RSS feed Get our RSS feed

News by Topic

graph

Results 501 - 525 of 1015Sort Results By: Published Date | Title | Company Name
By: Microsoft Windows     Published Date: Mar 31, 2017
Worried about cybercriminals taking down your business? Outsmart them with Windows 10. The threat landscape has evolved dramatically in recent years. It seems every day we hear another headline about an organization getting breached. We've responded by changing the architecture of Windows 10 so that we’re not just building bigger walls against these attacks; we’re locking the criminals out. Windows 10 provides a comprehensive set of protections against modern security threats. Download this Infographic to learn more!
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 enabled key benefits across business and IT departments. Download this Infographic to learn more of Forrester's cornerstone findings.
Tags : 
     Microsoft Windows
By: ALE     Published Date: Dec 05, 2018
The Healthcare industry has undergone several changes of late. Hospitals have had to adapt their approach to how they use technology because of four key themes: 1.) IoT 2.) Mobility 3.) Digital Health 4.) Security To find out more download this infographic today!
Tags : 
     ALE
By: Brother     Published Date: Nov 23, 2015
Download this infographic and learn why Brother is the printing solution for SMBs. Don't supersize. Think Optimize.
Tags : copiers, printers, scanners, brother, productivity, optimization, printing solution, smb
     Brother
By: RICOH     Published Date: Jun 09, 2017
Download this infographic to discover some interesting statistics in these times of change.
Tags : digital transformation, work place, work landscape, change
     RICOH
By: Oracle     Published Date: Aug 18, 2016
This infographic shows how to deliver secure cloud computing with Oracle Solaris and SPARC M7 software in Silicon technology.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 18, 2016
This white paper discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers.
Tags : 
     Oracle
By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : heat, data center, heat monitoring, hardware, datacenter, mission critical
     HP
By: Entrust Datacard     Published Date: Jan 24, 2014
As mobile momentum in the workplace continues, so do the opportunities to leverage connected mobile devices to bolster security, enable new business capabilities and effectively defeat desktop-based malware. Entrust’s latest Infographic, Mobile Security: Perception vs. Reality, explores the perceptions of IT decision-makers and why more and more enterprises are investing in mobility in 2013 and beyond.
Tags : entrust, security, mobile security, infographic, malware, mobile devices
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : entrust, certificates, mobile devices, security, device certificates
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : device certificates, identity, authentication, mobile world, information technology, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc
     Entrust Datacard
By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment, cryptographic
     F5 Networks Inc
By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations
     NetApp Exchange Upgrade
By: Cornerstone OnDemand     Published Date: Dec 12, 2014
The new way of work is multigenerational, multi-geographical, multi-cultural, and location-agnostic and device-independent. Workteam and organizational structures have morphed into more matrixed (vs. hierarchical) arrangements. Find out the different expectations of how, where and what people use to get their jobs done through this whitepaper.
Tags : cornerstone ondemand, millennials, work management, multicultural, work place, gen x, expectations, business management
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Apr 16, 2018
The role of learning and development has never been more important to the success of small and medium businesses, especially because of the fierce competition with big business to attract and retain top talent. We’re amidst a disruption in the way employees work and learn. Technology, skills, and workforce demographics are shifting and evolving at a rapid pace. Employees are now sitting in the driver’s seat when it comes to their career path and companies are getting strategic with how to meet this new demand. Read our guide “The Rise of the Holistic Learning Experience” to learn how the new role of learning and development can help your company thrive. You’ll gain insights on: • Consumer-driven technology changing the game • Continuous learning and staying relevant amid change • The holistic learner experience Get your copy and start building a holistic learning program today.
Tags : 
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Apr 16, 2018
Millennials are officially becoming the dominant demographic in the workforce. This younger generation is looking for more from their company and they're not afraid to jump ship to find it. How can your company meet the demand of a millennial generation and retain top talent? Download our brief and read about 7 practical ideas to help your company boost retention and drive growth.
Tags : 
     Cornerstone OnDemand
By: PitneyBowes     Published Date: Sep 29, 2010
Recent study suggests that a new technology can capture increased consumer attention for a modest incremental cost (open-ability research).
Tags : pitney bowes, open envelopes, color text, graphic, mailing
     PitneyBowes
By: Aberdeen Group     Published Date: Jun 01, 2011
Aberdeen's research and analysis indicates that the strongest near-term growth for EV SSL Server Certificates will come from Small businesses (<$50M in annual revenue), particularly in the EMEA and Asia / Pacific geographies.
Tags : aberdeen, ssl server certificates, ev ssl server certificates
     Aberdeen Group
By: Citrix Systems     Published Date: Nov 04, 2013
A Citrix Infograph: Top Use Cases for Desktop Virtualization
Tags : citrix, desktop virtualization, citrix infograph, virtualization, citrix xendesktop, flexcast
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
ADCs are advanced load balancers with functions and features that enhance the performance of applications. Today, companies of all sizes with geographical dispersal of people and different data constructs require ADCs to optimize their complex application environments from web applications, to Exchange, SharePoint and databases. It is interesting that before the term ADC was used more recently (in the last decade), companies relied on load balancers for website availability and scalability. In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC.
Tags : database, sharepoint, application, load balancer, performance, availability, website, scalability
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Solution for virtual application delivery.
Tags : security, cost, mobility, productivity, data
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Choosing Citrix over VMware.
Tags : control, productivity, mobile workspace, data security, sharing, desktop virtualization, cloud
     Citrix Systems
By: Citrix Systems     Published Date: Jul 17, 2015
Business issues driving IT toward desktop virtualization.
Tags : data security, desktop management, seamless mobility, applications, it strategy
     Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : citrix, network, application traffic, application delivery, network visibility, data, storage
     Citrix Systems
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics