internal network

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
The scalability of its EP-LAN lets MMC Corp seize new opportunities without adding infrastructure. For example, Scales and Trusler are looking at virtual desktops or virtual desktop image [VDI] files for some offices and even job sites. “We’ll probably have to scale some bandwidth internally for that,” Trusler notes, “but if we do the VDI internally or we do it with an external third party, it doesn’t really matter… because we can get them on that EP-LAN network and we can get the bandwidth that we need… quickly.” EP-LAN is scalable. In most cases, adding additional services at a specific customer location can easily be turned up by Spectrum Enterprise remotely. Choosing a fiber EP-LAN over MPLS not only met the challenge to connect MMC Corp locations: it created an IT platform that continues to scale to support rapid expansion and innovation.
Tags : 
    
Spectrum Enterprise
Published By: Rosetta Stone     Published Date: Jan 23, 2018
Does your company foster a strong team dynamic? More than ever, effective businesses rely on employees to work internally across departments, and externally with increasingly global networks of clients. Thousands of learners were surveyed about the impact of language training with Rosetta Stone® business solutions.Results showed investing in employee language proficiency delivers five key benefits: Strengthens business operations Stimulates employee engagement Increases productivity Drives company loyalty Attracts globally-aware Millennials
Tags : 
    
Rosetta Stone
Published By: Riverbed     Published Date: Jan 25, 2018
"When apps run efficiently, employees are more likely to use them.” The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach helps you
Tags : 
    
Riverbed
Published By: MobileIron     Published Date: Apr 13, 2015
THV Group, a Belgian company, is a worldwide market leader in replacement parts and accessories for material-handling industrial and agricultural equipment, new and second-hand forklifts, aerial platforms and internal handling equipment. With MobileIron, TVH launched a successful Bring Your Own Device (BYOD) program, built an enterprise app store that gives employees easy access to productivity apps, and automated the process of giving employees and guests the right level of mobile network access.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Juniper Networks     Published Date: Oct 25, 2017
Supporting multiple internal clients and all of their requirements for testing and production networks in more than 1,000 cities around the world—these are the unrelenting challenges for the 12 brands that comprise eBay Classifieds Group. Activating new platforms and features can take a lot of time; with the Juniper solution, turnaround time has been reduced to a few hours—sometimes less—which helps eBay Classifieds turn innovation into a real competitive advantage every single day.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 25, 2017
eBay Classifieds supports multiple internal clients and all of their requirements in more than 1,000 cities around the world. The company adopts cloud and virtualization services to get to market faster with new features, services, and campaigns using Juniper Networks Contrail Networking, Contrail Cloud Platform and QFX5100 Switch.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper Networks
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : 
palo alto, virtualization, cloud, firewall, security, digital
    
Palo Alto Networks
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication
    
Actiance, Inc.
Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
ProfitBricks
Published By: Motorola Solutions     Published Date: Apr 26, 2019
ffective communications are the foundation for any good team, and the transportation and logistics (T&L) sector is no exception. Charged with managing the warehousing, inventory, and movement of freight across the supply chain — both through internal and external distribution networks — T&L professionals rely on high levels of team collaboration to get the job done right. By helping companies leverage the knowledge, talents, and insights of their people, effective team communications ensures that customers get their deliveries when, how, and where they want them. Meeting those expectations in today’s fast-paced, demanding distribution environment requires reliable, clear voice and data logistics communications that start at the warehouse and end at the point of delivery. In this white paper, we explore the key challenges that T&L companies are facing in today’s business environment and hear how instant push-to-talk and advanced video surveillance can help them develop streamlined suppl
Tags : 
    
Motorola Solutions
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: • Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. • Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. • Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance
    
Riverbed
Published By: Jive Software     Published Date: Oct 08, 2009
Learn best-practices for implementing a social software strategy, as leaders from Nike, Cisco, and Forrester share advice and anecdotes in a Social Business Software Roundtable discussion.
Tags : 
cisco, jive, social software strategy, social media tools, online communities, internal social network, social business software, social media marketing
    
Jive Software
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility, database appliance manager, rdbms, database deployment, database installation, node, storage node
    
Oracle Global Marketing
Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you haven’t already been audited—get ready; it’s not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment, prepare for audits, internal audits, enterprise applications, enforced vendor audit, immediate resolution
    
CDW
Published By: eZuce     Published Date: Aug 15, 2013
Want to enable employees to communicate and collaborate socially on a secure internal network? Gain control of BYOD? Eliminate your aging PBX and replace it with a modern, software-only cloud solution? This exclusive research study from internationally renowned Wainhouse has identified the top barriers for UC projects: high costs and slow implementation, leading to high Total Cost of Ownership (TCO). But there are ways to easily overcome both these barriers and ensure UC success. Download the paper today and learn more about how to use UC to drive business business results for your organization.
Tags : 
tco, total cost of ownership, unified communications, virtualization, cloud communications, communication and collaboration, social collaboration, it costs, cut it costs, virtualized communication, secure buy-in, driving it innovation, uc adoption, byod, manage byod, control byod
    
eZuce
Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: CDW     Published Date: Feb 24, 2015
All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.
Tags : 
sam, software asset management, strategic enterprise assets, license utilization, cloud based computing
    
CDW
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.