considerations

Results 301 - 325 of 559Sort Results By: Published Date | Title | Company Name
Published By: Intermec     Published Date: Sep 07, 2011
Smart printers enable businesses to change the way their printing operations are structured, to streamline and improve processes in ways that reduce operating costs while improving reliability.
Tags : 
intermec, wireless, cellular technology, third generation, application capability
    
Intermec
Published By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : 
intermec, tablet, computing, ipad, computers, compatibility
    
Intermec
Published By: Internap     Published Date: Jul 15, 2011
A quick guide for selecting the right managed hosting provider for your business.
Tags : 
managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud
    
Internap
Published By: Internap     Published Date: Jul 15, 2011
Download this webcast and learn key questions and considerations in selecting the IT Infrastructure services that best meet your business needs.
Tags : 
managed hosting, colocation, data center, cdn, internap, ecommerce, data center, internap, data center services, cdn, internet connectivity, cloud, private cloud
    
Internap
Published By: Internap     Published Date: Aug 22, 2011
Deciding on colocation and trying to select a provider? Download the guide to learn about driving factors, benefits, assessment considerations and more.
Tags : 
internap, colocation, buyer's guide, roi, prospective provider, drivers, smb, enterprise, it infrastructure, data center
    
Internap
Published By: Internap     Published Date: Mar 30, 2015
Selecting an Infrastructure-as-a-Service (IaaS) provider can be a complex exercise that involves an array of considerations including business needs, budget, and application requirements. Buyers frequently respond to this complexity by filtering vendors based on variables that are more easily comparable, usually product features, location, and price. By contrast, performance, which is a critical factor to ensuring fit with business needs and ultimately satisfaction with the service, is often ignored. Virtual machine (VM) performance can be challenging to assess because it can vary drastically across vendors, instance sizes and prices, as well as in terms of a particular application’s unique requirements.
Tags : 
infrastructure, benchmarking, cloud computing, database
    
Internap
Published By: Internap     Published Date: Nov 11, 2015
This cloud buyer’s guide includes important information about the advantages of an open source cloud platform, benefits of managed services and self-service as well as considerations for evaluating cloud solutions.
Tags : 
internap, cloud, clod computing, iaas, public cloud, cloud infrastructure
    
Internap
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
A quick-reference guide to defining your organization’s collaboration needs – and finding the right vendor to meet them.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data
    
Intralinks
Published By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf
Published By: Jamf     Published Date: Jan 18, 2018
At Jamf we help organizations succeed wit Apple. The Jamf Pro is the leading iOS Mobile Device Management (MDM) tool for organizations to configure, secure, and inventory iPads and iPhones.
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Jamf     Published Date: Mar 20, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: How the Apple ecosystem is structured How Apple management differs from Windows What security features are unique to the Apple ecosystem What to consider when adding new Apple devices What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: Janrain, Inc.     Published Date: Jan 02, 2014
The rise of the social consumer creates tremendous opportunities for organizations to develop deeper relationships with their customers in support of their business objectives. Whether your goals are to acquire new users, increase on-site engagement, or collect and leverage customer insights (or all of the above), a comprehensive user management platform solution will play a critical role.
Tags : 
user management, on-site engagement, customer insights, user acquisition, user engagement, customer experience/engagement
    
Janrain, Inc.
Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration
    
JBoss
Published By: Juniper Networks     Published Date: Oct 19, 2015
How will you choose a network solution for your data center to deliver the right blend of performance and cost efficiency?
Tags : 
network, data center, performance, cost efficiency, performance
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 20, 2015
Once the good guys are inside your cloud, keep them honest by identifying their roles.
Tags : 
private clouds, security
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 01, 2016
In this paper from TechTarget you will examine: The six key considerations for building security into your architecture The value of an integrated and automated security strategy How the Juniper Unite architecture enables it all
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 18, 2015
Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.
Tags : 
cloud, private cloud, security, password, virtualization
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 01, 2016
In this article we examine the top five considerations in choosing the right solutions to make sure your network can deliver the performance, security, agility, innovation and simplicity you need for now and for the future.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 01, 2016
Download this white paper to discover the top 10 concepts to consider when switching your data center network.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Staying one step ahead of competitors requires a secure, reliable network that has everything it needs to remain agile and resilient in the years to come. When refreshing your enterprise network, keep the following considerations top of mind: 1) How do you manage your network? 2) Is security integrated throughout your network? 3) Does your current network vendor really have a plan for your network? 4) What are your options when supporting your network in the future?
Tags : 
    
Juniper Networks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.