idera

Results 501 - 525 of 802Sort Results By: Published Date | Title | Company Name

The Top 4 Midmarket Challenges

Published By: Avaya     Published Date: Jan 23, 2015
This paper takes a look at some of the top challenges the midmarket is facing as well as considerations to keep in mind when choosing a UC&C option. After a rough few years, the midmarket is no longer putting off investing in technology. According to KPMG, 60 percent of midmarket companies plan to increase capital spending, with the highest priority being information technology.
Tags : 
challenges of midmarket, midmarket companies, midmarket trends, network performance, mobile computing, mobile data systems, mobile workers, application integration
    
Avaya

Six Steps to SSL Certificate Management

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
Entrust Datacard

Blueprints for Big Data Success

Published By: Pentaho     Published Date: Jan 16, 2015
If you’re considering a big data project, this whitepaper provides an overview of current common use cases for big data, from entry-level to more complex. You’ll get an in-depth look at some of the most common, including data warehouse optimization, streamlined data refinery, monetizing your data, and getting a 360 degree view of your customer. For each, you’ll discover why companies are investing in them, what the projects look like, and key project considerations, including tools and platforms.
Tags : 
big data, nosql, hadoop, data integration, data delivery, data management, data center
    
Pentaho

Risk or Reward? Collaboration and Social Media In the Pharmaceutical Industry

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements, it management, enterprise applications
    
Actiance, Inc.

Social Media Risks and Benefits for the Pharmaceutical Industry

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.

Management Cloud; IT’s Key to the New Front Office

Published By: CA Technologies     Published Date: Jan 14, 2015
In the past, Enterprise IT managed the back of?ce…the data center…the systems that kept the business running. Today, there is a mandate for IT to adopt a new role—one that speaks a common language with the business. This new IT mans the storefront, interacts directly with customers and thinks beyond uptime metrics to give equal consideration to cost, spend, quality and consumption.
Tags : 
enterprise it, metrics, cost, quality and consumption, front office, it management, enterprise applications
    
CA Technologies

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches

Published By: Cisco     Published Date: Jan 05, 2015
The data center is central to IT strategy and houses the computational power, storage resources, and applications necessary to support an enterprise business. A flexible data center infrastructure than can support and quickly deploy new applications can result in significant competitive advantage, but designing such a data center requires solid initial planning and thoughtful consideration of port density, access-layer uplink bandwidth, true server capacity, oversubscription, mobility, and other details.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco

Video Conferencing Made Simple

Published By: Polycom     Published Date: Dec 18, 2014
In the next few years we shall see explosive growth in the use of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. The technology has developed considerably from early adopters to its current form of mass market roll-out. It’s anticipated that nearly half of information workers will have some type of personal video solution in 2016, up from just 15% today. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses will be looking to providers of telephony, business applications and network infrastructure services to include this capability as part of their offering. This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom

Six Considerations for Nurturing High Performance Teams

Published By: Polycom     Published Date: Dec 18, 2014
Some people believe high performance teams come together and innovate due to luck—the right people happen to be together in a room at the right time. By reviewing moments in history that resulted in some of our biggest innovations— from the light bulb to the airplane—you will see that luck has very little to do with it. Working to create an innovative environment with high performers is possible in any environment if the proper measures are taken to make it work.
Tags : 
polycom, risk mitigation, critical thinking, innovation, nurturing, it management, knowledge management, enterprise applications
    
Polycom

Five Things You Need to Know About Migrating From Windows Server 2003

Published By: HP     Published Date: Dec 05, 2014
Do you have your arms around your Windows Server 2003 migration? Sure, your team has probably headed up countless maintenance initiatives in the past - upgrades, refreshes, migrations. But if you make the mistake of thinking your Windows Server 2003 migration is more of the same, you will lose on two fronts. First, you will underestimate the complexity of the effort, thus increasing the chance of failure by overrunning timeline and budget. More importantly, you will miss the opportunity to bring value to your business. This paper introduces five considerations that will change your perspective on the Windows Server migration initiative - and spur technical, finance and line of business employees to jump on board.
Tags : 
server, performance, efficiency, application, infrastructure, information technology, mobility, cloud
    
HP

Solving the Information Security Crisis in Higher Education

Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee

Key Considerations When Evaluating Cloud-integrated Storage

Published By: Nasuni     Published Date: Nov 19, 2014
The increasing user-friendliness of cloud computing is making it more accessible to users as they better understand its capabilities and realize how easy and affordable it can be. As cloud infrastructure has started offering a wider range of storage functionality, IT professionals are finding that they can make use of the benefits it provides both operationally and financially. But achieving this optimum result is neither easy nor prevalent; awareness of the upside can sometimes blind prospective users to the potholes and blind curves on the road to cloud storage bliss. This paper assumes at least a general awareness of the methods and advantages of cloud storage, and perhaps even an acknowledgement that it is a natural infrastructure development, and is therefore designed to provide pragmatic advice to help with specific deployment choices.
Tags : 
cloud storage, cloud computing, cloud infrastructure, it infrastructure, it management, knowledge management, enterprise applications, data management
    
