task

Results 126 - 150 of 726Sort Results By: Published Date | Title | Company Name

Learn What Every Business Must Know About Tangible Property Regulations and How to Ensure Compliance

Published By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115
    
CBIZ

6 Tasks You Can't Do With Traditional IT Operations Tools

Published By: CDW     Published Date: Aug 07, 2015
Take control of your virtual environment with VMware vCenter™ Operations Management™
Tags : 
converge, infrastructure, servers, networking, virtualization, data warehousing, cloud computing
    
CDW

Securing Endpoints Against The Next Generation of Attacks

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro

Rush University Medical Center Creates Safer Environment

Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro

Energy Resilience: Building The Business Case

Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape has become increasingly complex. Globally, we’re relying less on centralized, steady power sources – such as gas-fired and coal-fired power stations – and more on mixed, locally-distributed renewable energy supplies including solar, wind, tidal and battery. While this is positive for the environment and carbon emissions, it makes balancing power grids a much more complex task. Power quality and reliability becomes more variable in output, while demand for power continues to increase steadily. But when it comes to energy resilience, many organizations simply don’t know where to start. What solutions are available? Which are the best ones for their specific situation and physical premises? What will be their return on investment? Is it simply the cost of doing business, or is there actually a business case? The guide will give you the tools and data to build your understanding and quantify the benefit for your organization.
Tags : 
energy, resilience, building, business, energy
    
Centrica Business Solutions

Cherwell Positioned as the Lone Challenger to ITSSM Vendors

Published By: Cherwell Software     Published Date: Apr 07, 2016
ITSM tools automate the tasks and workflows associated with the management and delivery of quality IT services to the business. In its 2015 Magic Quadrant for IT Service Support Management Tools, Gartner compares 10 vendors on the vision and execution.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software

Ten Tips for Increasing Operational Efficiency

Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention
    
Cisco

Cisco APIC Enterprise Module Simplifies Network Operations

Published By: Cisco     Published Date: Apr 11, 2016
The role of the CIO has changed more in the past five years than any other position in the corporate world. IT leaders are now partners with business leaders, and they are tasked with helping companies respond to competitive pressures as quickly as possible. In an effort to improve overall IT agility, compute and application technology has evolved significantly through the use of mobility, virtualization and cloud computing. However, the network itself has yet to evolve, limiting the overall agility of IT today. These technology shifts have transformed almost every part of the enterprise. However, to maximize the potential of these investments, the network must also transform. Read more to learn how.
Tags : 
cisco apic, network operations, it agility, cloud computing, virtualization, networking, it management, application integration
    
Cisco

Massachusetts Uses Cisco UCS case study

Published By: Cisco     Published Date: Jul 11, 2016
Massachusetts is well-known as the landing place of the Mayflower and home to the oldest institution of higher learning in the United States. But this is one state that hasn’t stood still in time. Today, Massachusetts has the challenging task of accommodating the needs of its various state agencies. In particular, those needs include IT support surrounding disaster recovery and data management.
Tags : 
    
Cisco

The Cisco Edge Analytics Fabric System

Published By: Cisco     Published Date: Dec 21, 2016
This white paper describes a software system that provides the framework for the Internet of Things (IoT). It dramatically simplifies the task of creating sophisticated IoT systems.
Tags : 
    
Cisco

Cisco Services for Application Centric Infrastructure and Cisco Services for Cisco Nexus 9000 Series

Published By: Cisco     Published Date: Jun 25, 2015
This paper shows how Cisco Application Centric Infrastructure (ACI) automates IT tasks and accelerates data center application deployments to dramatically reduce TCO.
Tags : 
cisco services, cisco, aci, application centric infrastructure, cisco, cisco nexus 900, network, data center
    
Cisco

ACI Video Episode 1: An Impossible Deadline

Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco

ACI Video Episode 3: Operation Clean Up

Published By: Cisco     Published Date: Jun 29, 2015
Ron’s team knows application de-commissioning should release compute, storage, network, and security resources but organizational and technical silos often complicate the task.
Tags : 
csico aci, sdn architecture, security, virtualizatiom, automate policy enforcement, automates clean up, automation, network architecture
    
Cisco

Digital Transformation: Enabling Marketing Strategy with Technology – Karen Walker, Cisco CMO

