allows you to react immediately to any fluctuation in your inbox delivery as it happens.
Tags : 
real-time inbox monitoring, email monitoring, real time data, delivery rates
    
eDataSource
Published By: DocuSign     Published Date: Mar 23, 2016
Nevada DOT accelerated the pace of business by replacing its paper-based processes with DocuSign's Digital Transaction Management (DTM) solution, improving the efficiency for employees, contractors, and constituents alike. Read this case study to learn more about how they reduced contract signing time from 50 days to less than 5 days.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
Learn how you can save paper (and trees) starting this year by removing paper-based processes in your organization and embracing DocuSign. Read this quick infographic on exactly how much paper is being wasted each year….for contracts, documents, and just about everything else.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Aug 17, 2016
Procurement teams are moving away from traditional paper-based processes and adopting new technologies to save time, resources and money. Download this complimentary whitepaper to learn how DocuSign is making it easier for Procurement teams to go mobile, manage business relationships, and execute approval cycles faster.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Aug 17, 2016
As the saying goes “a chain is only as strong as its weakest link.” When business processes lack the ability to execute the contract or form with the same speed and control, the value of the whole chain is reduced. This departmental brief explores how electronic approval and signature technology helps create a hyper-efficient contract infrastructure by removing the risk of paper-based processes.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Procurement teams are moving away from traditional paper-based processes and adopting new technologies to save time, resources and money. Download this complimentary whitepaper to learn how DocuSign is making it easier for Procurement teams to go mobile, manage business relationships, and execute approval cycles faster.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
As the saying goes “a chain is only as strong as its weakest link.” When business processes lack the ability to execute the contract or form with the same speed and control, the value of the whole chain is reduced. This departmental brief explores how electronic approval and signature technology helps create a hyper-efficient contract infrastructure by removing the risk of paper-based processes.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Learn how you can save paper (and trees) starting this year by removing paper-based processes in your organization and embracing DocuSign. Read this quick infographic on exactly how much paper is being wasted each year….for contracts, documents, and just about everything else.
Tags : 
    
DocuSign
Published By: NVIDIA     Published Date: Aug 22, 2018
Download the new white paper from NVIDIA that addresses the challenges described in PLASTER, which is important in any deep learning solution, and it is especially useful for developing and delivering the inference engines underpinning AI-based services.
Tags : 
nvidia, plaster, devops, deep learning
    
NVIDIA
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
This white paper will put SDN into the context of a broad movement to have more of a focus on software based solutions and it will identify the key opportunities that SDN can address. It will also discuss both SDN and NV and will describe the relationship between these two emerging approaches to networking.
Tags : 
citrix, network, software design, network performance management
    
Citrix Systems, Inc.
Published By: IBM     Published Date: Feb 27, 2014
This is a paper on model based requirements analysis where best practices in using modeling for requirements analysis and how that links with requirements management is discussed.
Tags : 
ibm, ibm software, systems engineering, best practices, model-based analysis, verifiable, it systems, customer needs
    
IBM
Published By: Progress Software     Published Date: Mar 12, 2014
This paper explores some of the practices most relevant to achieving success with PaaS, focusing on ways to identify how PaaS can be best utilized within the specifics of a given organization’s overall IT needs. Practices include understanding scalability and infrastructure aspects of PaaS deployment, the need for coding wisdom in otherwise “codeless” environments, integration with on-premise systems and other cloud-based IT assets, security and more.
Tags : 
progress software, paas, platform as a service, cloud, isv, platform infrastructure, development platform, enterprise adoption
    
Progress Software
Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies
    
Semcasting
Published By: NetApp     Published Date: Jun 27, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: Datalink     Published Date: Aug 21, 2009
This white paper provides: An objective approach to making decisions about data recovery technologies. (disk-based enhanced data recovery or traditional tape-based) The disk-based architectures for enhanced data recovery.
Tags : 
data recovery, disaster plan, data backup, disaster recovery, tape backup, disk backup, disk-based, tape-based
    
Datalink
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse
    
DataSynapse
Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy
    
IBM
Published By: Meru Networks     Published Date: Aug 21, 2009
This paper explains the numerous places where VoWLAN can go to work, why most offerings fail to make it work, and how only Meru Networks' standard-based solution puts the power of VoWLAN to work at enterprise-scale.
Tags : 
voip, voice over ip, wlan, wlans, vowlan, enterprise software, communications, wireless communications
    
Meru Networks
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection
    
Secure Computing
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
    
Third Brigade
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.