access

Results 51 - 75 of 2575Sort Results By: Published Date | Title | Company Name

3 Ways to Tie Learning Directly Into Business Needs

Published By: Cornerstone OnDemand     Published Date: Oct 02, 2018
"Still thinking of employee learning and business needs as separate – or competing – entities? Your employees want targeted training that’s ready when they are, and they also want to be rewarded for developing new skills. Companies also want to provide learning, but only if it shows results at the lowest possible cost. In fact, 59% of employees said that access to projects to help keep their skills up-to-date would keep them satisfied at their current company. So how do you reconcile the two? Download this brief to learn ‘3 Ways to Tie Learning Directly Into Business Needs.’ "
Tags : 
    
Cornerstone OnDemand

3D Printing’s Role In Digitally Manufacturing Consumer Products

Published By: HP Inc.     Published Date: Jul 17, 2017
In May of 2013 McKinsey & Company published their now famous report which outlined twelve disruptive technologies that would have a big impact by 2025. 3D printing was one of them and consumer products were a driving force. In the report, they noted that, “3D printing could have meaningful impact on certain consumer product categories, including toys, accessories, jewelry, footwear, ceramics, and simple apparel.” They predicted that “global sales of products in these categories could grow to $4 trillion a year (at retail prices) by 2025.”
Tags : 
3d manufacturing, digital printer, digital manufacturing, printer, scanning, printing solutions, 3d printer, rapid prototyping
    
HP Inc.

3rd Generation Intel® Core™ vPro™ Processor Overview

Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, data management, it spending, business technology
    
Intel

3rd Generation Intel® Core™ vPro™ Processor Overview Animation

Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation, business technology, data center
    
Intel

4 Clues Your Organization Suffers from Inefficient Integration

Published By: TIBCO     Published Date: Oct 28, 2013
Unable to access the data you need? Lack of real-time information? Technology preventing fast execution of changing business strategy? These are just some of the clues you are probably spending more on integration than necessary.
Tags : 
tibco, integration, real-time, efficiency, data management
    
TIBCO

4 Clues Your Organization Suffers from Inefficient Integration

Published By: TIBCO     Published Date: Nov 11, 2013
Unable to access the data you need? Lack of real-time information? Technology preventing fast execution of changing business strategy? These are just some of the clues you are probably spending more on integration than necessary.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy, mobile data systems
    
TIBCO

4 Pillars Behind the Evolution of End-User Computing

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch

4 Pillars Behind the Evolution of End-User Computing

Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware

4 Reasons Businesses Must Transform Accounts Payable with Digital Technologies

Published By: Esker     Published Date: Jul 17, 2018
No matter what future you see ahead for your accounts payable (AP) organization, one thing is sure: If your organization is going to succeed in the emerging digital trade and commerce environment, it will need to process transactions more efficiently than ever, have faster access to AP information, and be able to act upon information and identify opportunities more quickly. This will require AP organizations to transform their processes with digital technologies. Accounts payable departments that delay their digital transformation initiatives risk falling behind their peers and putting their business at a competitive disadvantage in the global business landscape. This white paper details the growth of digital technologies, the dangers of relying on manual and semi-automated AP payable processes, the benefits of using digital technologies in AP, and how effective change management ensures the success of digital transformation efforts.
Tags : 
    
Esker

4 Reasons to Buy Cisco Aironet Access Points with Mobility Express

Published By: Cisco     Published Date: May 24, 2019
Mobile Global Workforce is predicted to surge to 1.87 billion by 2022. Be prepared for the wireless expansion with Mobility Express. Cisco’s Mobility Express* is designed for small businesses that want a controllerless solution with Wi-Fi management functions embedded in the Cisco Aironet® access point itself. Offering SMB’s Cisco’s industry-leading enterprise capabilities at a fraction of the enterprise cost.
Tags : 
    
Cisco

4 Reasons to Retire your Remote Access

Published By: Zscaler     Published Date: Jun 19, 2019
When’s the last time someone said they liked VPN? The way we work has changed. We access apps from any device, from anywhere, and we expect a fast, seamless experience when we do so. Now, enterprises are able to deliver this, and improve security with cloud services called Zero Trust Network Access (ZTNA) technologies. A modern alternative to VPN.
Tags : 
    
Zscaler

4 Tips for Keep Your Salesforce Analytics Cleaning and Powerful

Published By: GoodData     Published Date: Aug 02, 2013
Salesforce provides a tremendous repository of customer information and interactions that’s organized and easily accessed. But that’s not enough! Once you begin to really use it, the questions you ask your salesforce data become more sophisticated. Then you start to uncover holes in your data, reporting strategy and Salesforce analytics itself. Download this white paper for 4 tips that are a surefire way to improve your salesforce analytics.
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, business technology
    
GoodData

4 Ways Architects and Engineers Can Improve Client Relations (AEC)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile

451 Research: Centrify goes “all in” on the zero-trust movement with its Next-Gen Access platform

Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation

451 Research: SAS Data Loader for Hadoop

Published By: SAS     Published Date: Apr 16, 2015
SAS Institute is gearing up to make a self-service data preparation play with its new Data Loader for Hadoop offering. Designed for profiling, cleansing, transforming and preparing data to load it into the open source data processing framework for analysis, Data Loader for Hadoop is a lynchpin in SAS's data management strategy for 2015. This strategy centers on three key themes: 'big data' management and governance involving Hadoop, the streamlining of access to information, and the use of its federation and integration offerings to enable the right data to be available, at the right time.
Tags : 
    
SAS

5 Best Practices CXOs Should Know for Mitigating Medical Device Security Risks

Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software

5 Best Practices for Mitigating Medical Device Security Risks

Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software

5 Best Practices for Mitigating Medical Device Security Risks

Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software

5 Data management for analytics best practices

Published By: SAS     Published Date: Aug 28, 2018
“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. By some reports, most data scientists spend 50 to 80 percent of their model development time on data preparation tasks. SAS adheres to five data management best practices that help you access, cleanse, transform and shape your raw data for any analytic purpose. With a trusted data quality foundation and analytics-ready data, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes to build a data-driven business.
Tags : 
    
SAS

5 Data management for analytics best practices  

Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS

5 Hidden Costs of Using "Free" and Legacy Remote Access and Meeting Tools for Support

Published By: LogMeIn     Published Date: Mar 01, 2012
Traditional remote access and meeting tools were not designed as remote support tools for helpdesks and IT professionals. LogMeIn consults daily with helpdesk and operations managers and here's what we've learned are the top five hidden costs of using legacy tools to provide remote support.
Tags : 
support tools, customer support, technical support, technology, it support, service desk, help desk, business analytics, business intelligence, customer interaction service, customer relationship management, customer satisfaction, customer service
    
LogMeIn

5 Hybrid Cloud Starting Points

Published By: VMware, Inc.     Published Date: Apr 05, 2016
Many businesses are beginning to understand that hybrid cloud can provide the best of both worlds: on-demand access to much-needed IT resources, and the flexibility to move workloads onsite or offsite to meet specific needs. The most common question is not “Why hybrid cloud?” but “How do we get started?” Depending on your specific IT strategy and requirements, consider evaluating the following five types of workloads for hybrid cloud.
Tags : 
vmware, disaster recovery, next gen, cloud computing, hybrid cloud, application integration, web service management, virtualization, infrastructure management
    
VMware, Inc.

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.