Published By: Cisco     Published Date: Apr 20, 2016
Note: Part two of Karen Walker’s blog series continues her insights about Digital Transformation and spotlights how Cisco’s Marketing and Communications team is using technology to transform their function. Excerpt: Today’s marketers are delivering more and more content digitally, but to be effective that digital content can’t just be generic reference material. Rather, effective content must be relevant, timely, and personalized. And its goal should be to create a dialogue with the customer. This is no easy task. It requires investing in marketing technologies that help deliver personalized content with speed and agility. For modern marketers, technology opens the door to new revenue pipelines. Digital platforms and applications combined with data and analytics augment our go-to-market model.
Tags : 
cisco, digital, marketing, technology, mobile, marketing strategy, business technology
    
Cisco

Bringing Effective Security Into Focus

Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco

SHRM Research: Flexible Work Arrangements

Published By: Cisco     Published Date: Dec 27, 2017
Flexible work arrangements (FWAs) can come in many forms, including telecommuting, compressed workweeks and flexible scheduling that allows employees to perform tasks outside of core business hours. Improvements in technology have made FWAs possible for a broader segment of the labor force, but some of these arrangements have yet to achieve widespread acceptance in many organizations’ workplace cultures. However, SHRM research shows that participation in some FWAs has risen in recent years, and these measures have yielded positive results for companies’ recruitment and retention efforts, as well as their employees’ development and productivity.
Tags : 
    
Cisco

Cisco Regional Digital Network Architecture: Introducing a New era in Networking

Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco® Digital Network Architecture (Cisco DNA™) is your team’s bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco

A Network that knows what you want and does it

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what you need and makes it happen. It’s the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco DNA is the open, software-driven platform that turns vision into reality. Virtualization, automation, analytics, and cloud, all in one architecture.
Tags : 
sd-access, segmentation, network fabric, wan, automation, cisco, analytics
    
Cisco EMEA

Online Team Collaboration: Reaching New Levels With an All-In-One Platform

Published By: Cisco Spark     Published Date: Feb 08, 2017
With today’s stratified business communications, small to midsize companies face challenges as they try to modernize their online collaboration workflows. They’re frequently stitching together discrete, ad hoc communications tools to perform a variety of team-based tasks, but the limitations of this approach quickly become apparent as projects grow more complex.
Tags : 
    
Cisco Spark

9 Ways to Show the Value of PR

Published By: Cision     Published Date: May 02, 2016
The complexity of public relations can make measurement a Herculean task. Brands have diverse needs and objectives, along with an array of communication channels to choose from, which means those searching for a one-size-fits-all blueprint for measurement will struggle to prove true ROI. A custom measurement strategy that goes beyond vanity metrics is the only way to accurately track your progress, prove the value of individual campaigns and show the impact of those campaigns across departments.
Tags : 
cision, public relations, roi, brand awareness, pr roi
    
Cision

9 Ways to Show the Value of PR

Published By: Cision     Published Date: Jul 08, 2016
The complexity of public relations can make measurement a Herculean task. Brands have diverse needs and objectives, along with an array of communication channels to choose from, which means those searching for a one-size-fits-all blueprint for measurement will struggle to prove true ROI. A custom measurement strategy that goes beyond vanity metrics is the only way to accurately track your progress, prove the value of individual campaigns and show the impact of those campaigns across departments.
Tags : 
cision, public relations, roi, brand awareness, pr roi
    
Cision

Freedom and Flexibility In A World Gone Mobile

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Your directors may not have approved it, your IT department may not be ready for it, but your employees are already using their smartphones and tablets for work tasks. Don’t fight the change, embrace it: a mobile workforce can pay huge dividends for productivity and employee satisfaction. Download this e-Book to learn: • How giving your employees the choice to work from home can save $11,000 per year • What tool you can give your employees to boost creative innovation by 250% • Why organizations embracing mobility claim 320 hours more work per employee
Tags : 
mobile business, business efficiency, customer service, business benefits, employee efficiency
    
Citrix ShareFile

Freedom and Flexibility in a World Gone Mobile

Published By: Citrix ShareFile     Published Date: Apr 12, 2017
Your directors may not have approved it, your IT department may not be ready for it, but your employees are already using their smartphones and tablets for work tasks. Don’t fight the change, embrace it: a mobile workforce can pay huge dividends for productivity and employee satisfaction. Download this e-Book to learn: • How giving your employees the choice to work from home can save $11,000 per year • What tool you can give your employees to boost creative innovation by 250% • Why organizations embracing mobility claim 320 hours more work per employee ?
Tags : 
mobile workforce, employee satisfaction, increased productivity
    
Citrix ShareFile

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.