resources

Results 376 - 400 of 1795Sort Results By: Published Date | Title | Company Name

Cisco Intelligent WAN Design Guide Summary

Published By: Cisco     Published Date: Jun 10, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wifi, wireless, technology, network, 802.11, wan, design, network architecture, wide area networks, wireless application software, wireless service providers, wlan, cloud computing
    
Cisco

Cisco Intelligent WAN Design Guide Summary

Published By: Cisco     Published Date: Dec 04, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wan, applications, design guide, summary, technology, infrastructure, network architecture, network management, network performance, wide area networks
    
Cisco

Cisco Intelligent WAN Design Guide Summary

Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses

Published By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : 
cisco, spam, anti-virus, servers, firewall, security, anti spam, anti spyware, anti virus, email security, firewalls
    
Cisco

Cisco Virtualized Multi-Tenant Data Center, Version 2.2 Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco

Clearing the Path to PCI DSS Version 2.0 Compliance

Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management, business technology
    
NETIQ

Closing the Budget Loop: How to Drive Better Budget Management

Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Budgeting is one of the main aspects within your control to influence profits and avoid maverick spend. Budgeting and planning help your organization invests resources to best benefit, based on cautious consideration rather than the urgency to make a short-term decision. Budgets are essential to sustain your company’s economic growth and implementing best practices will guarantee a bright future to your company.
Tags : 
    
Determine (Selectica)

Closing the world language education gap

Published By: Rosetta Stone     Published Date: Nov 02, 2017
Time and resource allocation for language programs has been shrinking while the need for multilingualism only grows. It is critical that our students remain competitive on the global playing field. As the benefits of a multilingual society become clearer, parents insist that language learning is important for their children’s future success. However, our current education system still lacks the resources to provide all children the opportunity to develop the skills that will prepare them to succeed in an interconnected world. Global competence and language skills are no longer just nice to have—they are essential.
Tags : 
    
Rosetta Stone

Cloud Application Architecture Guide

Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft

Cloud Computing: A Silver Bullet for Finance?

Published By: Workday     Published Date: Feb 27, 2018
The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimisation of IT resources, plus enhanced visibility and access to information—have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Although a steady migration to the cloud is happening in many areas of the enterprise, finance professionals still have questions regarding the security, performance, privacy, risks and the actual cost and value of cloud computing. Download this whitepaper today and discover the benefits of moving finance operations to the cloud, and how it can drive sustainable ROI.
Tags : 
cloud, computing, workday, migration, enterprise, security, privacy
    
Workday

Cloud Deployed ERP: The Right Model for Job Shops and Manufacturers

Published By: Epicor     Published Date: Oct 06, 2016
In the face of growing competition and a challenging business climate, many job shops and manufacturers are looking for ways to reduce costs, streamline operations, and improve the bottom line. Implementing enterprise resource planning (ERP) software is a proven solution for running a business efficiently and effectively. Yet, a large percentage of job shops and manufacturers have held back from implementing an ERP system due to high initial costs, long implementation times, and competing demands for time and resources. Download this white paper to learn more!
Tags : 
    
Epicor

Cloud e-Book - Cloud Your Way

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
The way that people and companies leverage IT is in the process of a revolutionary change. To maintain a competitive edge in the face of an unrelenting pace of innovation, opportunity creation and environmental turmoil, organizations must exploit the provisioning of IT resources to facilitate new ways of doing business. And whether you’re talking about the increase in mobile technologies, the Internet of Things or some other transformative technology, cloud is at the forefront and the heart of this change
Tags : 
    
Group M_IBM Q418

Cloud Governance: Private to Hybrid Clouds with Consistency and Portability

Published By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government, infrastructure
    
Red Hat Government

Cloud HR: the future belongs to the bold

Published By: KPMG     Published Date: Mar 28, 2017
Over 40% of organizations plan to replace existing HR systems with Cloud. But Cloud HR’s game-changing capabilities also demand bold workforce transformation strategies integrating people, processes and technology. Read more.
Tags : 
kpmg, cloud, cloud strategy, human resources, technology
    
KPMG

Cloud Management: Why Adoption is Growing

Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA

Cloud Security Testing

Published By: NetSpi     Published Date: Sep 20, 2019
The cloud has become a valued part of modern infrastructure and there are now more resources than ever to help organizations secure their cloud environments. Even with all of the available tools and resources, there are still a million ways to configure services incorrectly. Public and non-public breaches seem to happen weekly and the maturity of the information security program doesn’t seem to influence the likelihood of the breach. One easy mistake in a cloud environment can be disastrous and it’s reasonable to be concerned when a new breach report hits the news. Just like anything in security, there are no magic bullets, but to help address these concerns, NetSPI recommends some general guidelines to help get ahead of the cloud security curve. These are general best practices that could be applied to any portion of your IT environment, but it’s good to keep these in mind while working with the cloud.
Tags : 
    
NetSpi

Cloud-Based Contact Center Software - NJ 2-1-1 Success Story

Published By: Five9     Published Date: Apr 29, 2013
NJ 2-1-1 is a free phone number and online database that connects New Jersey residents quickly and effectively to community resources and emergency information. It is part of a growing national model that provides 190 million Americans in all 50 states.
Tags : 
five9, cloud, cloud computing, cloud-based contact center, contact center software, hurricane sandy, networking, knowledge management, business technology, data center
    
Five9

Cloud-Based Video Conferencing: A Flexible Approach to Face-to-Face Communication

Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
    
Blue Jeans Network

CLP Resources Reduces Phone Expenses While Delivering Functionality

Published By: Vocalocity     Published Date: Apr 18, 2007
CLP Resources needed a modern, but affordable and easy-to-manage phone system with the professional features used in a busy office. VocalocityPBX was the solution. Download this case study to learn more.
Tags : 
pbx, phone, phone system, voip, voice over ip, telecom, telecommunications, telephone, voice, vocalocity, networking, internetworking hardware, ip telephony, network management
    
Vocalocity

Clutch Group: XtremIO All-Flash Array redefines paradigms in the legal services marketplace

Published By: EMC Corporation     Published Date: Feb 13, 2015
Clutch Group provides litigation, compliance, and legal services to major Fortune 500 companies in sectors with large legal exposure (Finance, Life Sciences, Natural Resources, etc.). By using purpose-built technology solutions to extract deep insights from large data volumes, the company transformed its business approach of helping client firms make better legal decisions.
Tags : 
all-flash-array, purpose-built technology, large data volumes, business approach, legal decisions, data management
    
EMC Corporation

Cognitive Unified Endpoint Management with IBM MaaS360

Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM

Collaborative Efforts: Survey Reveals Clear Business Acceleration Using On-Demand Collaboration Tech

Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx

Collaborative Partnerships for Nationwide Rollouts & Global Technology Deployments

Published By: ConcertTech     Published Date: Jun 26, 2009
Technology rollouts on a nationwide and global scale require technicians to perform onsite work. Though you may have hired a Technology Rollout Company to manage and deploy these technicians, they ultimately serve as direct representatives of your company.
Tags : 
concert tech, nationwide rollouts, rollout, internal resources, multiple sites, onsite, partnership, collaboration, collaborative, communication, content delivery, project management, service management
    
ConcertTech

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.