document

Results 276 - 300 of 1000Sort Results By: Published Date | Title | Company Name

Colocation providers: a guide to selecting the right one

Published By: Flexential     Published Date: Jul 17, 2019
The benefits of colocation are well documented, making it easy for organizations to build a compelling business case. Once the decision is made to outsource some or all of your IT infrastructure, there’s plenty of work to do, including selecting the right colocation provider.
Tags : 
    
Flexential

Betting on Better Board Meetings: William Hill

Published By: Diligent     Published Date: Jul 10, 2017
William Hill made a faster-than-expected transition to using Diligent Boards due to rapid adoption by the board members and proactive support from both William Hill’s Secretariat team and Diligent. In addition, the company found one unexpected benefit –Diligent Boards is a very helpful tool when new directors join the board. Use of Diligent Boards has spread thanks to positive word of mouth from William Hill board members to other companies on whose boards William Hill board members also serve.
Tags : 
diligence board, portal, meeting information, providers, directors, document management, william hill
    
Diligent

Uncovering Hidden Personalization Opportunities in Retail

Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC

Uncovering Hidden Personalization Opportunities in Retail

Published By: Oracle OMC     Published Date: Nov 30, 2017
The headwinds facing traditional and online retailers in 2017 are numerous and well documented. Chief among the challenges: a sustained assault on established business models driven by changing consumer behavior and the competitive might of e-commerce giant Amazon. Large big-box players, such as Walmart and Target, are responding to the threat - and embracing the opportunity of e-commerce - by boosting online spending by hundreds of millions or even billions of dollars annually. Yet even the largest and most well-resourced players can’t simply spend their way to success. Competing with Amazon and adjusting to the changing demands of consumers means taking a hard look at the engines driving e-commerce and digital marketing operations, scouring for missed opportunities, and investing in the technologies that will fuel the innovations of tomorrow.
Tags : 
    
Oracle OMC

The Path to Enterprise Desktops: From Personal Computers to Personalized Computing

Published By: VMware Dell     Published Date: Jul 02, 2008
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each, exemplified through user case studies.
Tags : 
desktop, desktop virtualization, virtualization, virtual machine, vmware, vmware ace, vmware vdi, server virtualization, desktop management
    
VMware Dell

An Introduction to Mobile Enterprise Content Access and Collaboration Solutions

Published By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise, wireless, business technology
    
Box

File Sharing: Risk or Remedy?

Published By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing, wireless, collaboration, business technology
    
Box

Adaptive Behavior-Based Malware Protection

Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware, business technology
    
Symantec

ESG: Performance Validation on HP VirtualSystem for VMware 2.0, optimized for VMware vSphere 5

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of HP VirtualSystem for VMware 2.0, optimized for VMware vSphere 5.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors

ESG Lab Validation Report for HP VirtualSystem for Microsoft

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This ESG Lab Validation documents the hands-on testing of an HP VirtualSystem for Microsoft solution that leverages the Microsoft Private Cloud Fast Track reference architecture.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors

Realize New Workload Migration and Consolidation Possibilities

Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This document is intended to provide pointers for administrators who are currently running HP-UX Virtual Partitions on legacy, cell-based systems, and who are considering upgrading to HP-UX vPars version 6.1.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data management, business technology, data center
    
HP - Intel® Xeon® processors

Managed Document and Print Services: Take a Closer Look

Published By: Xerox     Published Date: May 28, 2014
Thanks for your interest in reinvesting through MPS
Tags : 
xerox, mps, document, print, managed document and print services, it management, data management
    
Xerox

The Role of Documents: How they drive business

Published By: Xerox     Published Date: May 28, 2014
Thanks for your interest in document process optimization.
Tags : 
xerox, managed print services, documents, print, it management, data management
    
Xerox

Protección contra Técnicas de Evasión Avanzadas

Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti, security, it management
    
McAfee

Proteção contra técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw, firewall de próx ger, segurança, gerenciamento de ti, ngips, ips de próxima geração, network security, firewalls
    
McAfee

Integrating NetApp Storage with SAP NetWeaver Landscape Virtualization Management

Published By: Netapp     Published Date: Apr 02, 2013
This document describes a solution on a NetApp® shared storage infrastructure that provides system administrators with the ability to quickly copy, clone, and manage SAP® systems.
Tags : 
sap, netapp, shared storage, storage, virtualization, landscape, virtualization management, backup and recovery, storage area networks, storage management, storage virtualization, database security
    
Netapp

VMware vSphere 5 on NetApp Clustered Data ONTAP 8.1

Published By: Netapp     Published Date: Apr 02, 2013
This document aligns the server hypervisor with the storage hypervisor by prescribing the best practices for deploying VMware® vSphere® 5 on clustered Data ONTAP.
Tags : 
data center, virtualization, infrastructure, storage, netapp, cluster, storage hypervisor, backup and recovery, clustering, network attached storage, storage area networks, storage management, storage virtualization, cloud computing, design and facilities, infrastructure management
    
Netapp

Build an Agile BI Organization

Published By: GoodData     Published Date: Sep 17, 2013
BI requirements are oft en out of date even before the fi rst set of specifi cations has been collected and documented. Agility is the last frontier in the battle for BI success, and it is the keystone to Forrester’s Agile BI triad: Agile BI soft ware development, Agile BI organizations, and Agile BI technologies.
Tags : 
gooddata, business intelligence, data. better data, bigger ideas, agile bi organization, bi success, bi technologies, software development, it management
    
GoodData

Enterprise Storage for Performance-driven Databases

Published By: NetApp     Published Date: Dec 15, 2014
IT managers and line-of-business stakeholders are striving to increase efficiency of their application environments. The biggest challenges they face in supporting database environments are managing data growth and database size, and meeting database performance requirements. This ESG Lab Report documents the performance, reliability, availability, and serviceability of NetApp EF Series flash arrays in Oracle database environments.
Tags : 
it managers, application environments, data growth, serviceability, performance, storage
    
NetApp

Ten Information Risk Questions Every GC Should Ask the CIO

Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB

MSSP Checklist

Published By: AlienVault     Published Date: Oct 05, 2016
Use this checklist to help you document: Network information Logging devices Contact information Priority escalation contacts Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault

Video is the New Document: Four Things You Can’t Miss

Published By: Polycom     Published Date: Jul 30, 2014
Learn the 4 reasons why a lot of businesses are shifting from print media and documents to video and see how this is a more effective means of reaching your customers and having them share your content.
Tags : 
video, new document, print, media, effective, research, customers, share, content, business technology
    
Polycom
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.