idera

Results 551 - 575 of 791Sort Results By: Published Date | Title | Company Name

Developer Report: Top Social Media and HTML5 Considerations for Mobile App Success

Published By: Appcelerator     Published Date: Jun 20, 2012
Find out about two of the hottest topics surrounding mobile app development right now-social media and HTML5. Educate yourself on the backend of mobile app strategy and use your knowledge to stay in front of the competition.
Tags : 
html5, social media, mobile app, development, backend, strategy, competition, trends, dynamtic, survey, wireless
    
Appcelerator

451 Research: Expanding Machine Learning Applications on the Endpoint

Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
    
BlackBerry Cylance

Security Gets Smart with AI

Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection, internet security, network security appliance
    
Lumension

Gartner Says Additional Backup Needed to Prevent Data Loss from SaaS Solutions

Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
druva, gartner, best practices, technology, data, cloud, business intelligence, business management, business technology, cloud computing
    
Druva

Realising the full benefits of MFP integration with network fax

Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos, enterprise applications, business management, ip faxing
    
Lane Telecommunications

Internet Security THREAT REPORT 2013

Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft, online threats, data security, business security, web attacks, network security, backup and recovery, anti spam, anti spyware, anti virus, email security, firewalls, hacker detection
    
Symantec

Scalability & Capacity Planning: Considerations when Investing in IT Infrastructure

Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston, dallas, interoperability, network architecture, network management, it spending, project management
    
NetShelter - CyrusOne

Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own, data management, business technology, data center
    
Schneider Electric

You're Virtually There: Remote Support Best Practices and Benefits

Published By: WebEx Communications     Published Date: Dec 14, 2007
As support centers have deployed this new generation of remote support solutions, they have developed a series of best practices for maximizing their benefits. Based on market research performed from 2004 to 2007, this white paper summarizes these best practices, illustrates the benefits, and suggests considerations for selecting the remote access solution that will be most effective for your support organization.
Tags : 
remote access, remote support, customer service, help desk, productivity, customer satisfaction, webex, best practices
    
WebEx Communications

The CIO's Guide to Wireless in the Enterprise

Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry

Future Proofing Your Mobile Computers

Published By: Intermec     Published Date: May 07, 2009
For companies that are evaluating mobile computers, several key considerations should drive the decision. Among these are whether the solution fits now, whether it will fit in the future and whether it will pay for itself in the short term.
Tags : 
terminal emulation, rfid, real time location systems, rtls, voice-over-ip, voip migration, mobile computers, proofing, mobile, touch screen, intermec, tco, business process automation, business process management, total cost of ownership, voice over ip, optoelectonics & displays
    
Intermec

Data Visualization: Charting the Best Course for Your Organization

Published By: SAS     Published Date: Mar 14, 2014
This report examines how data visualization can help organizations unleash the full value of information, and outlines key considerations to guide the solution evaluation process.
Tags : 
sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, visualization deployment, deployment, institute for analytics, business intelligence, productivity, data center
    
SAS

Data Visualization: 7 Considerations for Visualization Deployment

Published By: SAS     Published Date: Mar 14, 2014
Managing expectations before, during and after the adoption of visualization software is crucial. Users should know what the rollout process will look like and how it will take place, and have clear goals for using the tool. Make sure that the desired outcome isn’t just look-and-feel. Creating beautiful charts and graphs is not a substitute for practical business decisions.
Tags : 
sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, visualization deployment, deployment, institute for analytics, best practices, business intelligence, data center
    
SAS

Solutions for Encrypting Data on Tape: Considerations and Best Practices

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet

Long Term Data Retention: 5 Key Considerations

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This technology brief provides 5 topics to think about as you design your long-term data retention plans.
Tags : 
networking, storage, best practices, server virtualization, open source, data replication, business technology, virtualization, design and facilities, power and cooling
    
Quantum - Quinstreet

Reduce Costs and Run Your Microsoft Exchange Server on Amazon Web Services Cloud.

Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, knowledge management, enterprise applications, business technology
    
Amazon Web Services, Inc

Buying a phone solution – advice and considerations for UK businesses

Published By: RingCentral     Published Date: Dec 05, 2013
Businesses of all sizes have a fundamental reliance on their communications infrastructure. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution.
Tags : 
phone system, ringcentral, ring central, communications, business communications, wireless, business phones, wireless phones, mobile workers, ip telephony, small business networks, mobile computing, wireless communications
    
RingCentral

7 Considerations When Selecting a Data Center Provider in Chicago

Published By: QTS Data Centers     Published Date: Feb 17, 2017
This white paper provides an in-depth look at key considerations to keep in mind when selecting a data center provider in Chicago. From connectivity to compliance to customer service, these 7 key considerations offer a checklist for evaluating potential data center providers.
Tags : 
    
QTS Data Centers

5 Unexpected Considerations for IT Executives When Selecting a Cloud-Based ITSM Solution

Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
samanage, service desk, asset management, itsm, it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow, it help desk, cloud-based solutions, saas solutions, it service desk, asset management, it service portfolio, it service catalog, itil software
    
Samanage

Building a Business Case: How to Ready Your Organization for Skype for Business Enterprise Voice and

Published By: Polycom     Published Date: Jun 08, 2016
"Build your business case. There is a transformational shift around enterprise voice solutions as organizations move from the PBX to unified communications (UC) for their voice needs. In parallel, many organizations are moving their existing on-premises infrastructure into the cloud. This brief outlines the benefits and considerations such as: • Microsoft Office 365 and the cloud • Selecting phones for Skype for Business • Replacing the PBX and making the transition • And more Download this brief that helps you realize the benefits that UC and collaboration brings to the modern workplace."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity, business management, collaboration
    
Polycom

5 Key Considerations when Choosing Technology for Use with Office 365 Cloud Voice

Published By: Polycom     Published Date: Sep 09, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom

5 Key Considerations when Choosing Technology for Use with Office 365 Cloud Voice

Published By: Polycom     Published Date: Nov 29, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom

Buyer’s Guide to Data Onboarding

Published By: Signal     Published Date: Nov 09, 2016
Key Considerations for CRM and Digital Marketers
Tags : 
signal, marketing, crm, digital, digital marketers, data onboarding
    
Signal
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.