usage

Results 51 - 75 of 306Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Feb 19, 2015
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
    
NetApp
Published By: Jamf     Published Date: Mar 29, 2018
As iPad and iPhone usage continues to grow in higher education institutions around the world, finding the right way to manage iOS devices can be as important as the technology itself. In this e-book, we’ll educate you on the basics of mobile device management (MDM) and explain how you can maximize your education technology purchases. Become an expert in: • The state of iOS in higher education • Best practices and workflows for iPad and iPhone device management • Moving higher education forward with Apple TV
Tags : 
    
Jamf
Published By: Lookout     Published Date: Dec 09, 2016
Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Centrix Software     Published Date: Mar 19, 2014
A case study on how consumerization drives AstraZeneca to use workspace management for ‘cloud-first’ collaborative end-user solutions
Tags : 
    
Centrix Software
Published By: Oracle     Published Date: Oct 26, 2018
Infographic on where the financial services industry will be in 2022 with digital usage
Tags : 
    
Oracle
Published By: Pure Storage     Published Date: Jul 18, 2017
This IDC study represents a vendor assessment model called the IDC MarketScape. It's a quantitative and qualitative assessment of the characteristics that assess vendors' current and future success in the AFA market segment and provide a measure of the vendors' ascendancy to become a Leader or maintain a leadership position. IDC MarketScape assessments are particularly helpful in emerging markets that are often fragmented, have several players, and lack clear leaders.
Tags : 
flash performance, latencies, stripped data, storage techniques, technology efficiency, vendors, api support, odx, usage statistics
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 26, 2017
This IDC study represents a vendor assessment model called the IDC MarketScape. It's a quantitative and qualitative assessment of the characteristics that assess vendors' current and future success in the AFA market segment and provide a measure of the vendors' ascendancy to become a Leader or maintain a leadership position. IDC MarketScape assessments are particularly helpful in emerging markets that are often fragmented, have several players, and lack clear leaders.
Tags : 
flash performance, latencies, stripped data, storage techniques, technology efficiency, vendors, api support, odx, usage statistics
    
Pure Storage
Published By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : 
laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws
    
Docusign
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration
    
CA WA 2
Published By: Brainshark     Published Date: Jun 03, 2013
View this 2 minute video to learn why millions use SlideShark to show flawless PowerPoints on the iPad...instantly track what reps presented which PowerPoints and to whom. Update every copy of a field sales presentation with a single of a mouse...Control, manage and track individual rep usage of master presentations.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: NetApp     Published Date: Nov 12, 2014
With cloud computing usage growing rapidly, the role of I&O must expand to ensure the most effective and efficient use of cloud offerings. These eight steps teach I&O professionals how to act as internal cloud service brokers and facilitate a successful transition to hybrid IT.
Tags : 
hybrid it, cloud enabler, internal cloud service, transition, efficiency
    
NetApp
Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron
Published By: K2     Published Date: Oct 15, 2015
Overvew of Shell's usage of K2 as part of their Workflow Center of Excellence.
Tags : 
    
K2
Published By: SevOne     Published Date: Jul 27, 2015
Download this free whitepaper to learn 10 ways that infrastructure performance monitoring can have a positive impact on your business.
Tags : 
infrastructure monitoring, byod, application performance, sevone, bandwidth usage, best practices, it solutions
    
SevOne
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: -A breakdown of reservation types and offerings, including Convertible Reserved Instances -How to calculate the payback period -How to modify and exchange existing reservations to match cloud usage over time -How to maximize savings with automated RI management and optimization
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM
Published By: IBM     Published Date: Nov 08, 2017
In this paper, you'll learn how organizations are adopting increasingly sophisticated analytics methods, that analytics usage trends are placing new demands on rigid data warehouses, and what's needed is hybrid data warehouse architecture that supports all deployment models.
Tags : 
data warehouse, analytics, ibm, deployment models
    
IBM
Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Currently, this virtualization juggernaut shows no sign of slowing. As businesses recognize the potential for increased reliability and scalability offered by virtual technology, they are ramping up their investments in data center modernization and upgrading. In fact, 33 percent of the respondents to a recent ESG survey on cloud usage said that making greater use of server virtualization was one of their top five spending priorities for the next 12 to 18 months.
Tags : 
    
Druva
Published By: Group M_IBM Q1'18     Published Date: Jan 23, 2018
In this paper, you'll learn how organizations are adopting increasingly sophisticated analytics methods, that analytics usage trends are placing new demands on rigid data warehouses, and what's needed is hybrid data warehouse architecture that supports all deployment models.
Tags : 
data warehouse, analytics, hybrid data warehouse, development model
    
Group M_IBM Q1'18
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
To gain better insight into today’s work practices and risks, IDG Research Services surveyed IT security decision-makers (ITSDMs) as well as end users to gauge VPN usage. Download the white paper to learn several security capabilities identified by IDG that, if available, could prove extremely valuable in reducing the risk of off-network laptop usage.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
In this paper, we focus on the DWA and how it has evolved over the years since its introduction. The XDW architecture is then described, in which the need to maintain the data warehouse is documented while adding new components and capabilities to extend the analytical capabilities. This section also discusses the appropriate usage of appliances within the XDW. The rest of the paper covers the benefits from implementing the DWA, the selection considerations for them and what the future holds for them.
Tags : 
    
Group M_IBM Q119
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.