net

Results 1 - 25 of 7688Sort Results By: Published Date | Title | Company Name

eBook: Additive Fertigung von Kunststoffteilen für Ihre Produktionsumgebung

Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck begann als Prototyping-Technologie in den 1980er Jahren und hat sich seitdem rasant weiterentwickelt. Die stetigen Entwicklungen der letzten Jahrzehnte haben den 3D-Druck (auch als „Additive Fertigung“ bezeichnet) in der gesamten Produktionsumgebung zu einer praktikablen und kostengünstigen Technologie werden lassen: von der Prototypenentwicklung bis hin zur 3D-Direktherstellung. Unternehmen, die den 3D-Druck nutzen, können aufgrund der Fortschritte bei Dauer, Kosten und Fähigkeiten, die der 3D-Druck ermöglicht, eine Führungsposition in ihrer Branche erreichen und festigen. Dieses E-Book gibt einen Überblick über die Weiterentwicklungen bei den 3D-Drucktechnologien und Materialien von 3D Systems im Bereich der additiven Kunststofffertigung, die die Bandbreite der Einsatzmöglichkeiten in der Produktionsanwendung vergrößern.
Tags : 
    
3D Systems

Ist das 3D-Scannen für Ihre Prüfanforderungen geeignet?

Published By: 3D Systems     Published Date: Mar 07, 2019
Qualität und Zuverlässigkeit sind wichtiger denn je. Angesichts der allgegenwärtigen Konkurrenzsituation können es sich Unternehmen nicht leisten, bei der Qualität ihrer Produkte Abstriche zu machen. Und das Management darf nicht zögern, stets die neuesten Werkzeuge und Technologien einzusetzen, um jederzeit höchste Qualität sicherzustellen. Das vorliegende E-Book hilft Ihnen dabei, festzustellen, ob 3D-Scannen für Ihre Prüfanforderungen geeignet ist. Außerdem erfahren Sie, wie Sie die Technologie in Ihrem Unternehmen optimal einsetzen können.
Tags : 
    
3D Systems

Cloud Contact Centers Gaining Share 8x8-CCNG Survey

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The migration of contact centers from on-premises to the cloud is well underway and dramatically changing how companies deliver customer experience. That’s the conclusion of this 2016 survey by 8x8 and the Contact Center Network Group (CCNG) of 154 contact center professionals in the U.S. and UK. The November 2016 survey results uncover a range of trends and opportunities that highlight the importance of analytics, the increase in remote working, and the integration of more non-voice channels into the contact center. Download this complimentary report to learn: Major business drivers that are leading contact centers to cloud Surprising top method for measuring and improving agent performance Concerns and obstacles around moving to the cloud Increased prevalence of remote working and key challenges reported The most popular non-voice channels contact center managers would like to incorporate
Tags : 
cloud contact center, ccng, analytics. remote working, non-voice channels
    
8x8 Inc.

The 8 Criteria for Enterprise-Grade Communications as a Service

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.

Unified communications for today’s business

Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Some companies opt to deploy UC solutions on-premises, but the cloudbased model is gaining popularity. Cloud-based UC solutions are ideal for businesses that have limited IT staff, a distributed workforce and/or a desire for pay-as-you-go flexibility. By enabling diverse communication media to be carried over a common IP network, UC solutions make it possible to manage a full suite of capabilities from a single point—and use them with common devices. But what’s the best way to maximize UC capabilities for your specific workplace? Spiceworks surveyed IT decision makers to get their insights on identifying and deploying collaboration and communication solutions across their organizations. This white paper explores the survey results, including key concerns, pain points, and roadmaps around driving UC strategies.
Tags : 
technology solutions, mobile workforce, interface optimization, 8x8, desk phones, internal collaboration, remote employees, cost reduction
    
8x8 Inc.

Six Ways Your Small Business Can Save with Internet Phone Service

Published By: 8x8, Inc.     Published Date: Jan 22, 2013
Traditional phone systems present two main problems for businesses: limited features and high costs. As a result, small businesses are migrating to Internet phone systems that deliver advanced communication over broadband connections.
Tags : 
internet phone service, small business, traditional phone service, 8x8, voip, pbx phone, business technology, telecom
    
8x8, Inc.

