av test

Results 326 - 350 of 435Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 02, 2015
Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment. See how in this whitepaper.
Tags : 
use cases, design guide, campus wireless, deployment, multicast support, channel planning, bandwidth performance
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Located at a hub of innovation, Hyatt Regency Santa Clara caters to sophisticated, technology-savvy guests. This made it the perfect location for Hyatt Hotels to use as a model property in its quest to create the digital hotel of the future. Wi-Fi is one of the most visible services a hotel provides, and is crucial to guest experiences and loyalty. “We had limited Wi-Fi coverage that was not designed for the modern, mobile digital guest,” explains Dania Duke, general manager at Hyatt Regency Santa Clara. “We quickly learned that to stay competitive in Silicon Valley, we need to have the fastest, best Wi-Fi available.”
Tags : 
    
Cisco
Published By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
mcafee, av-test, deep defender, rootkits, detection
    
McAfee
Published By: Polycom     Published Date: Aug 16, 2017
"The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever."
Tags : 
polycom, video conferencing technology, collaboration
    
Polycom
Published By: Polycom     Published Date: Nov 30, 2017
The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever.
Tags : 
shared office spaces, collaboration, polycom, realpresence centro, transforming workspaces, video conferencing, huddle rooms
    
Polycom
Published By: Adecco     Published Date: Sep 27, 2017
With the unemployment average decreasing across the nation and new jobs continually evolving, long-term growth projections are promising for the IT industry. As the tech industry booms, so does the tech job market. We took a deep dive into the latest annual job market data from Bureau of Labor Statistics to better understand how both the nation and the IT sector advanced and what this means for the future of tech.
Tags : 
    
Adecco
Published By: Scripted     Published Date: Apr 10, 2015
In order to execute a successful content marketing strategy, you need to have the right team to lead it. This is because it takes quality content, resources, testing and consistency to see a positive impact on your business. When lacking a proper strategy, content marketing is more detrimental to your business. After reading this e-book, you’ll know how to build a team that works best for your business — even if it is just one person.
Tags : 
content marketing, content team, pitching content, content strategy, marketing team, building teamwork, search engine optimization (seo), data management/analytics
    
Scripted
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Jul 12, 2019
If you’re in charge of your company’s recruiting and onboarding, you know that attracting and retaining top talent is more difficult than ever. This is no surprise: Job seekers have an abundant choice of employers. According to the U.S. Bureau of Labor Statistics, today there are fewer unemployed Americans (6.2 million)1 than there are available jobs (7.6 million).2 In order to attract top talent, companies need modern, sophisticated—and digital— recruiting and onboarding processes. Millennials, who now make up the majority of the workforce, and Gen Z are digital natives who expect their work environments to reflect a hyper-connected world.3 In a Microsoft survey, 93 percent of millennials said that the latest technology was important to them when choosing an employer.4 However, despite the increasing need for digitization in recruiting and onboarding, many companies still have highly manual processes and legacy systems of agreement. Consequently, HR staff slogs through hours using ana
Tags : 
    
DocuSign
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: ANSYS     Published Date: Aug 28, 2019
The most problematic scenario engineers encounter when analyzing large deformation solutions using the finite element method is convergence issues due to mesh distortion. This is typical, for example, during simulation of elastomeric sealing or metal forming applications. Complex nonlinearities due to mechanical and/or thermal behavior arise in such cases from inherent material properties, geometric changes and establishment or separation of contact interfaces. The manual rezoning feature which was released in ANSYS 10.0 gave analysts a highly customizable, albeit labor-intensive, workflow to change and repair the mesh whenever needed after an unconverged solution. However, since the release of ANSYS 15.0, the latest “NonLinear ADaptivity” (NLAD) feature and accompanying enhancements are as automatic as one can imagine for repairing mesh distortion, overcoming convergence difficulties, refining the mesh to capture local phenomenon and achieving the “true” design solution.
Tags : 
    
ANSYS
Published By: IBM     Published Date: Oct 30, 2014
Filled with exotic terms like “Hadoop” and “Data Scientist”, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses what’s really important when it comes to Big Data – and what businesses can do now to capitalize on the trend.
Tags : 
business analytics, big data, bi/ba
    
IBM
Published By: IBM     Published Date: Nov 11, 2014
Social and cloud technologies are connecting us to more people and information than we ever could have imagined. The challenge is to get the right information from the right sources in the right context at the right time. IBM has the leading cloud collaboration platform that helps you collaborate with extended networks, focus on the relevant and filter out the rest. Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
digital frontier, social technology, cloud technology, cloud collaboration
    
