asp

Results 301 - 325 of 524Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity to learn more.
Tags : 
kaspersky, cybersecurity, employee knowledge, internet safety, cybercrime, security policy, phish, threats
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization? A new whitepaper from Kaspersky Lab, "Virtualization Security Options: Choose Wisely" will tell you.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection, business transformations
    
Kaspersky Lab
Published By: IBM     Published Date: Feb 25, 2008
Going green is becoming more than an altruistic aspiration to save the planet. A proactive corporate environmental policy is now an essential part of any company’s overall business strategy. Download this paper to find out how IBM can help you to support environmental initiatives while achieving your company's long-term business goals.
Tags : 
green, environment, environmental, compliance, cost, green strategy, ibm
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
Web Application Security Podcast featuring Paul Kaspian. This PodCast touches on how to meet application security compliance deadlines.
Tags : 
ibm, podcast, rational appscan, application security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: GoToMeeting     Published Date: Oct 08, 2013
Are you an Extreme Leader? Do you aspire to be one? The Extreme Leader doesn't just meet the existing standards; she or he defines higher ones. This handbook draws upon lessons from The Radical Leap Re-Energized by leadership expert Steve Farber, offering tips for taking your leadership to the next level.
Tags : 
yankee group, pim bilderbeek, leadership, daily, handbook, productivity, communication, collaboration, social media
    
GoToMeeting
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore, policy management
    
ScriptLogic
Published By: iCims     Published Date: Mar 06, 2014
In this whitepaper, explore how cutting-edge video technology can be leveraged to optimize all aspects of the recruitment process: • Video as a Candidate Engagement Tool • Video as a Screening Tool • Video as an Interviewing Tool • Video as an Onboarding Tool Now is the perfect time to dive deeper into modern video technology to see what video can do to support your recruiting staff, your candidate engagement, and your bottom line.
Tags : 
video recruiting, candidate engagement tool, human resources, hr technology, icims
    
iCims
Published By: Gluster     Published Date: Mar 17, 2011
This document discusses some of the unique technical aspects of the Gluster architecture, discussing those aspects of the system that are designed to provide linear scale-out of both performance and capacity without sacrificing resiliency.
Tags : 
gluster, cloud computing, virtual environments, open source storage software, infrastructure
    
Gluster
Published By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : 
ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search, storage, service
    
IBM Software
Published By: IBM Unica     Published Date: Apr 16, 2012
With end-to-end enterprise marketing management solutions from IBM, you can transform all aspects of marketing to engage customers in highly relevant, interactive dialogues across digital, social, mobile and traditional marketing channels. Read to find out more.
Tags : 
ibm, enterprise marketing management, enterprise, end-to-end, it solutions, it management, marketing software, web analytics, crm solutions/software, customer experience/engagement, social media marketing
    
IBM Unica
Published By: Dell     Published Date: Jul 30, 2012
Small and mid-sized businesses are hopping on the virtualization bandwagon. A recent study indicates that a healthy number of SMBs have virtualized some aspect of their IT environments.
Tags : 
smb objectives, data applications, virtualizations, virtual machine, data storage, data management, capex reductions, saas, dell pwerconnect, sql
    
Dell
Published By: IBM     Published Date: Aug 10, 2012
This brief video shows how advanced analytics can incorporate survey methods designed to help you with every aspect of survey research - everything from gathering the data, to data analysis, to reporting.
Tags : 
survey data, ibm, business analytics, ibm spss, patient satisfaction, analytics solutions
    
IBM
Published By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : 
digital skills, culture, strategy, data management, processing, technology, ux design
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : 
sap, mobile, managing, business, mobility, technology
    
SAP
Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization
    
SunGard
Published By: CDW     Published Date: Aug 07, 2015
Like many, you may find that you lack the time and resources to adequately extend Disaster Recovery (DR) to safeguard all aspects of your organization. As a result, gaps in DR coverage put your business at risk.
Tags : 
cloud, storage, data center, disaster recovery
    
CDW
Published By: Sage     Published Date: Oct 17, 2013
See why an appropriate time and attendance system that meets your organization’s needs can help to eliminate and prevent most of the negative aspects of inaccurate and unreliable timekeeping for your business.
Tags : 
employee productivity, workforce management, company culture, employee performance
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
An appropriate time and attendance system that meets your organization’s needs can help to eliminate and even prevent many, if not most, of the negative aspects of inaccurate and unreliable timekeeping. Maintaining accurate and reliable time and attendance information makes it easier to keep a handle on labor costs, increases the accuracy of payroll, and reduces administration in the human resources (HR) department, thus saving time. This white paper outlines the top benefits of a time and attendance system and the positive effect automating your time and attendance process can have on your organization.
Tags : 
sage, payroll, labor costs, employee, attendance processes
    
Sage
Published By: HP     Published Date: Oct 01, 2014
The role and purpose of IT in an organization is undergoing significant change, driven by the need for businesses to become more agile and have greater control over cost levers when using technology. This transformation of IT involves many different aspects, not all of which are technology-related, but the one thing they all share is that IT modernization is about making changes to meet the current and future demands of business. This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective, with the findings delivered as the Ovum Decision Matrix (ODM). It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled.
Tags : 
decision, matrix, virtualization, cloud, management, businesses, technology, modernization, cost, levers, transformation, environments, data center, deployed, infrastructure
    
HP
Published By: Cornerstone OnDemand     Published Date: Aug 27, 2015
We believe that to be the best leader you can be, you need to be a fearless, bold, effective coach on a daily basis. Aspirational, right? The path to greatness seldom runs smoothly though, so here are a few strategies to get you started.
Tags : 
management, applications, software, productivity, workflow
    
Cornerstone OnDemand
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Prepare your business for the future of customer service. In a world where price and product can easily be matched, customer experience has become a key brand differentiator. It’s never been more important to understand customer expectations, perceptions, preferences, and trends. The 2017 Microsoft State of Global Customer Service report found that customer service impacts brand choice and loyalty for 96% of consumers around the globe. The 32-page report offers insights from 5,000 survey participants. Learn how you can stay ahead of the competition and earn customers for life with intelligent customer service. Find trend details and actionable data on: The growing importance of service in a customer’s choice of or loyalty to a brand The most important aspects of a good customer service experience The most frustrating aspects of a poor customer service experience Expectations of the millennial customer segment Channel preferences based on geography Customer expectations for self-serv
Tags : 
    
Microsoft Azure
Published By: Avaya     Published Date: Jan 04, 2017
To succeed in a tough marketplace, small businesses must be accessible, without significant interruption, even in the most adverse situations. This kind of ongoing accessibility is an important aspect of business continuity - a critical success strategy that doesn't just happen, but requires proactive planning. Although there are several aspects to a business continuity plan, a major component of any plan should be the SME's communications capabilities, not just its equipment or data. This paper will explore how different kinds of interruptions can adversely affect an SME's business continuity and illustrate how, through advanced features such as resiliency and mobility, Avaya's IP Office can help SMEs overcome interruptions and maintain business continuity.
Tags : 
avaya, communications, avaya ip office, unified communications, contact center, collaboration, midsize business solutions
    
Avaya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.