document

Results 201 - 225 of 985Sort Results By: Published Date | Title | Company Name

City of Denton, Texas - City Boost System Performance, Gains Business Continuity

Published By: EMC Corporation     Published Date: Jun 14, 2013
The City of Denton, Texas encompasses nearly 95 square miles and has a population of more than 113,000 residents. Denton is one of the fastest-growing communities and eleventh largest city of the Dallas-Fort Worth (DFW) Metroplex. In this document we will explore the business challenges the city faced, how EMC helped come to a solution and drive results.
Tags : 
it infrastructure, system performance, unified storage, technology, security, applications, networking, it management, enterprise applications, storage, business technology
    
EMC Corporation

City of Palo Alto Accelerates Approvals with DocuSign

Published By: DocuSign     Published Date: Mar 23, 2016
See how the heart of the Silicon Valley, Palo Alto, is leading the way with accelerated approvals of city documents, increased accountability and reduced contract turnaround.
Tags : 
    
DocuSign

Close The Gap in your Data Protection Strategy (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler

Closing the Order-to-Cash Performance Gap Between Document Processes & ERP Solutions

Published By: Esker     Published Date: Jun 23, 2015
Companies running ERPs/business systems already have an edge — yet critical gaps still exist. Learn how end-to-end automation of the order-to-cash (O2C) cycle can drive success.
Tags : 
    
Esker

Closing the Order-to-Cash Performance Gap between Document Processes and SAP Solutions

Published By: Esker     Published Date: Dec 18, 2015
Includes success stories from other companies running SAP who automated their O2C processes! Download now!
Tags : 
esker, performance gap, document processes, sap solutions, sap, it management, knowledge management, enterprise applications, platforms
    
Esker

Cloud Best Practices

Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Too often we hear that people want to move everything to the cloud. Unfortunately cloud is not the easy button, and it will not fix every problem that you have with IT today. We have seen a large number of customers who do the math after moving to the cloud only to realize that it was more expensive to run in an offsite cloud than onsite IT. These customers then move away from offsite cloud for workloads that never should have left the building. The cloud in its many varieties is a good tool that can help organizations, but it needs to be thought out. This document is intended to help you move the right workloads to the right clouds in the best way possible and avoid the yoyo effect of moving twice and paying for the privilege of the experience.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise

Cloud Computing Deployments Should Begin With Service Definition

Published By: Riverbed     Published Date: Apr 14, 2017
"Infrastructure and operations leaders often struggle to understand the role of cloud computing and to develop strategies that exploit its potential. I&O leaders should complete the prerequisites before making the technology decisions required for successful, service-centered cloud computing strategies. Read the Gartner report to learn more about key recommendations: Identify the cloud-computing-related IT services you will offer or procure. Document the internal processes that will be affected by the identified cloud services. Map applications and workloads to the associated cloud services."
Tags : 
    
Riverbed

Cloud Computing Deployments Should Begin With Service Definition

Published By: Riverbed     Published Date: Nov 02, 2016
"Infrastructure and operations leaders often struggle to understand the role of cloud computing and to develop strategies that exploit its potential. I&O leaders should complete the prerequisites before making the technology decisions required for successful, service-centered cloud computing strategies. Read the Gartner report to learn more about key recommendations: Identify the cloud-computing-related IT services you will offer or procure. Document the internal processes that will be affected by the identified cloud services. Map applications and workloads to the associated cloud services."
Tags : 
    
Riverbed

Cloud hybride : trouver l 'équi libre pour les charges de travail essentielles

Published By: Cisco     Published Date: May 14, 2015
Dans ce document, nous analyserons ces challenges et nous verrons dans quelle mesure Cisco Intercloud Fabric permet de les relever.
Tags : 
cisco, desktop virtualization, efficiency, virtualization, mobile computing, network performance, enterprise resource planning, cloud computing
    
Cisco

Cloud-Content Collaboration Services Enabling Enterprises to Move Toward Next-Gen Collaboration

Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box

CloudFlare advanced DDoS protection

Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, business technology, cloud computing
    
CloudFlare

Cluster Class High Availability for the Microsoft Technology Platform

Published By: Neverfail Group     Published Date: Aug 21, 2009
This document introduces Neverfail Heartbeat, a technology that enables the protection of applications against many potential failures, including application failure, operating system failures, and hardware, network or site failures, at a reasonable cost.
Tags : 
microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, neverfail, platforms, storage, clustering
    
Neverfail Group

Colocation providers: a guide to selecting the right one

Published By: Flexential     Published Date: Jul 17, 2019
The benefits of colocation are well documented, making it easy for organizations to build a compelling business case. Once the decision is made to outsource some or all of your IT infrastructure, there’s plenty of work to do, including selecting the right colocation provider.
Tags : 
    
Flexential

Colour in the Office: Document Fairy Tale or Cost Demon?

Published By: NewField IT     Published Date: Aug 19, 2008
The printer salesman began his pitch: "Once upon a time there was a poor, dull document that was of interest to no-one. Its vital information was ignored by one and all, and it stayed unloved and unlovely at the bottom of a drawer in the kingdom of Officeland." NewField IT is an independent consultancy practice with primary data covering 28 countries and over 70,000 devices. In this paper, they take an impartial look at the use of colour in an office, its advantages and the cost to a business.
Tags : 
knowledge management, document management
    
NewField IT

Como satisfazer as demandas de mercado para a entrega de aplicativos novos e inovadores

Published By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
    
CA Technologies

Compelling Storage Virtualization Software

Published By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : 
storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
    
DataCore Software

Compliancy & Document Management: The Critical Connection

Published By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : 
document management, compliance, content management, computhink, video, content management system
    
Computhink

Comprehensive Cybersecurity Defences for Content Delivery

Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network

Confidential Collaboration: Keeping safe, legal and compliant

Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, compliance, internet security, intrusion prevention, security management, data protection, secure content management, business technology
    
Intralinks

Configuration Management and Documentation to Meet Federal IT Compliance Mandates

Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
    
Ecora Software

Connecting Physical and Virtual Networks with VMware NSX and Juniper Platforms

Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks

Consolidating Microsoft SQL Server with HP PolyServe: The User View

Published By: HP     Published Date: Jul 25, 2008
This paper discusses how HP's PolyServe Software for Microsoft SQL Server combats SQL Server sprawl and compares HP PolyServe to alternative approaches. Download the complete document here.
Tags : 
sql, sql server, migration, infrastructure, server migration, polyserve, network management, servers, windows server
    
HP

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

Content Marketing Software: An Introduction

Published By: Kapost     Published Date: Feb 20, 2014
Just about everyone claims to be doing content marketing, but far fewer organizations have a thought-out plan. According to Content Marketing Institute, only 44% of B2B marketers and 39% of B2C marketers have a documented content strategy. But as organizations scale content operations, workflows, distribution, and promotion, many are seeking tools to centralize, manage, and improve the process. That’s where content marketing software comes in. This software can help organize, automate, and visualize your efforts to create original content, as well as curate the content of others.
Tags : 
    
Kapost
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.