IBM
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
As much as we try to avoid it, performance reviews seemingly boil down to last minute gathering of notes and memories, prodded by HR chasing you down to meet deadlines. Sound familiar? The cycle can be broken. In our latest ebook, learn about 5 strategies that help you have a more effective performance review season. Learn how to: • align employee goals to company goals • provide continuous feedback and coaching • tie performance reviews to learning opportunities • use all of the data collected to make informed and actionable decisions Avoid the performance review spiral, download “5 Strategies for More Effective Performance Reviews” today!
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Fisher Investments     Published Date: Sep 29, 2010
If you have a $500,000 portfolio, you should download the latest report by Forbes columnist Ken Fisher. This must-read report includes his latest stock market forecast, plus research and analysis you can use in your portfolio right now.
Tags : 
fisher investments, stock market, outlook, finance, forbes, fisher, economics, portfolio
    
Fisher Investments
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design
    
Cisco
Published By: Cisco     Published Date: Dec 28, 2015
Cloud adoption is an expanding part of IT organizations’ strategies, and IT architects are growing more sophisticated in how they think about cloud; however, as of early 2015, relatively few organizations have truly advanced levels of cloud maturity. In IDC’s recent worldwide CloudView Survey, we discovered that nearly 60% of organizations are currently using or planning to implement some form of cloud — whether for a single project or their portfolio, for test/development environments, or to run mission-critical applications 24 x 7 — but only 25% have reached the level that IDC would call “mature”— that is, building repeatable, managed, or optimized cloud strategies. There is significant room for improvement.
Tags : 
cisco, cloud adoption, public cloud, private cloud, productivity, idc, cloudview survey
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Miercom was engaged to perfirm independent, hands-on, comparative testing of competitive IEEE 802.11ac Wave 2-based WiFi Access Points (APs) from Cisco Systems, Aruba Networks and Ruckus Wireless. This report summarizes the results of the Wave 2 AP comparative testing in these areas: - Client density: Downlink throughput as the number of client per AP scales from 10 to 100. - Single vs Multi-User MIMO: Downlink throughput for MU-MIMO (Multi-User, Multiple-Input Multiple-Output), a hallmark of 802.11ac Wave 2, vs Single-User (SU-MIMO) environments. - 1 Gbps+ Link Aggregation: Tests found that Wave 2 APs can support more than 1Gbps of aggregate downlink throughput, tested over two 1-Gbps LAG (link aggregation) connections.
Tags : 
cisco systems, meiercom, client density, mimo, link aggregation
    
Cisco
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention
    
Rapid7
Published By: Bronto     Published Date: Feb 01, 2018
More than 80% of customers abandon their carts resulting in a whopping $18 billion in lost revenue every year. Retailers that lack a strong, comprehensive cart recovery program are just leaving that revenue behind. This paper will examine what you need to look for in a cart recovery program. What you’ll learn: • How flexibility in choosing the number and time to send emails can increase engagement. • What to look for in the segmentation and personalization of cart recovery emails. • How A/B testing can take your cart recovery program to the next level.
Tags : 
sales, cart recovery, online shopping, retail
    
Bronto
Published By: Sun Microsystems     Published Date: Jan 11, 2010
In this free webcast, learn how business intelligence is changing-and how to best keep pace with it. The amount of available data is exploding; yet much of it is kept in separate silos, where it can't be combined to form meaningful insights. This webcast introduces the latest business intelligence technology that can help you discover your insight "needle" in a haystack of data.
Tags : 
sun, webcast, business intelligence, open source, data, data management, sun microsystems, databasing
    
Sun Microsystems
Published By: Cornerstone OnDemand     Published Date: Jul 09, 2019
Can you imagine having to convince company leadership to increase revenue? Well, that’s exactly what learning and HR leaders are having to do when it comes to investing in learning. Leadership just isn’t aware of the numbers that prove the business impact of learning on your company’s bottom line. Let Cornerstone help you build the case. Download of latest brief, “The business impact of learning”, and we’ll provide you with the stats and information you need to show why learning matters, why your company needs it, and what learning can do for your bottom line.
Tags : 
    
Cornerstone OnDemand
Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing
    
SAS
Published By: ScriptLogic     Published Date: Mar 30, 2012
Let's face it, not everyone's Active Directory is a well-behaved, well-oiled machine. Test your directory's attitude and your management maturity with our quick Personality Quiz!
Tags : 
active directory, auditing, native tools, centralized, data, secure, database
    
ScriptLogic
Published By: EMC Corporation     Published Date: Oct 16, 2013
How effective is your backup? Think you have got it all covered – think again! Answering 3 questions just might reveal what you don’t know you are missing… Put your backup to the test now!
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, assessment tool
    
EMC Corporation
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.