net

Results 351 - 375 of 7688Sort Results By: Published Date | Title | Company Name

7 Steps to Building Your API Blueprint

Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications, network management, content management system, infrastructure, infrastructure management
    
MuleSoft

7 Steps to Controlling Social Networking

Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security, network security, web service security, workforce management
    
MessageLabs

7 Success Stories in Data Center Consolidation and Virtualization

Published By: Fujitsu     Published Date: Feb 06, 2017
Data center infrastructure complexity must be tamed, as mobility, cloud networking and social media demand fast and agile approaches to data delivery. You can overcome these obstacles and improve your data center operations by consolidating your systems and deploying virtualization, using the Fujitsu PRIMEFLEX vShape reference architecture. Get the e-Book.
Tags : 
it infrastructure, data consolidation, data virtualization, converged infrastructure, primeflex vshape
    
Fujitsu

7 Things Millennial Entrepreneurs Need to Know When Starting a Business

Published By: AmVenture     Published Date: May 23, 2017
BNP Paribas Global released a report last year titled “The Emergence of the Millenipreneur.” It painted an interesting picture of who these millennial entrepreneurs are, from the average age they started their first business to their total net worth. But what exactly does it take to start a new business? We’re giving you the top 7 things that “milleniprenuers” need to keep in mind while starting a business of their own.
Tags : 
millennial, entrepreneurs, business, bnp
    
AmVenture

7 Things To Consider When Selecting An Internet Service Provider For Your Business

Published By: Cox Communications     Published Date: Nov 10, 2014
Internet service is the heart of any business today, powering everything from telephone service to videoconferences. Because so much of your business depends on a reliable, fast internet connection, it’s important that you choose the best internet service for your environment. With several different options, though, professionals can sometimes feel overwhelmed by the technical jargon.
Tags : 
internet service, cox, dsl, cable, customer-based wi-fi
    
Cox Communications

7 Things Utilities Should Know About Private Wireless Networks

Published By: Cambium Networks     Published Date: Oct 03, 2016
Download this white paper to learn more about these 7 things utilities should know about private wireless networks: Capacity vs. range Topologies (PTP, Rings, Mesh, PMP) Licensed vs. unlicensed Line of sight vs. non-line of sight Security Quality of service Network management
Tags : 
wireless networks, security, network management, quality of service, wireless service providers
    
Cambium Networks

7 Tips for Getting Started with Location-Based Marketing

Published By: Silverpop     Published Date: Jun 15, 2012
People are increasingly using smartphones for researching, social networking and "checking in" on Foursquare. Learn how you can tap the power of location-based marketing, using customers' real-world behaviors and location to reach them when it's most relevant.
Tags : 
marketing, silverpop, social media, social marketing, mobile marketing, social media campaigns
    
Silverpop

8 Elements of Complete Vulnerability Management

Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, hacker detection, high availability, identity management, intrusion detection, intrusion prevention, security management, data loss prevention
    
SilverSky

8 GREAT REASONS TO UPGRADE TO VERITAS NETBACKUP 8 FOR UNIFIED DATA PROTECTION

Published By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : 
cloud, cloud computing, data management
    
Veritas

8 Key Metrics for Business Social Network Success

Published By: Clearvale by BroadVision     Published Date: Dec 26, 2012
In the traditional business environment, business processes evolve over time. As companies grow, most do not have the time or ability to implement infrastructure that continually enables effective collaboration, innovation or knowledge transfer.
Tags : 
social media, social network, 8 key metrics, broadvision, enterprise
    
Clearvale by BroadVision

8 next generation firewall features that significantly impact your network security team.

Published By: McAfee     Published Date: Aug 14, 2014
Are you using the latest tools to guarantee your network survives an attack? Have you automated routine tasks, simplified upgrades and implemented plug-and-play deployment capability? Here are eight best practices for managing your network security.
Tags : 
firewall management, ngfw, next generation firewall, firewall resource, firewall staff, resource optimization, network security management, ngfw, security
    
McAfee

8 Reasons Citrix NetScaler Beats F5

Published By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : 
virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources, convergence, grid computing, local area networking, migration, monitoring, network architecture
    
