Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rpos

Results 326 - 350 of 433Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
This document contains Confidential, Proprietary and Trade Secret Information (“Confidential Information”) of Radiant Advisors. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Radiant Advisors. While every attempt has been made to ensure that the information in this document is accurate and complete, some typographical errors or technical inaccuracies may exist. Radiant Advisors does not accept responsibility for any kind of loss resulting from the use of information contained in this document. The information contained in this document is subject to change without notice.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
There is a tendency to discount the network as just simple plumbing, to think that all you have to consider is the size and the length of the pipes or the speeds and feeds of the links, and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise has to be designed for scale, purpose, redundancy, protection from tampering or denial of operation, and the capacity to handle peak loads, the network requires similar consideration. As users depend on the network to access the majority of the information they need to do their jobs and to transport their voice or video with reliability, the network must be able to provide resilient, intelligent transport.
Tags : 
    
Cisco
Published By: Emerson     Published Date: Nov 17, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Emerson's DCIM Solution on their organizations.
Tags : 
emerson, data center, data center management, dcim, infrastructure management, infrastructure, network architecture, servers, cloud computing, data center design and management
    
Emerson
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) organizations may realize by deploying Office 365. The purpose of this study is to provide readers at small and medium-sized businesses (one to 250 users) with a framework to evaluate the potential financial impact of Office 365 on their organizations.
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Jul 09, 2015
Whether it's a web application or an enterprise cloud application, Websphere Application Server has the right fit-for-purpose cloud environment for your business.
Tags : 
web application, ibm, enterprise cloud application, cloud environment, application server, it management, data center
    
IBM
Published By: IBM     Published Date: May 20, 2015
Join our IBM Big Data analytics experts at this webinar for a discussion of how the right analytical techniques can broaden the possibilities of your analytics infrastructure.
Tags : 
big data, analytics, forecasting, data management
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, middleware, cloud, hybrid cloud, application infrastructure, ibm was liberty, application servers, networking, enterprise applications
    
IBM
Published By: Act-On     Published Date: Aug 28, 2012
Learn best practices for developing and deploying appropriate strategies for content across all channels and lead lifecycles.
Tags : 
content marketing, content management, repurposing content
    
Act-On
Published By: OutSystems     Published Date: Jan 29, 2014
The paper, authored by Bloor Research, includes a comprehensive analysis of the two PaaS solutions with a focus on providing an objective look at two products that are both ‘fit for a purpose.’ The paper provides enough information to help IT professionals determine which product matches their needs and requirements.
Tags : 
outsystems, outsystems platform, force.com, paas, it management
    
OutSystems
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security, data center
    
Symantec
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking, wireless
    
Cisco
Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox, gold lasso
    
Gold Lasso
Published By: SAS     Published Date: Sep 30, 2014
As analytics and Big Data have been embraced, analysts are working to become better at communicating the insights from complex analysis. This makes the use of visual analytics increasingly important as a tool to tell compelling stories and to engage decision makers in dialogue. Importantly, the best visual analytics are not necessarily the coolest, most sophisticated, or most complex. Visual analytics are most effective when there is a clear purpose and when data can be visualized and communicated in a way that is easily understandable.
Tags : 
sas, big data, visual analytics
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Riverbed     Published Date: Jan 28, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view, namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability to monitor and troubleshoot network performance efficiently.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management, enterprise applications
    
Riverbed
Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, security
    
Symantec
Published By: Bridgeline Digital     Published Date: Sep 26, 2013
iAPPS Content Manager is the premier business marketing solution to drive Digital Engagement in the CMS marketplace. iAPPS Content Manager allows businesses to personalize their online interactions with customers in an increasingly digital world. The solution combines business purpose and end-user context to attract customers, deliver compelling content, and optimize conversion rates.
Tags : 
cms, content manager, content management system, digital engagement
    
Bridgeline Digital
Published By: Audio Animators     Published Date: Oct 03, 2013
Video marketing typically means you want to generate leads, sales, or buzz. Most marketers jump right into video with little thought to their options. But, they exist and by making the right decision can have a big impact. This paper clarifies options and provides a path to optimal conversion by ensuring you select the right video medium for your purposes.
Tags : 
    
Audio Animators
Published By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management
    
Cisco
Published By: Riverbed     Published Date: Apr 03, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.
Tags : 
riverbed, npm, network performance management, performance management, network management, networking, performance tools, security, compliance, service management, network performance
    
Riverbed
Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP
Published By: HP     Published Date: Jul 28, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc, security
    
HP
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, enterprise applications
    
OpenText
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.