RSS feed Get our RSS feed

News by Topic

abs

Results 176 - 200 of 491Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Apr 28, 2016
Bienvenidos a la primera edición del Informe sobre Seguridad Móvil y Riesgos del MobileIron Security Labs (MISL). Este informe ofrece información sobre el estado de la situación general de la seguridad y las amenazas móviles, destaca los riesgos emergentes y recomienda modos de reforzar las implementaciones corporativas móviles.
Tags : mobile apps, best practices, mobileiron, phones
     MobileIron
By: MobileIron     Published Date: Apr 28, 2016
Die Freigabe von Windows 10 bietet mehr als nur neue Unternehmensfunktionen – es ist eine umfangreiche Überarbeitung des Betriebssystems, die die Verwandlung von Windows von einer PC-zentrierten zu einer modernen Unternehmensarchitektur beschleunigt. Mit Windows 10 kann die Unternehmens-IT sich von einer sicherheitsorientierten, eigenständigen Infrastruktur zugunsten einer modernen Unternehmensarchitektur mit hoher Produktivität, Sicherheit und einheitlicher Benutzererfahrung auf mehreren Geräten verabschieden.
Tags : mobile apps, best practices, mobileiron, phones
     MobileIron
By: MobileIron     Published Date: Apr 28, 2016
Welcome to the first edition of MobileIron Security Labs (MISL) quarterly Mobile Security and Risk Review. This report provides insights into the state of the mobile security and threat landscape, highlights emerging risks, and recommends ways to fortify mobile enterprise deployments.
Tags : mobile apps, best practices, mobileiron, phones
     MobileIron
By: IBM     Published Date: Apr 26, 2016
Restoring connections: How telecommunications providers can reboot the customer experience IBM has more than 22,000 experts working in the Telecommunications industry, delivering solutions to more than 200 major communications service providers globally. IBM’s telecommunications capabilities are backed by a global network of telecom solution labs, research labs and innovation centers to support its offerings in the area of analytics, cloud, mobility, network optimization, digital transformation and global integration. IBM continues to invest significantly in key acquisitions to add expertise and capabilities that enable its clients in the telecommunications space.
Tags : ibm, ibm institute for business values, telecommunications, customer experience, communications service providers, csp, customer relationship, customer experience/engagement
     IBM
By: Adobe     Published Date: Apr 25, 2016
Im vorliegenden Paper beschäftigen wir uns mit der IT-Umgebung. Wie können Sie einfach zu verwaltende Dokumentenlösungen implementieren, die Desktop-Anwendungen, Apps und die Cloud aufeinander abstimmen und so den Anforderungen der modernen Arbeitswelt gerecht werden?
Tags : 
     Adobe
By: Castlight Health     Published Date: Apr 21, 2016
According to American Society of Addiction Medicine (ASAM), opioid abuse costs employers approximately $10 billion from absenteeism and presenteeism alone. Despite the breadth and seriousness of this crisis, America’s employers lack a true understanding of how it impacts individuals in the workforce and their families. Castlight developed this first-of-its-kind study on opioid abuse by examining de-identified and anonymous health data reporting from Americans insured by large employers who use our product.
Tags : castlight health, workforce, asam, addiction medicine, opioid
     Castlight Health
By: Tely     Published Date: Apr 07, 2016
In this report, Ira M. Weinstein and Saar Litman are explaining features and benefits of the Tely solution.
Tags : telyhd 200, video conference cloud, tely labs telyhd, vidyo pricing, equipment for video conferencing, tely 200, video conferencing hd, 11 telyhd 01 01
     Tely
By: Tely     Published Date: Apr 07, 2016
See for yourself how Tely 200 compares to other small room systems.
Tags : telyhd 200, video conference cloud, tely labs telyhd, vidyo pricing, equipment for video conferencing, tely 200, video conferencing hd, 11 telyhd 01 01
     Tely
By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
     CDW
