it issues

Results 526 - 550 of 706Sort Results By: Published Date | Title | Company Name
Published By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : 
net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing, email marketing services/software
    
Net Atlantic
Published By: SilverSky     Published Date: Mar 20, 2013
In this whitepaper, we highlight the important issues surrounding cloud email, such as cost, security, monitoring, uptime, and compliance.
Tags : 
email, cloud, uptime, compliance, data protection, security, email security, business continuity, cloud email provider, spam
    
SilverSky
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization introduces new challenges for managing your data center. Applications now compete for shared resources such as storage, CPU cycles and memory, often causing performance bottlenecks and unhappy customers. This paper details 20 metrics that indicate when capacity issues are occurring and recommends a corresponding tool that will analyze the data and resolve your VM performance issues. Read the White Paper "
Tags : 
vmware, metrics, virtualization
    
Dell
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: IBM     Published Date: Jul 07, 2016
Join IBM Mobile Analytics expert, Michael Darden, to see how the analytics capabilities of IBM MobileFirst Platform can enable you to answer three critical questions about your apps and then take immediate action to correct any value-draining issues … faster than your clients can take matters into their own hands.
Tags : 
ibm, mobile, mobile applications, app development
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
    
Group M_IBM Q119
Published By: Gomez Marketing     Published Date: Jan 06, 2011
Do you know your mobile customers - really? Without genuine insight, you might be tempted, for example, to offer mobile users the regular website that works well with your Internet customers. But most smart and feature phones cannot support the complex, high-bandwidth Flash and Ajax applications at the heart of your site. Further, your feature and content rich website can pose numerous usability, navigation, or even screen real estate issues on hand-held devices.
Tags : 
gomez, web performance, mobile, mobility, site performance, ecommerce, online shopping, web performance, crm solutions/software, mobile marketing
    
Gomez Marketing
Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security
    
VMware
Published By: Cisco     Published Date: Jul 11, 2016
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Though IP telephony has been available commercially since the mid ‘90s, it remains an emerging technology for many organizations. Only about 28% of companies have moved all endpoints (handsets, softphones, audio bridges) to IP, according to Nemertes’ research data. The rest of organizations are either in the process of migrating fully to IP, stuck in a hybrid rollout requiring them to manage typically multiple TDM and IP providers, or firmly planted in TDM. This report reviews the issues and benefits associated with moving to an all-IP environment, based on interviews with IT professionals who have moved to all IP or are in the process of doing so.
Tags : 
    
Cisco
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"DBAs need help with tackling significant issues, including doing more with fewer resources, quickly responding to upgrade and patch needs, while reducing the time spent on cloning databases. Finally, they need help eliminating the time they spend integrating, testing, and deploying full-stack cloud solutions. How can DBAs reconcile these competing demands? Learn more about expanded offerings in a database appliance that are delivering numerous advantages. These new configurations have the potential to help IT derive new benefits in its efforts to serve the business. "
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IAG Consulting     Published Date: Feb 13, 2009
Great Requirements are Free is a new idea in webcasts: It recognizes that everyone from executive to analysts are busy and can’t always free up the time to view a forty-five minutes to one hour session during the day. Micro casts are short, hard-hitting, and informative sound-bites on critical issues. We guarantee it will be a productive 10 minutes in your day.
Tags : 
iag consulting, keith ellis, cost savings, requirements, micro cast
    
IAG Consulting
Published By: BlackBerry     Published Date: Jul 22, 2010
Unified Communications (UC) integrates multiple communications modalities and adds presence features to allow workers to communicate and collaborate more effectively with co-workers, customers and suppliers. Learn about the cost, productivity and reachability issues associated with increased enterprise mobility and the benefits and future directions of Mobile UC.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, fmc, telecom, touchpoint
    
BlackBerry
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Tsavo Agency     Published Date: Oct 29, 2009
Businesses managers and website owners today need to have some basic Search Engine Optimization (SEO) knowledge whether they work with an internal SEO team or hire an SEO agency to get top Search Engines rankings. Based on years experience optimizing websites for search engines, we have put together a list of the most problematic and common on page SEO issues. Find out if your site is suffering from any of these on page SEO issues.
Tags : 
tsavo, traffic, conversions, seo, search marketing, keywords, rich content, optimizing, cms, traffic, search marketing agencies
    
Tsavo Agency
Published By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : 
silversky, fortune 500, business security, network security, it management, security products, security systems, log data, detects threats, protects network, it budgets, software-as-a-service, saas, log management
    
SilverSky
Published By: HP and Intel ®     Published Date: Jul 26, 2013
Without the proper policies governing cloud usage, a shared infrastructure design, and without a comprehensive yet effective cloud service portfolio, your organization will end up spending more time and money fixing issues rather than delivering desired results to the business.
Tags : 
cloud, converged infrastructure, cloud design
    
HP and Intel ®
Published By: Tripp Lite     Published Date: May 31, 2016
This White Paper will: • Outline the challenges of cooling evolving IT infrastructure • Explain close-coupled cooling, available solutions, and the advantages compared to conventional perimeter systems • Recommend a plan of action to identify and solve cooling issues in your environment
Tags : 
tripp lite, close coupled it cooling solutions, best practices, data centers, it infrastructure, rack cooling, spot cooling, network cooling, data center cooling, server cooling, it equipment cooling, spot cooler, portable cooling
    
Tripp Lite
Published By: IBM     Published Date: Oct 01, 2013
Clabby white paper that highlights the benefits and advantages that IBM brings to the market with its breakthrough technology and products, providing the right solution and value for customers' issues compared to Cisco UCS.
Tags : 
ibm, ibm’s bladecenter, x86 servers, it solutions, servers, san, chassis, applications, energy efficienct, networking, storage, data management
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Mobile computing via smart phone, laptop, tablet and e-reader is becoming commonplace in the enterprise today. Unfortunately, so are the challenges it brings. This White Paper examines the network security, device management, network performance and user expectation issues you need to solve for effective mobile collaboration, and outlines the planned, architectural approach IBM recommends.
Tags : 
mobile computing, smart phones, wireless devices, device management, security, network performance, user expectations, mobile collaborations, architectural approach, mobile onslaught
    
IBM
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.