Nasuni

Sales Trend Report

Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box

6 Important Considerations When Looking For Business Phone Services

Published By: Cox Communications     Published Date: Nov 10, 2014
Business phone systems may not attract the same attention or achieve the same acclaim that computers, smart phones and tablets regularly receive. You won’t hear of too many publicized conferences or Twitter trends but that does not negate their importance.
Tags : 
twitter, evolving features, business phone service, cox, functionality
    
Cox Communications

An Introduction to the Basics of Video Conferencing

Published By: Polycom     Published Date: Nov 06, 2014
This report examines the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom RealPresence Platform to readers.
Tags : 
video conferencing, basics of video conferencing, deploying video conferencing, polycom, the benefits of video conferencing, smart phones, business technology
    
Polycom

Five Things You Need to Know About Migrating From Windows Server 2003

Published By: HPE     Published Date: Nov 05, 2014
Learn about the 5 considerations that will change your perspective on the Windows Server 2003 migration initiative. Download this whitepaper now.
Tags : 
migrating, windows server, microsoft, cloud computing, computing services, it management, change management, migration strategy
    
HPE

Architecting Private and Hybrid Cloud Solutions: Best Practices Revealed

Published By: IBM     Published Date: Nov 03, 2014
Successful cloud implementations not only require the best solutions, they also necessitate proper execution to realize your business objectives and yield the greatest results. Join this session to hear IBM Distinguished Engineers describe the key considerations and guidelines for architecting private and hybrid clouds.
Tags : 
ibm, cloud, private cloud, hybrid cloud, cloud solutions, best practices cloud solutions, architecting cloud solutions, cloud deployment
    
IBM

Take Meeting Collaboration to the Next Level with Microsoft Lync Room System

Published By: Polycom     Published Date: Oct 31, 2014
Description: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging. Topics covered were: How to tell if your company is ready for a Microsoft Lync Room System, what Polycom’s new Microsoft Lync Room System solution adds to a Lync deployment and how Polycom’s CX8000 and CX5100 are different than other Microsoft Lync Room Systems.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment
    
Polycom

How to Ensure a Successful Deployment of Microsoft Lync Video

Published By: Polycom     Published Date: Oct 31, 2014
Description: Lync expert and blogger Jeff Schertz presented about deploying video for Microsoft Lync and preparing for a Lync Room System. You have questions and Jeff Schertz has the answers when it comes to anything Lync, including video implementation. Jeff led a technical discussion on how to deploy video for Lync and what you need for the Microsoft Lync Room System.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment
    
Polycom

Best Practices for Video-Enabling Your Lync Environment

Published By: Polycom     Published Date: Oct 31, 2014
Description: Microsoft Solution Architects discuss the top considerations when adding Microsoft Lync video to your network. You have Microsoft Lync for IM and Presence. Maybe you also use Lync for Enterprise Voice. Video is a logical next step. This webinar will cover how to prepare your network and your organization for Lync video. Topics covered were: What to consider when deploying video, learn about real customer successes and missteps with Lync video deployment and services available to assist with the readiness of your network.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment
    
Polycom

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks

Migrating to an Enterprise-Class Hybrid Cloud for Government: Top 5 Considerations

Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta for public cloud infrastructure that is radically dierent from what is in place today. Instead of operating a combination of onsite and osite IT environments and struggling to maintain both new and legacy applications and infrastructure, vCloud Government Service provides the right mix of internal controls with the ability to securely scale to meet demand for IT resources. As you contemplate migrating basic workloads and/or mission-critical and sensitive data to the cloud, be sure to address these top 5 considerations.
Tags : 
hybrid cloud solution, enterprise-class hybrid, applications and infrastructure, it environments, sensitive data, it management, enterprise applications, data center
    
VMware, Inc

Catch the Forrester Wave™ for Crystal Clear Mobility Management Insight

Published By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : 
maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management
    
IBM MaaS360

Windows Server 2012 Are You Ready?

Published By: Dell     Published Date: Oct 24, 2014
Microsoft is discontinuing support for Windows Server 2003 in July 2015, so now is the time to start planning your move and avoid possible server management, performance, security and compliance issues. This paper explores the new features and benefits of Windows Server 2012 R2, as well as key considerations for moving from legacy platforms. You'll also learn how Dell Software can help you prepare for the move.
Tags : 
server support, server management, it security, legacy platforms
    
Dell

Aerohive Controller-less Wireless Architecture

Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity, 802.11, mobile computing, mobile data systems, mobile workers
    
Aerohive
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.