By: GrowthIntel     Published Date: Feb 16, 2016
There are potentially tens of thousands of buyers who don’t know that they need your products or services. They are your passive, silent audience. And, if you want to grow quickly, that audience is absolutely vital. You can’t reach them using personas, content marketing, or retargeting – so how do you find buyers who’ve never even heard of you? This ebook explains how to reverse-engineer their digital footprints and follow the trail back to the owner.
Tags : advertising, medicine, clinical management, b2b, sales, business behavior, advertising agencies, business intelligence
     GrowthIntel
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : citrix, firewall, security, svm
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : citrix, waf, firewall, tco, security
     Citrix Systems, Inc.
By: Juniper Networks     Published Date: Jan 11, 2016
La sécurité du data center constitue une priorité absolue pour les entreprises. Téléchargez ce livre blanc IDC pour bénéficier d'une vision globale et actualisée des différents problèmes, depuis les menaces jusqu'aux fonctionnalités prédictives, en passant par les solutions les plus récentes.
Tags : 
     Juniper Networks
By: IBM     Published Date: Jan 06, 2016
Working for the government is no longer an absolute guarantee of stability and a pension.
Tags : workforce, government, talent, ibm, stability
     IBM
By: Workforce Software     Published Date: Dec 16, 2015
Do you want to know how other organizations design, execute, and measure workforce management programs? Here’s your chance.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
     Looker
By: Workforce Software     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
     Workforce Software
By: WFS Australia     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping
     WFS Australia
By: Symantec     Published Date: Nov 30, 2015
International tätigen nur noch sieben Prozent1 der Verbraucher alle Weihnachtseinkäufe im traditionellen Einzelhandel. Neun von zehn Deutschen nutzen das Internet für einen Teil ihrer Weihnachts­einkäufe, jeder Dritte kauft sogar die Mehrheit seiner Geschenke dort.2 Das bedeutet, dass nur die wenigsten Händler noch auf den OnlineHandel verzichten können. Ob Gutscheine, Bestellungen zur Abholung in einer Filiale oder der inzwischen beinahe „klassische“ OnlineEinkauf: Ihre Kunden sind bereit, Ihren virtuellen Gabentisch reich mit Daten und Absatzchancen zu decken. Doch wer die WebsiteSicherheit vernachlässigt, muss stattdessen die Rute in Form von Hackerangriffen und verärgerten Kunden fürchten.
Tags : 
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Ob Einzelperson oder Unternehmen: Sie sollten Ihre Online-Sicherheit ebenso ernst nehmen wie die physische Sicherheit zuhause oder im Unternehmen. Dadurch fühlen Sie sich nicht nur selbst sicherer; auch die Menschen, die Sie zuhause, im Büro oder auf Ihrer Website besuchen, werden geschützt. Um sicher zu gehen, dass Sie rundum geschützt sind, ist es für Sie wichtig, die potenziellen Risiken zu kennen. In der schnelllebigen Welt der Technologie ist es nicht immer leicht, mit den neuesten Entwicklungen Schritt zu halten. Deshalb ist eine Partnerschaft mit einem angesehenen Unternehmen für Internetsicherheit sehr sinnvoll. Dieser Leitfaden soll die eingesetzte Technologie entmystifizieren und Ihnen die Informationen bereitstellen, die Sie benötigen, um bei der Wahl Ihrer Online-Sicherheitslösung die bestmögliche Entscheidung zu treffen. Ein Glossar der verwendeten Begriffe finden Sie im Abschnitt "Technik verständlich erklärt" am Ende dieses Dokuments.
Tags : 
     Symantec
By: Workforce Software     Published Date: Nov 23, 2015
Download this complimentary white paper to learn how automated scheduling can reduce overtime costs related to: Unpopular shifts Peak vacation times Unplanned absences Unavailability
Tags : overtime pay, scheduling automation, peak vacation times, absences, employee scheduling, overtime
     Workforce Software
By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
     Blue Coat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics