RSS feed Get our RSS feed

News by Topic

bring

Results 901 - 925 of 1113Sort Results By: Published Date | Title | Company Name
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : citrix, security, enterprise, mobility
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : citrix, byodm cyod, cope, security
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : citrix, gartner, magic quadrant, enterprise, mobility
     Citrix Systems, Inc.
By: WhatCounts     Published Date: Feb 04, 2010
Video email is the best of three worlds, bringing together the immediacy of the internet, the precise control and metrics of direct mail, along with the visual appeal of television and YouTube. At its best it has the potential to double or triple the overall efficiency of your marketing program, but employed in the wrong way and it can turn off existing customers.
Tags : whatcounts, video email, video, rich media, youtube, emarketing, email marketing, ctr
     WhatCounts
By: Juniper Networks     Published Date: Feb 18, 2015
Looking to bring apps to market more quickly and reliably? Read our eBook on Network Automation to learn how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : network, automation, data center, cloud, it management
     Juniper Networks
By: SAS     Published Date: Sep 30, 2014
How The University of Texas System is increasing transparency to the public with dynamic data visualizations.
Tags : sas, dynamic data visualizations, the university of texas system
     SAS
By: SAS     Published Date: Oct 18, 2017
Want to get even more value from your Hadoop implementation? Hadoop is an open-source software framework for running applications on large clusters of commodity hardware. As a result, it delivers fast processing and the ability to handle virtually limitless concurrent tasks and jobs, making it a remarkably low-cost complement to a traditional enterprise data infrastructure. This white paper presents the SAS portfolio of solutions that enable you to bring the full power of business analytics to Hadoop. These solutions span the entire analytic life cycle – from data management to data exploration, model development and deployment.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
What management and leadership challenges will the next wave of analytic technology bring? This Insight Center on HBR.org went beyond the buzz of what artificial intelligence can do, to talk about how it will change companies and the way we manage them.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
What management and leadership challenges will the next wave of analytic technology bring? This SAS-sponsored Harvard Business Review Insight Center on HBR.org went beyond the buzz of what machine learning can do, to talk about how it will change companies and the way we manage them. Articles include: How to Make Your Company Machine Learning Ready, by James Hodson Machine Learning Is No Longer Just for Experts, by Josh Schwartz Teaching an Algorithm to Understand Right and Wrong, by Greg Satell The Simple Economics of Machine Intelligence, by Ajay Agrawal, Joshua Gans, and Avi Goldfarb Robots and Automation May Not Take Your Desk Job After All, by Dan Finnigan How to Tell If Machine Learning Can Solve Your Business Problem, by Anastassia Fedyk
Tags : 
     SAS
By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits
     Eaton
By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : mobile, enterprise, application gap, pcs, byod, data
     Citrix
By: Citrix     Published Date: Jul 25, 2014
Smartphones, tablets and other mobile devices increase productivity by accelerating decision making and responsiveness. As a result, the number of business users relying on corporate and bring-your-own (BYO) mobile devices continues to grow rapidly—with email serving as the primary app to service customers and facilitate collaboration.
Tags : email, mobile, collaboration, smartphone, tablets, productivity
     Citrix
By: Citrix     Published Date: Jul 25, 2014
While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.
Tags : secure, mobility, management, checklist
     Citrix
By: Citrix     Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : enterprise mobile, executive checklist, security, byod
     Citrix
By: Business Software     Published Date: Apr 04, 2013
With the advent of a new globally-based economy, process manufacturers face significant challenges. Rapidly shifting markets, more empowered buyers, increasing regulation, commodity volatility, and margin pressures, and the effects of a credit crunch bring a “new normal” of constant volatility, variability, and variety to today’s landscape. In order to survive, process manufacturers need to become far more flexible, risk aware, and responsive to generate healthy revenues and profits. But above all else, they need to understand the importance of finding the right software application to drive maximum return on their investment. Business-Software.com profiles the leading process manufacturing software vendors in this white paper, download it now!
Tags : top 15 process, manufacturing, software vendors revealed, business-software.com, rapidly shifting markets, increasing regulation commodity
     Business Software
By: Logicalis     Published Date: Mar 12, 2014
The buzz around the cloud is very real. It offers considerable business agility, cost efficiencies and service improvements to IT managers. What the buzz doesn’t tell you is that getting to the point where the cloud brings these benefits to your organization isn’t easy. So the real question becomes: What do you need to keep in mind when integrating cloud computing into an IT strategy?
Tags : logicalis, cloud strategy, high efficiency data, itsm, security needs, security
     Logicalis
By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : network instruments, hacks, apm, security, pci, dss, hackers
     Viavi Solutions
By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : secure back up, servers, data, network infrastructure, cloud computing, virtualization
     Symantec
By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security
     Centrify
By: Cisco     Published Date: Jan 05, 2015
More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no particular order, here are five important strategies we see companies using to overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.
Tags : data center, consolidation, server virtualization, new applications
     Cisco
By: Cisco     Published Date: Jan 06, 2015
The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments.
Tags : engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications, security
     Cisco
By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: Riverbed     Published Date: Jul 15, 2014
Virtual desktop infrastructure (VDI) offers organizations the means to centrally manage and deliver desktops as a service to reduce costs, increase data security, and streamline desktop management while enabling anytime, anywhere access across a wide variety of devices. IT consumerization trends such as BYOD (bring your own device) and device diversity are accelerating VDI adoption, which is expected to double over the next year.
Tags : troubleshooting, virtual desktop, infrastructure, vdi, deployments, manage it, byod
     Riverbed
By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : big data, integrated, end-user, experience, it infrastructure
     Riverbed
By: Riverbed     Published Date: Aug 22, 2014
As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges.
Tags : optimizing, vdi, network factor, virtualization technologies, virtual desktop infrastructure, security, operational efficiency, improvements
     Riverbed
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics