world

Results 3101 - 3125 of 3238Sort Results By: Published Date | Title | Company Name
Published By: XO Communications     Published Date: Jul 17, 2014
The cloud has gone mainstream, 75% of businesses are using or plan to use cloud based services. More Enterprises are adopting multi-cloud environments, 50% of IT leaders plan on using four or more cloud-based services.
Tags : 
cloud, network, software, backup, disaster recovery, security
    
XO Communications
Published By: Compendium Blogware     Published Date: Jan 05, 2010
Compendium has the answers and is ready to share. Two significant online trends are directly impacting the present and future of Business-to-Business Marketing, and you'll want to find out how organizational blogging can dramatically impact search engine results and serve as an entry into the world of social media.
Tags : 
compendium, blogging, blogware, corporate blog, business to business marketing, website development, leads, social media
    
Compendium Blogware
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: IBM     Published Date: Jul 20, 2016
Please join us to get answers to those questions and: - Better understand today’s enterprise email market and how to assess the value of different email solutions - Find out why IBM was named worldwide market share leader in enterprise social networks for the sixth consecutive year - Learn why customers who left IBM are coming back - Expand your understanding of IBM’s range of products, solutions and services in this area, including Notes/Domino and Verse
Tags : 
ibm, enterprise social solutions, enterprise email market, ibm social business, engagement social
    
IBM
Published By: Schneider Electric     Published Date: Nov 04, 2019
What is digital transformation? Why is everyone talking about it? And what can it do for me? Across every level of your company, people are asking themselves these questions. The Global Digital Transformation Benefits Report provides answers. It’s based on data points from over 230 cases of digital transformation from around the world, in data centers, buildings, infrastructure, and industry. The results paint a compelling picture of what digital transformation can do for businesses of all types. A selection of key findings: - On average, digital transformation helped our customers save 35% on engineering costs. - Our customers cut an average of 28% off their energy costs. - Digital transformation efforts drove productivity gains by an average of 24%.
Tags : 
digital transformation, digital transformation in business, digital transformation in healthcare, iot, data centers, buildings, infrastructure, industry
    
Schneider Electric
Published By: Workday APAC     Published Date: Oct 07, 2019
"How does Patagonia create its enviable culture for 2,500 employees across the world, achieve a 4 percent corporate turnover, and manage to provide on-site childcare? We sat down with Dean Carter, Patagonia’s head of Shared Services for Finance, HR, and Legal, to find out what life is like at the “un-company” and learn Patagonia’s secret for HR success."
Tags : 
    
Workday APAC
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn about real-world examples of companies that have adopted VMware vFabric tc Server and how to plan for future cloud deployments.
Tags : 
vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware
    
VMWare - vFabric
Published By: BlueJeans Network     Published Date: Jun 17, 2016
The concept of all centralizing all communication methodologies (presence, instant messaging, voice, video, and messaging services) within a single system, a.k.a. unified communications or UC, is not new. One of the most popular platforms is Microsoft. In fact, Microsoft has indicated that it has 110 million Skype for Business or Lync users around the world. However, many organizations have yet to fully embrace the video conferencing capabilities available within Skype for Business / Lync. Overall we view Skype for Business (SfB) video conferencing as an excellent choice for sessions involving only SfB users. However, the SfB experience is focused more on content sharing and less on live video. Download this whitepaper to learn 12 situations in which users may wish to use a different video conferencing tool. In this paper, Wainhouse also compares two options for companies seeking better video capabilities.
Tags : 
skype for business, microsoft lync, video conferencing, bluejeans, employee communications, unified communications
    
BlueJeans Network
Published By: Teradata     Published Date: Jan 30, 2015
This TDWI Checklist Report discusses adjustments to DW architectures that real-world organizations are making today, so that Hadoop can help the DW environment satisfy new business requirements for big data management and big data analytics.
Tags : 
data, data warehouse, hadoop, hadoop ecosystem, data architectures, data archiving, advanced analytics
    
Teradata
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this white paper for an overview of how backlinks influence search results, why it's critical to use only white hat methods and how tools like BrightEdge, MajesticSEO and interactive agencies like Rosetta can be used to gain visibility and insight.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
azure workloads, security, compliance, infrastructure, iaas, paas, saas
    
Rackspace
Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
    
Rackspace
Published By: Art Technology Group, Inc     Published Date: Jan 22, 2009
Forrester Research identified click to call technology as one of the "Twelve Technologies That Will Transform Online Retail". Online buyers seek to move between phone and Internet channels in a single unbroken session, merging the best of both worlds: the immediacy and human touch of the phone, with the ease and convenience of the Internet.  Read More.
Tags : 
estara, click to call, online retail, online transactions, e-commerce, e-commerce solutions
    
Art Technology Group, Inc
Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery, hybrid, data, protection
    
EVault Inc.
Published By: 3D Systems     Published Date: Feb 28, 2019
Rewrite the rules of injection molding with 3D Systems thermoplastic additive manufacturing printers and materials. Selective Laser Sintering (SLS) technology is at the heart of a growing trend in mass custom manufacturing as well as functional prototyping. The right additive technologies, materials and finishes are transforming manufacturing. Digital-direct thermoplastic manufacturing offers exceptional quality while opening the door to novel design parameters not possible with injection molding. Thermoplastic additive manufacturing also bypasses the long lead time and up-front investment in injection molding tooling. If you measure your finished parts on the three dimensions: quality, time to market, and cost per cubic inch, in many situations industrial SLS offers a better total value proposition. 3D Systems offers a wide variety of 3D printable thermoplastics, engineered for a range of applications. Materials specialists, designers, and manufacturing engineers can collaborate on
Tags : 
    
3D Systems
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: ADP     Published Date: Mar 22, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
    
ADP
Published By: ADP     Published Date: May 23, 2018
Your global organization’s network of human capital management (HCM) platforms is the nerve center of your entire enterprise. But passing data back and forth between disparate HCM systems has never exactly been easy. So your HR, payroll, talent, benefits and time and attendance systems, often specific to regions and countries, fire futilely across data synapses that in real-world terms leave you blind to the true state of your business.
Tags : 
    
ADP
Published By: IBM     Published Date: Apr 18, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions
    
IBM
Start   Previous    116 117 118 119 120 121 122 123 124 125 126 127 128 129 130    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.