source control

Results 51 - 75 of 101Sort Results By: Published Date | Title | Company Name
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new case study explores how HiDef CorporateT from Citrix Online Audio enables the American Cancer Society to cut audio conferencing costs by nearly 50% - savings that bolster the organization's core mission.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
In this IDC Analyst Connection, Robert Mahowald, IDC research director, explores the value of Web-based audio conferencing and how it enables organizations to better manage users and costs.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
Citrix Online HiDef
Published By: Citrix Online HiDef     Published Date: Aug 01, 2011
This new Frost & Sullivan executive brief explores today's trends in audio conferencing, the impact of a diverse user base and how pricing models are evolving to match use.
Tags : 
hidef, citrix, meetings, online meetings, collaboration, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
Citrix Online HiDef
Published By: VMware     Published Date: Nov 04, 2016
In order to keep pace with the business and developer demands inherent with the digital era, enterprise IT has picked up speed and scale by embracing the cloud. As a result of this mix of private on-premises clouds, hosted private clouds, and public cloud services, the modern data center has become a more complex and murky environment to manage. In the VMware eBook “How to Gain Visibility Across Your Multi-Cloud Environment,” we explore the power of the enterprise-ready cloud management platform (CMP) as a single solution for automating the delivery of IT resources, and managing those resources throughout their lifecycle across private and public clouds. Learn how you’ll gain the agility for accelerating IT delivery, the efficiency to improve OpEx and CapEx, the flexibility to leverage private or public cloud resources, and the level of control necessary to meet governance and security requirements.
Tags : 
    
VMware
Published By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : 
ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
    
IBM
Published By: GoToMeeting     Published Date: Jul 29, 2011
Watch this on-demand Webinar to hear Terrence Gargiulo, president of MakingStories.net, share stories of how companies use virtual collaboration technology to address these challenges and effectively manage projects.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: IBM     Published Date: Jul 25, 2012
As it has been the trend over the last decade, organizations must continue to deal with growing data storage requirements with the same or less resources. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more Service Level Agreements that are difficult to fulfill without IT administrators spending ever longer hours in the data center. Many organizations now expect their capital expense growth for storage to be unstoppable, and see operating expense levers - such as purchasing storage systems that are easy to manage - as the only way to control data storage-related costs.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper
    
IBM
Published By: Sage     Published Date: Jan 30, 2015
As organizations look for more ways to increase productivity and profitability, human resources departments are being asked to provide more strategic input to executives. Doing so requires tools that improve access to timely, accurate information for enhanced business decision making. If you don’t have a human resource management system (HRMS), HR can end up spending too much time on repetitive day-to-day tasks like paperwork while struggling to deliver meaningful workforce insights. The right HR management software can help the HR team increase control over employee data, optimize productivity, and take employee engagement to the next level, so you can deliver the future workforce your organization needs to succeed. This white paper discusses the five areas to keep in mind when evaluating solutions to find an HRMS that’s a good fit for your business.
Tags : 
sage, hr management, hr software, hrms, hr team, evaluating solutions
    
Sage
Published By: VMTurbo     Published Date: Apr 11, 2013
VMTurbo is the only vendor that provides a closed-loop management system capable of holistically assuring workload QoS while maximizing infrastructure efficiency. Our solution continuously identifies inefficiencies, resource contention and bottlenecks in the system and is able to determine—and automate—the necessary actions that control the environment in the optimal operating zone. It changes the economics of managing virtualized data centers and delivers operational savings and productivity gains across the organization. And, it is a better approach to IT operations management in today’s virtualized data center.
Tags : 
operations, management, key points, vmturbo, maximize, infrastructure, resource, efficiency, solution, data
    
VMTurbo
Published By: NetApp     Published Date: Sep 24, 2014
Download this report and find out how new hybrid cloud architectures enable you to take advantage of public cloud resources from Amazon, Microsoft, and others while keeping your enterprise firmly in the driver‘s seat. You’ll learn how you can benefit from the elastic compute power of public clouds and still maintain control over your company’s data.
Tags : 
hybrid cloud architectures, public cloud, enterprise family, elastic compute power, control data
    
NetApp
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud
    
Qualys
Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : 
delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations
    
Sponsored by HP and Intel®
Published By: GoToWebinar     Published Date: Aug 01, 2011
Watch this on-demand webinar to hear pioneer presentation innovator Nancy Duarte, CEO of Duarte Design, demonstrate how to apply the methods in her book, Resonate: Presenting Visual Stories That Transform Audiences, to build meaningful connections with audiences that compel them to action. Her groundbreaking work details a new way of structuring presentations that helps the presenter create a human connection with audiences.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This new white paper identifies strategies for maximizing your webinar program, uncovers key trends related to the benefits and use of webinars and provides valuable insights from survey respondents and other industry experts.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This Webinar Success white paper provides guidelines on how to produce and manage successful Webinars - from the first (and most important) step of defining purpose and expectations to quantifying results after the event.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This eBook explores how organizations can connect and nurture relationships with prospects and customers by effectively leveraging social media and real-time collaboration tools.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
A recent MarketingSherpa Webinar on the topic of high-conversion content uncovered five burning questions from participants about specific types of content. This brief explores these questions and offers advice and strategies for content creation and distribution.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: GoToWebinar     Published Date: Aug 02, 2011
This MarketingSherpa white paper explores how to optimize your lead nurturing campaign with five steps to boost conversions and includes a case study that reveals how one company was able to revive a cold prospect list.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToWebinar
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.