idera

Results 576 - 600 of 794Sort Results By: Published Date | Title | Company Name

5 Key Considerations when Choosing Technology for Use with Office 365 Cloud Voice

Published By: Polycom     Published Date: Sep 09, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom

5 Key Considerations when Choosing Technology for Use with Office 365 Cloud Voice

Published By: Polycom     Published Date: Nov 29, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom

Buyer’s Guide to Data Onboarding

Published By: Signal     Published Date: Nov 09, 2016
Key Considerations for CRM and Digital Marketers
Tags : 
signal, marketing, crm, digital, digital marketers, data onboarding
    
Signal

Internet of Things Security Considerations in a Multicloud Environment

Published By: ForeScout     Published Date: Aug 15, 2017
In this IDC Perspective report, research director Abhi Dugar looks at IoT security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments.
Tags : 
    
ForeScout

Do You Deserve to be Trusted? Key considerations for building & maintaining a trusted online brand

Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe

SCALABILITY & CAPACITY PLANNING: BUILD VS. BUY Considerations when Investing in IT Infrastructure

Published By: CyrusOne     Published Date: Jan 19, 2012
This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston
    
CyrusOne

Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

Published By: IBM     Published Date: Oct 10, 2013
First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments. Read this white paper, “Security intelligence can deliver value beyond expectations and needs to be prioritized” for an overview of market adoption of security-as-a-service.
Tags : 
security, security intelligence, security incident, event management, security-as-a-service, information security, risk, risk management, it management, data management, business technology
    
IBM

vCPU Sizing Considerations

Published By: Dell     Published Date: Aug 16, 2013
"The number of vCPUs should be one of your most important considerations when sizing virtual machines. But getting the right balance — neither over-allocating nor under-allocating — is a challenge. You’ll need to select the number of vCPUs, the size of the virtual disk, the number of vNICs and the amount of memory. With all those variables, a little guidance is in order. Read the White Paper "
Tags : 
vcpu, sizing, vnics, virtual disk, memory, storage virtualization, application integration, windows, windows server, data warehousing, business technology, virtualization
    
Dell

Location, Reliability and Service: Choosing the Right Colocation Provider

Published By: Cobalt Networks     Published Date: Jun 25, 2014
Not all colocation providers offer the same value and functionality, and many come with inherent risks. When choosing a colocation provider, careful consideration is essential. This white paper discusses: Rregional considerations in selecting a colocation provider, Las Vegas as an alternative to California markets and Phoenix for serving West Coast end users, Power, civic infrastructure, and weather as advantages to colocating in Las Vegas
Tags : 
cobalt networks, colocation, providers, regional considerations, civic infrastructure, las vegas, weather advantages, knowledge management, enterprise applications
    
Cobalt Networks

Six Key Security Considerations for Responsible Cloud Migration

Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec

Safe Adoption of Cloud Applications: Solution Guide

Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec

Big Data Integration and Governance Considerations for Healthcare

Published By: IBM     Published Date: Aug 05, 2014
There is a lot of discussion in the press about Big Data. Big Data is traditionally defined in terms of the three V’s of Volume, Velocity, and Variety. In other words, Big Data is often characterized as high-volume, streaming, and including semi-structured and unstructured formats. Healthcare organizations have produced enormous volumes of unstructured data, such as the notes by physicians and nurses in electronic medical records (EMRs). In addition, healthcare organizations produce streaming data, such as from patient monitoring devices. Now, thanks to emerging technologies such as Hadoop and streams, healthcare organizations are in a position to harness this Big Data to reduce costs and improve patient outcomes. However, this Big Data has profound implications from an Information Governance perspective. In this white paper, we discuss Big Data Governance from the standpoint of three case studies.
Tags : 
ibm, data, big data, information, healthcare, governance, technology, it management, data management
    
IBM

Big Data Integration and Governance Considerations for Healthcare

Published By: IBM     Published Date: Oct 01, 2014
This white paper discusses how IBM InfoSphere can support the integration and governance of Big Data in healthcare. The white paper reviews three case studies including predictive analytics with Electronic Medical Records, time series data in a neonatal intensive care unit and predictive pathways for disease.
Tags : 
big data, data integration, healthcare, data management, business activity monitoring, business analytics
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, data protection, database security, business technology
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management, knowledge management, data management
    
IBM

Key technical support considerations for smart IT infrastructures

Published By: IBM     Published Date: Feb 29, 2016
This is the Key technical support considerations for smart IT infrastructures White Paper
Tags : 
ibm, it infrastructure, tech support, support, networking, storage, business technology
    
IBM

The only constant is change: Considerations for implementing IBM Connections in your organization

Published By: IBM     Published Date: Mar 28, 2016
This white paper is one of two white papers on the topic of organizing and executing a successful implementation of the IBM Connections collaboration platform in your enterprise.
Tags : 
ibm, ibm connections, motivate employees, motivate management, business management, collaboration, business technology
    
IBM

CISOs Guide to Enabling a Cloud Security Strategy: Focus on SaaS

Published By: IBM     Published Date: Apr 04, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, ciso, cloud, cloud security, saas, security, cloud computing
    
IBM

IDC white paper: CISOs' Guide to Enabling a Cloud Security Strategy: Focus on SaaS

Published By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, idc, ciso, cloud security, saas, networking, enterprise applications, data management, business technology
    
IBM

Faster results and less investment with data-centric HPC

Published By: IBM     Published Date: Jul 19, 2016
Data movement and management is a major pain point for organizations operating HPC environments. Whether you are deploying a single cluster, or managing a diverse research facility, you should be taking a data centric approach. As data volumes grow and the cost of compute drops, managing data consumes more of the HPC budget and computational time. The need for Data Centric HPC architectures grows dramatically as research teams pool their resources to purchase more resources and improve overall utilization. Learn more in this white paper about the key considerations when expanding from traditional compute-centric to data-centric HPC.
Tags : 
ibm, analytics, hpc, big data, software development, enterprise applications, data management, business technology
    
IBM

Mobile Security from Platform to Device: What You Need to Know Now

Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device, networking, enterprise applications, mobile computing, mobile data systems, wireless application software
    
IBM

Mobility, Cloud, and the Enterprise:  Mobile Application Strategies for Today

Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, cloud, mobility, enterprise, mobile applications, mobile application strategy, networking, enterprise applications, mobile data systems, wireless application software
    
IBM

Ovum: Differentiate Your Business with a Cloud Contact Center

Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco

Top-10 Reasons to Move to Microsoft Windows Server 2012 R2 and Cisco UCS from Microsoft Windows Serv

Published By: Cisco     Published Date: Jul 11, 2016
As Microsoft Windows Server 2003 nears its end-of-support date in July 2015, businesses still running the aging OS are facing a number of vital considerations. The computing landscape has changed drastically since the release of Windows Server 2003 more than a decade ago. Although the Windows Server 2003 platform worked well in its time, after Microsoft support expires, it will become both a liability and a limitation for organizations still running it. In this document, you’ll learn some of the important reasons why your company needs to migrate important workloads and services away from Windows Server 2003. You’ll learn about some of the biggest concerns about Windows Server 2003’s end of life, as well as some essential considerations to keep in mind while planning your migration.
Tags : 
    
Cisco

Employment Screening Best Practices

Published By: Background Direct     Published Date: Oct 01, 2014
Suggested preparation, implementation and legal considerations from Background Direct™ to fortify your background check and drug test programs.
Tags : 
employment screening, background check, drug tests, background screening, aberdeen group1, background direct
    
Background Direct
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.