Executive Brief: 3 Myths About VoIP Phone Service That May Be Holding Back Your Business

Published By: 8x8, Inc.     Published Date: May 13, 2013
As voice, video, and data networks meld into a single user experience, solutions that integrate phone service, unified messaging, voicemail, audio and video capabilities, rich-media conferencing, and mobility solutions are in high demand.
Tags : 
8x8, voip, mobility, pbx, voice over internet protocol
    
8x8, Inc.

The Benefits of Identity & Access Management

Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks
    
A10 Networks

How A10 Networks' Smart IDentity Management Solutions Simplify Sarbanes-Oxley Act Compliance

Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10
    
A10 Networks

SIEM and IAM Solutions: A10 Networks Solves Complexities

Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks

Automating User Authentication: Simplifying Network Troubleshooting & Security Forensics

Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10
    
A10 Networks

How To Stand Out: Stories From 5 Finance Leaders On Building A Personal Brand

Published By: Abacus Labs     Published Date: Feb 01, 2019
“It’s not what you know. It’s who you know.” We’ve all heard the phrase. We all understand there’s truth to it. But ask yourself: would you recommend or hire everyone you know? No way. Having the right connections is important to advancing your career. But it’s only half the battle. What really creates opportunity is defining your personal brand to your employer, to your network, to the market. It’s taking that moment when you make a great impression and scaling it to the larger world. This guide presents different approaches real professionals are using to build their brands. You’ll see tips and strategies that you can use to become an in-demand finance leader, including a system we developed called the ROLE Model of personal branding. In the age of effortless connection, cultivating a personal brand is essential. It’s not just who you know. It’s what they know you can do.
Tags : 
    
Abacus Labs

How Business Decision Makers Can Use Smart Technologies WITHOUT More IT Support

Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit

Embracing and Empowering the Consumerization of IT

Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit

The Manager of Managers for Today's Instrumented Business and Technology World

Published By: Aberdeen Group     Published Date: Sep 11, 2012
IBM® Tivoli® Netcool®/OMNIbus is a "manager of managers" designed to collect and correlate events from a broad spectrum of infrastructures, providing a "single pane of glass" view into the performance of the entire IT and business infrastructure.
Tags : 
business technology, ibm, aberdeen, manager, business infrastructure, it management, application performance management, business intelligence
    
Aberdeen Group

Omni-Channel Retailing Goes Social

Published By: Aberdeen Group     Published Date: Sep 25, 2012
The report will show how Best-in-Class organizations are prioritizing their social spend to improve personalization and brand compliance.
Tags : 
retail, aberdeen, omni-channel, social, social marketing, marketing, social network
    
Aberdeen Group

The Manager of Managers for Today's Instrumented Business and Technology World

Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
IBM® Tivoli® Netcool®/OMNIbus is a "manager of managers" provides a "single pane of glass" view into the health and performance of the entire IT and business infrastructure.
Tags : 
business technology, ibm, aberdeen, manager, business infrastructure, it management, application performance management, business intelligence
    
Aberdeen-IBM

eCommerce Email Metrics: Ways to Slice and Dice Your Email List and Measurement

Published By: Ability Commerce     Published Date: May 18, 2009
As direct marketers, you know "the devil is in the details." Being able to drill-down on results is important to determine future strategies. It takes discipline and the application of direct marketing tenets. But you can fine-tune your results, target better and reap the rewards.
Tags : 
ability commerce, seo, email frequency, metrics, roi, pci, ecommerce, e-commerce
    
Ability Commerce

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software

Managing Macs in a Windows Environment

Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software

Grappling Growth: How IT Can Thrive in a Fast-Growing Organization

Published By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : 
absolute, technical support, healthcare organizations, operating environment, database development, employee performance, productivity, project management
    
Absolute Software

How To Guide: Building a Power Savings Policy

Published By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : 
absolute, power saving policy, management, roi, energy savings, policy metrics, network management, application performance management
    
Absolute Software

Allina Hospitals Increases Auditing Accuracy by Over 65%

Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software

Apple Device Users - It’s About People, Not Technology

Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software

Top 10 Data Security Tips to Safeguard Your Business

Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility, application security, best practices, productivity
    
Absolute Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.