users

Results 1676 - 1700 of 1807Sort Results By: Published Date | Title | Company Name
Published By: B Channels     Published Date: Dec 03, 2018
With NetBackup™ 8.1.2, the most common activities can now be accomplished within a few clicks or touches, thanks to the new intuitive, web-based UI. Authorize secure, self-serve access for a variety of other users with different roles from your desktop or mobile device. Not ready to switch to the new UI just yet? The classic NetBackup UI is still there for you.
Tags : 
    
B Channels
Published By: TIBCO Software     Published Date: Sep 21, 2018
BUSINESS CHALLENGE “Vestas is a global market leader in manufacturing and servicing wind turbines,” explains Sven Jesper Knudsen, Ph.D., senior data scientist. “Turbines provide a lot of data, and we analyze that data, adapt to changing needs, and work to create a best-in-class wind energy solution that provides the lowest cost of energy. “To stay ahead, we have created huge stacks of technologies—massive amounts of data storage and technologies to transform data with analytics. That comes at a cost. It requires maintenance and highly skilled personnel, and we simply couldn’t keep up. The market had matured, and to stay ahead we needed a new platform. “If we couldn’t deliver on time, we would let users and the whole business down, and start to lose a lot of money on service. For example, if we couldn’t deliver a risk report on time, decisions would be made without actually understanding the risk landscape.
Tags : 
data solution, technology solution, data science, streaming data, fast data platform, self-service analytics
    
TIBCO Software
Published By: Brightcove     Published Date: Sep 17, 2014
Internet users are spending more time than ever with digital video, and marketers have noticed. To help you stay on top of the latest trends in video content, eMarketer has curated a roundup of some of our latest coverage on the subject, including statistics, insights and interviews.
Tags : 
digital video, video content, digital video trends, internet marketing, business intelligence, market research, usability
    
Brightcove
Published By: Flimp Media     Published Date: Jan 26, 2010
This report, discusses the uses, applications and benefits of video landing pages for email marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective online video email marketing campaigns using video landing pages without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, landing pages, email marketing, emarketing, measurability
    
Flimp Media
Published By: Cisco     Published Date: Dec 21, 2016
What are the key elements of a collaboration framework that can help IT decision makers (ITDMs) and business decision makers (BDMs) come to a mutual understanding of how, where and why to use videoenabled collaboration solutions, in particular, F2F video? To answer this question, Techaisle conducted a survey of 1,269 ITDMs and BDMs with SMBs and midmarket businesses, across the US, Latin America, Europe, and Asia Pacific. The survey was commissioned by Cisco. The survey findings provide guidance to SMBs and midmarket decision makers on how the nature of the collaboration discussion is changing, drive acceptance and use of F2F video throughout their organization to maximize business payback, and align objectives with the outcomes that shape the activities of highgrowth innovative firms who are the most successful users of advanced collaboration technology.
Tags : 
    
Cisco
Published By: Google Chrome Enterprise     Published Date: May 11, 2018
IT can add a critical layer of security with the web browser. Chrome Browser is setting the standard for web safety and stability in the enterprise. Watch this animation to hear about how Chrome is protecting your users' browser experience as they do more work in the cloud.
Tags : 
    
Google Chrome Enterprise
Published By: Attachmate     Published Date: Mar 20, 2013
Quickly and efficiently package your applications into any format for any device. Deliver enterprise applications wherever and whenever users need them. With Verastream.
Tags : 
soa project, mobile now, mobilenow, screen scraping, terminal emulation iphone, terminal emulation ipad
    
Attachmate
Published By: CDW     Published Date: Jul 30, 2013
As video technology becomes more accessible, more people will use it to make video calls. A confluence of camera-enabled notebooks, smartphones and tablets combined with better wireless network capabilities has created a base of users that are willing to fire up the camera when they want to talk.
Tags : 
cdw, unified communications, camera-enabled notebooks, smartphones, tablets, wireless network capabilities
    
CDW
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Although they have been around for several years, virtual desktop and application virtualization solutions have not yet gone mainstream in most enterprises. That’s bound to change, however, given advances in the technologies and the increasing need to deliver a great computing experience to mobile device users. Read this Executive Viewpoint Q&A with VMware Senior VP and General Manager of Desktops Sumit Dhawan, as he explains why it’s time to revisit virtual desktop and application virtualization technologies. "
Tags : 
    
VMware AirWatch
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware
Published By: VMware Dell     Published Date: Jul 02, 2008
Bell Canada began an initiative to provide desktop solutions at reduced costs. With 8,000 call center agents, Bell Canada faced hardware attrition and rising costs. Streamlining systems, facilitating outsourcing and increasing capabilities to telecommute would reduce costs while improving service. This would require creating customized workstations for users. Bell Canada approached VMware Partner CGI Group Inc., which provides end-to-end IT and business process services, for a solution.
Tags : 
vmware, call center, virtualization, virtual machine, virtual workstation, telecom, bell canada
    
VMware Dell
Published By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : 
voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone
    
iDirect
Published By: Polycom     Published Date: Mar 13, 2015
We are now in a world of Unified Communications (UC) and your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on a phone or mobile devices (BYOD). As IM becomes the new dial tone (“U there?”, “Is now a good time to talk”), when your users want to talk, they expect to be able to place their phone call from their UC client. For most companies today, that UC client is Microsoft® Lync®. While the user may want to place their phone call from Lync, they also want to be able to use a telephone dial pad to dial numbers, access features with convenient feature keys, and be able to choose between using a handset, headset, or speakerphone—and they want to use their phones in ways that are fully integrated with their Lync client.
Tags : 
mobile, lync, unified communication, concept, brand, enterprise, voice, products
    
Polycom
Published By: Polycom     Published Date: Sep 15, 2015
We are now in a world of Unified Communications (UC). Your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on phones or mobile devices (BYOD).
Tags : 
collaboration, conferencing, lync, microsoft, phone, polycom, skype, video
    
Polycom
Published By: GENBAND     Published Date: Sep 11, 2014
GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.
Tags : 
voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
GENBAND
Published By: Dell EMC     Published Date: Aug 17, 2017
Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. We found that the Dell EMC™ VxRail™ P470F hyperconverged system with VMware® vSAN™ could allow you to do more database work than the HPE Hyper Converged 380 (HC 380) with StoreVirtual VSA. The four-node Dell EMC solution processed more orders with faster response times, so more users can fulfill requests quicker—whether they’re placing orders in a store, accessing databases of client info, or adding to company records.
Tags : 
database, database solution, hyperconverged system, database performance, database optimization
    
Dell EMC
Published By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business / Lync users with a better “connection” to the meeting room. And unlike traditional video conferencing systems, the “camera in the middle of the table” approach is flexible enough to support both standard / formal meetings and teaming sessions. Download this case study to learn more!
Tags : 
    
Polycom
Published By: Polycom     Published Date: Oct 17, 2016
With its CX5100 and CX5500 products, Polycom (the sponsor of this study) has taken an innovative approach to resolving this situation. The CX5100 and CX5500 are 360 degree camera systems that sit in the middle of the conference room table, providing remote Skype for Business/Lync users with a better “connection” to the meeting room. And unlike traditional video conferencing systems, the “camera in the middle of the table” approach is flexible enough to support both standard / formal meetings and teaming sessions.
Tags : 
    
Polycom
Published By: Riverbed     Published Date: Apr 26, 2012
This CIO article discusses how WAN optimization solutions, like those Riverbed Technology offers, can accelerate private cloud implementations and enable users to be productive, while helping to deliver the cost and management efficiencies businesses require. Read the informational story now and learn why companies like MasterBrand Cabinets chose Steelhead WAN optimization appliances for superior performance.
Tags : 
riverbed, wan, cloud, private cloud, business technology, wan optimization
    
Riverbed
Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.