pto

Results 201 - 225 of 436Sort Results By: Published Date | Title | Company Name

Ready Your Enterprise for the Next Generation of Client Computing

Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange

Solving Small Business Digital Challenges

Published By: Dell & Microsoft     Published Date: Mar 13, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : 
dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet, windows, business technology
    
Dell & Microsoft

Identität als Umsatzgenerator: Erste Schritte beim kundenzentrierten Identitätsmanagement

Published By: ForgeRock     Published Date: Mar 10, 2015
Die Identität ist eine zentrale Anforderung für digitales Wachstum. Unternehmen und Organisationen können ohne eine skalier- und wiederholbare Identitätsstrategie nicht richtig von Technologien wie Mobilzugriff, Cloud und Internet of Things (IoT, Internet der Dinge) profitieren. Ohne derartige Strategien haben sie keine Möglichkeit, ihre Kunden zu identifizieren und auf relevante Art und Weise mit ihnen zu interagieren — unabhängig davon, ob diese Interaktion über Laptop, Mobiltelefon, Tablet, ein vernetztes Automobil, ein in die Kleidung integriertes vernetztes medizinisches Gerät für die Nutzung zu Hause oder eine andere, bislang noch unbekannte Innovation erfolgt. Dieser Leitfaden soll Ihnen helfen, die Grundlagen der kundenzentrierten Identität zu verstehen und zu erkennen, wie diese Ihnen bei der Interaktion mit Ihren Kunden behilflich sein kann.
Tags : 
    
ForgeRock

Better Technology Drives More Engaged Learning

Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Getting students engaged in the classroom is always challenging. Keeping them engaged is often the more difficult battle! Windows 10 Pro paired with innovative Lenovo tablet, laptop, and desktop computers provides the perfect user experience-driven solution?—?where technology is never a constraint to innovation or engagement. Download this eBook and learn more.
Tags : 
    
Lenovo and Intel®

Is it Now Time for Transfer Agency to Recognize the 'Disruptor'

Published By: Oracle     Published Date: Feb 21, 2018
We have been awash in the Financial Services over the past several years of hearing of the next big technology that will change the face of the industry, and Transfer Agency has been no different. In the year 2017 it is the turn of Distributed Consensus Ledger Technology (also known as ‘Blockchain’) to set pulses racing and generate many reams of papers from various parties. Whatever happened to Big Data from 2016? Download this article to learn more!
Tags : 
    
Oracle

Breach Response Best Practices

Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock

5 Important Buying Criteria to Enable a totally Mobile Workforce

Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

7 Issues to Watch When Updating Your Employee Handbook 2019

Published By: XpertHR     Published Date: Nov 13, 2018
As 2018 comes to a close, it is critical to ensure that your organization—and more specifically, your employee handbook—is compliant with the latest legal developments on the federal, state and local levels. Whether it’s a new state law or an amendment to an existing local law, as an employer, you must determine whether a new or amended law affects your handbook and workplace policies and what revisions are necessary. For example, does a new statewide lactation accommodation law prompt the addition of a new policy to the employee handbook? Here are some of the top issues you should be aware of for 2019 when updating your handbook: 1. Equal Employment Opportunity (EEO) 2. Leaves of Absence and Time Off 3. Equal Pay and Wage Discrimination And more… {Get the guide}
Tags : 
handbooks, employee handbooks, compliance, policies, work rules, 2019 trends, eeo, leave management, paid sick, reasonable accommodations, equal pay, wage discrimination, time-off, pto, e-cigarettes, safe driving laws, workplace violence
    
XpertHR

An IT Manager's Guide: Cryptojacking, The Threat To Business and How to Protect The Network

Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.

7 Gründe für die Wahl von Anaplan (und nicht Excel)

Published By: Anaplan     Published Date: Sep 07, 2018
Viele Menschen arbeiten gern mit Spreadsheets, beispielsweise zur Verwaltung ihrer persönlichen Finanzen. Aber in einem professionellen Umfeld, in dem mehrere Personen Zugriff auf Daten benötigen, um die zu aktualisieren und zu ändern, gelangen Spreadsheets schnell an ihre Grenzen. Trotz aller Unzulänglichkeiten und Probleme werden Spreadsheets jedoch nach wie vor für die Planung und Analyse in Unternehmen eingesetzt. Das mag daran liegen, dass ihre massive Verbreitung auf Desktops und Laptops den Eindruck vermittelt, es würde sich um eine kostengünstige Option handeln. Wenn Sie Ihre Daten besser im Griff haben möchten und die Planung und Analyse nicht mehr mit Spreadsheets durchführen möchten, ist Anaplan die richtige Alternative: Die Plattform bietet ihnen nämlich nicht nur die intuitive Bedienung und Nutzerfreundlichkeit von Spreadsheets, sondern auch die Sicherheit und Skalierbarkeit einer Enterprise-Lösung
Tags : 
    
Anaplan

Digital Mortgages - 8 Trends You Can't Afford to Ignore

Published By: Ephesoft     Published Date: May 31, 2018
With the digitization of modern life, consumers have come to expect the same kind of real-time response and control from mortgage companies as they have experienced in other aspects of their lives. As a result of pervasive services like two-day or even same-day delivery from Amazon Prime, TV On Demand and made-to-order Nikes, consumers expect underwriters to process loans and communicate with them in a similarly personalized, real-time way. In response, traditional mortgage originators are transitioning legacy processes to compete with the game-changing speed of born digital disruptors like Rocket Mortgage and Better.com. This infographic outlines the eight technology trends that are top-of-mind for leading lenders.
Tags : 
    
Ephesoft

Blockchain & Manufacturing

Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software

Blockchain y fabricación

Published By: TIBCO Software     Published Date: Sep 16, 2019
Por años, los fabricantes han estado tratando de optimizar sus procesos y cadenas de suministro asociadas creando mercados, intercambios estandarizados, y sistemas monolíticos. En muchos casos, estas soluciones no logran su objetivo, lo que da origen a procesos fragmentados y frágiles, y en los que compartir datos es complicado. Blockchain, la tecnología que está detrás de Bitcoin y otras criptomonedas, puede resolver estos problemas. Compartir información mediante una red distribuida confiable con una lógica de negocio integrada ofrece muchos beneficios al sector manufacturero, especialmente cuando se combina con las comunidades de IoT y de IA. Vea este webinar titulado Blockchain y Manufactura: Una Manera Inteligente de Elevar la Eficiencia en las Cadenas de Suministro de Semiconductores y Electrónica, conducido por Nelson Petracek, director de Tecnología de TIBCO Software. Entre los temas que se abordan se incluye: • Blockchains empresariales • Casos de uso en el sector manufactur
Tags : 
    
TIBCO Software

Creating a Public Safety Ecosystem

Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.

Data: the New Disruptor

Published By: Hitachi Vantara     Published Date: Jan 11, 2019
Making sense of your data is one of the greatest challenges facing business today. Imagine a world where innovation and time-to-value are accelerated by AI and automation. Hitachi Vantara works at every point along the data value chain from analytics and insight, through intelligent governance to efficient, agile storage. Download this e-book to find out how to turn the business-enabling capital of the digital era into sustainable value.
Tags : 
    
Hitachi Vantara

Software in Silicon: What It Does and Why

Published By: Oracle     Published Date: Oct 20, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle

The Fully Encrypted Data Center

Published By: Oracle     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle

Secure Enterprise SD-WAN (ESP)

Published By: Zscaler     Published Date: Jun 20, 2019
El concepto de backhauling hacia un centro de datos parece interesante cuando aplicaciones como usuarios residen dentro. Pero con colaboradores en sus diferentes oficinas y aplicaciones que migran hacia el cloud, redirigir el tráfico sobre una red en estrella ofrece una mala experiencia usuario, además de ser caro y de introducir mas riesgos. La red SD-WAN representa una solución a este reto, porque permite poner en marcha conexiones locales a Internet. Y Zscaler se encargar de securizarlas. Descubren como con este libro blanco.
Tags : 
    
Zscaler

Big Security for Big Data

Published By: HP - Enterprise     Published Date: Feb 06, 2013
We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data.
Tags : 
big security, big data, secure data, business technology
    
HP - Enterprise

BYOD Is Here To Stay

Published By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
Do you work smarter on your own tablet, smartphone or laptop? Go for it, says corporate IT. Read this white paper to learn how BYOD is an emerging trend in business policy. In a recent survey 44% of firms have embraced BYOD. Will you do the same?
Tags : 
byod, bring your own device, simplicity, tablet, smartphone, laptop, byod party, lifesize, knowledge management, enterprise applications, business technology
    
LifeSize, a division of Logitech

Citrix Xenclient Local Virtual Desktop Technology For Laptops

Published By: Intel Corp.     Published Date: Jul 09, 2012
Use local virtual desktops to secure and control information no matter where-or whether-users connect to the network.
Tags : 
intel, virtual desktop, citrix xenclient, business technology
    
Intel Corp.

Top 10 Considerations for Deploying Lync on Smartphones and Tablets

Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur für die Unternehmenstelefonie, sondern schafft auch ein völlig neues Benutzererlebnis, fördert den Austausch und stärkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschöpfen zu können, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops übertreffen wird, benötigen Unternehmen sichere und zuverlässige Wireless-Infrastrukturen. Mit nur geringem Aufwand können Sie die Qualität und die Zuverlässigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps für Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgeräten in Ihrem Netzwerk profitieren können…
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks

The Art of Integration

Published By: Adobe     Published Date: Mar 03, 2017
It’s amazing how online and offline data remains disconnected. Sculptor and conservationist, Jason deCaires Taylor knows the benefits of connecting two different worlds. In our guide, The Art of Integration, you’ll see what marketers can learn from the symbiotic relationship of Taylor’s sculptures on the floor of Molinere Bay. Read the guide to learn how to piece together all your insights and interactions into a whole view of your customers, so you can create seamless experiences with them.
Tags : 
integrated marketing, online and offline integration, adobe integration guide, seamless experience, data integration
    
Adobe

The Art Of Integration

Published By: Adobe     Published Date: Jun 22, 2017
It’s amazing how online and offline data remains disconnected. Sculptor and conservationist, Jason deCaires Taylor knows the benefits of connecting two different worlds. In our guide, The Art of Integration, you’ll see what marketers can learn from the symbiotic relationship of Taylor’s sculptures on the floor of Molinere Bay. Read the guide to learn how to piece together all your insights and interactions into a whole view of your customers, so you can create seamless experiences with them.
Tags : 
customer experience, connectivity, integration, customer insight, customer interactions, marketing relationships
    
Adobe

Top Ten Reasons to Move to Office 365 and the Cloud

Published By: Cloudroute     Published Date: Jun 01, 2016
Office 365 is the #1 Business productivity solution and the leading collaboration tool in the world. Yes, you are familiar with Word, Excel, PowerPoint and the rest of the Office Suite, but Office 365 is much more. Office 365 includes OneDrive for Business that offer 50GB per user for email and 1 TB for file storage. Combining OneDrive and SharePoint allows for real-time collaboration for employees in any location using any of the Office applications. Collaboration is further expanded as a tool to improve productivity and communications with Skype for Business. Skype for Business supports VoIP and Wi-Fi calls over a laptop, PC, Tablet or smartphone. It also provides conference calling to engage your employees, partners and, most importantly, customers.
Tags : 
    
Cloudroute
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.