Citrix Systems

8 Steps to an Effective Mobile Device Policy

Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW

8 Steps to Get Buy-in for a Website Testing Program

Published By: Monetate     Published Date: Sep 30, 2014
Interested in starting a testing program, but struggling to get internal support? We know, it’s crazy; but take some comfort in that fact that many marketers still face the same roadblocks as you. And that’s why we created this white paper. Inside, you’ll find a specific plan on how to convince your company’s leaders that website testing is essential to the overall business.
Tags : 
website testing, internal support, buy-in
    
Monetate

8 Surprising Facts About Real Docker Adoption

Published By: Datadog     Published Date: Feb 10, 2016
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. Today we're excited to share what we can see about true Docker adoption—no hype, just the facts.
Tags : 
datadog, docker, software trend, information technology, data management, kubernetes, container, microservices, docker swarm, infrastructure monitoring, container monitoring
    
Datadog

8 Tips White Paper - The path to social media success

Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, business technology
    
uberVU via HootSuite

8 Top Considerations for Cloud Image Management

Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies

8 Way Legacy ERP Harms Businesses

Published By: Netsuite     Published Date: Dec 08, 2016
Download this white paper to learn the 8 ways by which outdated ERP systems hold back your business and how “version-less” cloud ERP can help eliminate costly upgrades, reduce IT infrastructure management and drive value with rapid implementation.
Tags : 
erp, cloud computing, it infrastructure management
    
Netsuite

8 Ways Legacy ERP Harms Businesses

Published By: Netsuite     Published Date: Jul 24, 2017
When was the last time you upgraded your ERP system? Not just patched, fixed or tinkered with it—but implemented a substantive upgrade that enabled real business innovation, generated excitement and unleashed a wave of ideas and productivity from your users? You know—the same kinds of enthusiasm that greets web or iPhone apps like Instagram, Spotify, Netflix, etc.?
Tags : 
    
Netsuite

8 Ways Legacy ERP Harms Businesses

Published By: Oracle     Published Date: May 20, 2019
Today’s Outdated State of ERP When was the last time you upgraded your ERP system? Not just patched, fixed or tinkered with it—but implemented a substantive upgrade that enabled real business innovation, generated excitement and unleashed a wave of ideas and productivity from your users? You know—the same kinds of enthusiasm that greets web or iPhone apps like Instagram, Spotify, Netflix, etc.? If you’re like your peers, then the answer is “not in recent memory.” In fact, according to Forrester, “approximately half of ERP customers are on releases that are two versions behind the current release, which may be four years old or more.” Download this whitepaper to find out more about how outdated ERP systems are harming businesses.
Tags : 
    
Oracle

8 Ways To Increase Your Company's Audit Risk

Published By: Avalara     Published Date: Jan 28, 2014
While sales tax compliance is no laughing matter, the following list of what to do to increase sales tax audit risk hopefully demonstrates the right approach to ensuring real compliance. Here are 8 (tongue-in-cheek) surefire ways to increase your company’s sales tax audit risk. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, business technology
    
Avalara

8 ‘Must-Have’ ERP Features for Food & Bev Manufacturers

Published By: Plex Systems     Published Date: Feb 26, 2014
For Food & Beverage processors an ERP system a must; and a flexible Internet-based solution like Plex ERP brings F & B manufacturers all 8 of the features they must have to meet their health and safety requirements, produce high-quality products, operate efficiently & maximize profitability.”
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production, enterprise resource planning
    
Plex Systems

802.11ac Buyer’s Guide

Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the information you need to help you make better decisions before purchasing and deploying 802.11ac Wave 2.
Tags : 
extreme networks, 802.11ac wave 2, 802.11ac, networking, wireless, wireless wlan, wireless lan network, wifi standards, enterprise wireless network, wireless infrastructure, wireless network design, business technology
    
Extreme Networks

802.11ac Migration and Best Practices: Cheatsheet & Webcasts

Published By: Cisco     Published Date: Apr 10, 2015
Not all 802.11ac solutions are the same, with the right approach, you can combine the mobility of wireless with the performance of wired networks. To get up to speed on 802.11ac, we're providing an 802.11ac migration cheat sheet and webinar on-demand.
Tags : 
cisco, 802.11ac, wireless, wifi, network performance, 802.11, mobile computing, mobile data systems, mobile workers, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wlan
    
Cisco
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.