document

Results 751 - 775 of 992Sort Results By: Published Date | Title | Company Name

WP: Migrate to a 40-Gbps Data Center with Cisco

Published By: Cisco     Published Date: Nov 17, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
cisco, transceiver, cost reduction, data center aggregation, migration, switches, networking, security
    
Cisco

Cisco Intelligent WAN Design Guide and Summary

Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design, networking, wireless
    
Cisco

CloudFlare advanced DDoS protection

Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, business technology, cloud computing
    
CloudFlare

JBoss Enterprise Application Platform Migration Guidelines

Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration, migration
    
JBoss

Mastering New Challenges in Text Analytics.

Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS

Mastering New Challenges in Text Analytics

Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS, Inc.

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 10, 2011
Malware code is not easily detectable and may infect consumers' computers when they simply browse your web site. Protect your business and customers by understanding the threat from malware and how it can impact your online business.
Tags : 
malware, verisign seal, protect, www.verisign.com, drive-by malware, software updates, banner ads, downloadable documents
    
VeriSign Authentication Services, now a part of Symantec Corp.

Using Analytics to Proactively Deter Insider Threats (Insider Threat & VI)

Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices, security
    
SAS

Ten Things to Consider Before You Invest in Video Conferencing

Published By: LifeSize, a division of Logitech     Published Date: Feb 20, 2014
This document is designed to help you understand the things you should consider before making an investment in video conferencing. It will help you think of how video conferencing could affect your business processes, why compatibility matters, the steps you should take to ensure its adoption and more.
Tags : 
lifesize, video conferencing, communication, hd video functionality, telecom
    
LifeSize, a division of Logitech

5 Questions to Ask Before Integrating Social Media Into your Sponsorship Offerings

Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
We live in a digital world, surrounded by the most powerful innovations in human communication since the invention of the printing press. We document our daily lives on a global scale. With Twitter, Facebook, Instagram, and other social media sites, we are always plugged in, consuming and producing content every minute of every day. Understanding the power of social integration is half the battle; finding the right tools and strategies to help you do this easily and effectively is equally important. Knowing what to look for and what to get out of a social experience platform is extremely important in creating a successful campaign, product launch, or dynamic brand experience.
Tags : 
spredfast, social media, sponsorship, content, social integration
    
Spredfast, Inc.

Ten Tips for Preparing an Effective Acceptable Use Policy

Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, knowledge management
    
SpectorSoft

Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualization — A Business

Published By: HP and Intel ®     Published Date: May 27, 2014
This document from IDC discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®

The Top 20 Tools Needed for Hybrid IT

Published By: Viavi Solutions     Published Date: Mar 21, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world.
Tags : 
viavi solutions, hybrid it, public cloud, storage systems, it services, legacy tools, best practices, networking
    
Viavi Solutions

The Top 20 Tools Needed for Hybrid IT

Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions

2013 Health Care Reform Checklist

Published By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : 
health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage
    
CBIZ

Research Document published by Ovum: Social Media as a Customer Support Channel : Best Practices

Published By: Oracle     Published Date: Nov 06, 2013
Aligning social media strategies across marketing and customer service.
Tags : 
social customer service, social media, customer service, customer care, contact center, social contact center, social customer care, social care
    
Oracle

Research Document published by Ovum:Connecting Social Interactions Throughout the Customer Lifecycle

Published By: Oracle     Published Date: Nov 06, 2013
Aligning social data across the enterprise to improve customer satisfaction.
Tags : 
social customer service, social media, customer service, customer care, contact center, social contact center, social customer care, social care
    
Oracle

FlexPod Data Center with Microsoft Fast Track Private Cloud 3.0 Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

Campus Wired LAN CVD

Published By: Cisco     Published Date: Jan 06, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, it management
    
Cisco

Cisco Unified Access (UA) and Bring Your Own Device (BYOD) CVD

Published By: Cisco     Published Date: Jan 06, 2015
The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, security
    
Cisco

Optimize Your Network, Maximize Your Profits

Published By: Riverbed     Published Date: Aug 22, 2014
An IDC® study documented the business impact of WAN optimization solutions on enterprise organizations. Current trends and issues that were explored include evolving and shifting communication patterns, connection types, applications and bandwidth.
Tags : 
optimize, network, profit, business impact, solutions, organization, trends, issues
    
Riverbed

Protecting server data with HP StoreOnce Catalyst and HP Data Protector

Published By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : 
hewlett packard, storeonce, data protector, catalyst software, it management, enterprise applications
    
HP

Enterprise Strategy Group:  HP 3PAR StoreServ 7450 Storage Lab Validation Report

Published By: HP     Published Date: May 14, 2014
This report documents the results of ESG Lab’s hands-on testing and validation of the Hewlett Packard 3PAR StoreServ 7450 Storage system, with a focus on application acceleration, autonomic simplicity, efficient unified storage, and resilience for organizations with tier-0 performance requirements.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management
    
HP

Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualization — A Business

Published By: HP     Published Date: May 27, 2014
This document discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.