information work

Results 151 - 175 of 486Sort Results By: Published Date | Title | Company Name

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 16, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

EMC’s Comprehensive Flash Strategy

Published By: EMC     Published Date: Dec 18, 2014
This White Paper provides information on how Flash is now rapidly and violently disrupting the disk status quo, and not just, or even mainly, because it is fast. Yes, the early integration of SSDs into a storage strategy was all about accelerating specific workloads, followed by getting a better overall balance of price/performance in external storage arrays.
Tags : 
emc, flash, flash storage, data management, storage management, storage virtualization, infrastructure
    
EMC

Emergency Telecommuting

Published By: GoToMyPC     Published Date: Apr 06, 2011
This comprehensive emergency telecommuting guide provides critical information and just-in-time solutions for those who find themselves unexpectedly working from a distance.
Tags : 
telecommuting, teleworker, emergency, virtualworks, citrix, telework program, telecommuter, productivity, mobile workers, project management, video conferencing, collaboration, employee performance
    
GoToMyPC

Enhance the Value of media & Entertainment Content with Cogito Cognitive Technology

Published By: Expert System     Published Date: Jul 18, 2019
For publishers and information providers, your competitive advantage starts with optimizing your most valuable resource: content. In this context, semantic content enrichment has evolved from a game changing capability into a de-facto requirement for both competition and innovation. Expert System’s solutions based on our cognitive technology, Cogito®, help publishers take full advantage of content to ensure its complete availability for providing compelling content, supporting new product development, building new revenue streams and improving workflow productivity.
Tags : 
    
Expert System

Enterprise BYOD: Blending business, information security, and workforce management

Published By: Workforce Software     Published Date: Jun 04, 2015
This paper helps outline some of the ways to control BYOD risks and outlines other factors that influence your decision to establish a BYOD policy. Like Cloud-based software delivery, BYOD presents such compelling advantages over the traditional approach that its emergence as the dominant mobile strategy appears to be a question of “when” rather than “if.”
Tags : 
workforce software, byod, enterprise applications, mobile strategy, mobile devices, it management
    
Workforce Software

Enterprise Case Study: Reallocating Resources from Administration to Academia

Published By: Workday     Published Date: Mar 02, 2018
To thrive in an outcome-based funding model, your institution needs an ERP and student information system that is efficient and adaptable in order to channel more resources into learning and support student success. Read the Ovum case study to learn how Broward College accomplished this with one cloud-based Workday system.
Tags : 
    
Workday

Enterprise Cloud Strategy

Published By: Microsoft Azure     Published Date: Apr 11, 2018
What you need to know now about moving your enterprise to a cloud computing strategy In the second edition of the Enterprise Cloud Strategy e-book, we've taken the essential information for how to establish a strategy and execute your enterprise cloud migration and put it all in one place, so you can quickly understand topics like: What to consider when choosing between hybrid, public, or private cloud environments How cloud reduces costs, and even benefits on-premises computing New analytics and IoT capabilities Security and compliance considerations This valuable asset for IT and business leaders provides a comprehensive look at moving to the cloud, as well as specific guidance on topics like prioritizing app migration, working with stakeholders and cloud architectural blueprints.
Tags : 
    
Microsoft Azure

Enterprise Data Security: The Basics Of User Behavior Analytics

Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies

Enterprise Web 2.0 application support from IBM (300)

Published By: IBM     Published Date: Jun 24, 2009
This white paper outlines the advantages of WebSphere Portal for System z software and provides essential information to those considering adding Web-facing workloads on their mainframe hardware. Also, with these WebSphere Portal for System z options, IBM illustrates its ongoing commitment to mainframe computing and underscores the business value that remains inherent in the System z platform. Learn more today!
Tags : 
enterprise, web 2.0, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa, service oriented architecture, hfs, hierarchical file system, ibm db2, cics, zap, application assist processor, linux
    
IBM

Equinix Performance Hub Gives Enterprise Networks a Giant Boost.

Published By: Equinix     Published Date: May 28, 2015
This infographic provides information on how Performance Hub is designed to improve the performance of your entire network while simplifying your infrastructure and lowering your Total Cost of Ownership.
Tags : 
equinix performance hub, networks, data growth, network architecture, connectivity, network services, cloud, devices, equinix solutions, performance hub, infrastructure, network management, network performance, network security, disaster recovery, mobile computing, wireless infrastructure, virtualization, cloud computing
    
Equinix

Essential Data Protection, Recovery and Resiliency for Banks

Published By: Vision Solutions     Published Date: Jan 22, 2009
This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization. It includes an Action Worksheet to use in discussions with your IT executives.
Tags : 
vision solutions, data protection, information availability, banking industry, crm, enterprise applications, data management, customer relationship management, as/400
    
Vision Solutions

Ethernet Q&A Guide featuring Fronteo

Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet clients’ critical information needs, the business requires connectivity and data center solutions that can process, access and interpret terabytes of sensitive data—reliably and at top speeds. Get actionable insights from experts at FRONTEO and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise

European Businesses: You have a BYOD programme whether you like it or not

Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout

Evaluating HR management software: 5 factors that should guide your decision when choosing an HRMS

Published By: Sage     Published Date: Jan 30, 2015
As organizations look for more ways to increase productivity and profitability, human resources departments are being asked to provide more strategic input to executives. Doing so requires tools that improve access to timely, accurate information for enhanced business decision making. If you don’t have a human resource management system (HRMS), HR can end up spending too much time on repetitive day-to-day tasks like paperwork while struggling to deliver meaningful workforce insights. The right HR management software can help the HR team increase control over employee data, optimize productivity, and take employee engagement to the next level, so you can deliver the future workforce your organization needs to succeed. This white paper discusses the five areas to keep in mind when evaluating solutions to find an HRMS that’s a good fit for your business.
Tags : 
sage, hr management, hr software, hrms, hr team, evaluating solutions
    
Sage

Evolving Security To Accommodate The Modern Worker

Published By: Dell     Published Date: Aug 08, 2018
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. In July 2017, Dell commissioned Forrester to conduct a study of the 21st century workforce and how their new habits, attitudes, and workstyles are reshaping the world of work. With more personas in a single organization to cater to, businesses are failing to deliver against workforce demands. To get their tasks done, workers are circumventing security policies to get what they want, in their moment of need. Organizations have to understand the different behaviors across
Tags : 
    
Dell

Evolving Security to Accommodate The Modern Worker

Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA

Executive Brief - Leveraging Mobility to Improve Sales

Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm, mobile computing, mobile data systems, customer relationship management
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.