pods

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: PODS for Business     Published Date: Jul 24, 2017
The constant churn of product selection is not just time-consuming, it requires meticulous attention to detail, a reliable product tracking system, and significant physical space. Mastering inventory results in much more than simply organizational improvements. It can lead to increased revenues, better theft control, improved forecasting and budget setting, and even smoother customer service.
Tags : 
inventory, management, efficiency, theft control, revenue
    
PODS for Business
Published By: PODS for Business     Published Date: Jul 24, 2017
The Times Square Alliance works to improve and promote Times Square—cultivating the creativity, energy and edge that have made the area an icon of entertainment, culture and urban life for over a century. Each year, the organization coordinates many large-scale events, including the world-renowned Times Square New Year’s Eve celebration.
Tags : 
efficiency, technology, coordination, organization, new years eve
    
PODS for Business
Published By: PODS for Business     Published Date: Jul 24, 2017
How a national restaurant chain utilized PODS® to reduce the costs and improve the efficiency of their corporate relocation program.
Tags : 
efficiency, corporate relocation, organization, cost reduction, storage
    
PODS for Business
Published By: PODS for Business     Published Date: Oct 06, 2017
Retail store managers become accustomed to the challenge of balancing staff time between performing tasks in the store and servicing customers on the sales floor. The biggest challenges come during resets, seasonal changes, and other promotional events which require floor changes. Merchandise must be moved from the stock room onto the sales floor.
Tags : 
    
PODS for Business
Published By: PODS for Business     Published Date: Oct 06, 2017
Many companies turn to PODS® to assist their employees with their moves. All family belongings are carefully packed and loaded into a PODS container. The PODS container can be left in the family driveway for a period of time to make it easy for the family to take their time packing certain items.
Tags : 
    
PODS for Business
Published By: PODS for Business     Published Date: Oct 31, 2017
Learn the variety of ways in which more storage can help your business optimize on efficiency and improve your bottom line.
Tags : 
    
PODS for Business
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
    
HP Data Center
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Search      

Add Research

Get your company's research in the hands of targeted business professionals.