RSS feed Get our RSS feed

News by Topic

reality

Results 301 - 325 of 431Sort Results By: Published Date | Title | Company Name
By: Silver-Peak     Published Date: Mar 21, 2012
Noted author Jim Metzler reports on the emergence of vWOCs, or virtual WAN Optimization Controllers. From the data center to the branch, virtualization is enabling a revolution in how WAN optimization is acquired and deployed. Whether combined with traditional physical appliances or fully virtualized, the new choices make universal network optimization a reality.
Tags : virtualization, technology, data center, data management, wan, wan optimization, vwoc, router
     Silver-Peak
By: IBM     Published Date: Dec 03, 2012
This white paper outlines the changing IT landscape and showcase TCOs associated with a Smarter Computing approach. Learn about the reality of smarter computing transformations and business gains.
Tags : smarter computing, ibm, ibm smarter computing, it landscape, business gains
     IBM
By: Workfront     Published Date: May 01, 2015
This ebook will help you turn the illusion of productivity into your marketing team’s reality.
Tags : illusion of productivity, creative services, productivity problems, conquer productivity issues
     Workfront
By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : data privacy, technology, data, security, safeguards, cloud computing
     Intralinks
By: Dropbox for Business     Published Date: Jun 09, 2014
“Security” is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure.1 But the truth is, cloud solutions can offer companies real, tangible security advantages. Before you assume that on-site is the only way to keep data safe, it’s worth taking a comprehensive approach to evaluating risks. Doing so can lead to big benefits.
Tags : dropbox, cloud, security, business, risk, secure
     Dropbox for Business
By: Mobify     Published Date: Jan 27, 2015
We at Mobify want to help you further deepen your understanding of the mobile shopping landscape and the expectations of mobile consumers. In this white paper, you’ll discover: - Why ‘omnichannel’ is not a buzzword, but the new retail reality - What the key differences are between smartphone and tablet users and what this means for your bottom line - Why Millennials are a market that you can’t afford to ignore - How your mobile presence can make or break a customer’s in- store experience
Tags : mobile website, responsive ecommerce website, mobile conversion optimization, mobile shopping, mobile retail, mobile e-commerce, omnichannel app, make responsive website
     Mobify
By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
     HP
By: Lenovo     Published Date: Sep 27, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
     Lenovo
By: SAP     Published Date: Aug 03, 2010
Today, the ERP reality is very different, and much more beneficial, for smaller firms. A variety of options have emerged to address and overcome the key concerns and obstacles of the past. Learn about the drivers that force these executives to address an ERP decision, the considerations involved in those decisions, and critical implementation factors once an ERP decision is made.
Tags : sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, smb
     SAP
By: SAS     Published Date: Mar 06, 2018
Digital transformation is a reality for marketers that is wrapped in both opportunities and headaches. Marketers understand the choices and expectations that their customers now have, and they are up for the challenge. But marketers also have many obstacles to overcome to deliver the consistently good, timely and engaging customer experience, across devices, that customers demand. The good news is that the marketing technology industry is rapidly evolving to address these challenges. And in the same way that consumers have an abundance of choices, marketers also have many options when it comes to choosing partners to help. But where to start, and how to choose the right partners?
Tags : 
     SAS
By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
     NewField IT
By: Electric Cloud     Published Date: Oct 13, 2009
In this whitepaper I argue that the person most affected by the introduction of agile or extreme programming techniques is not the software or quality assurance engineer, but the build manager. And the build manager can no longer make do with home grown tools; software production automation tools are required to make agile development a build reality.
Tags : electric cloud, agile development, coding, testing, code, software development, build, automation
     Electric Cloud
By: Port25 Solutions     Published Date: Mar 23, 2012
After evaluating PowerMTA from Port25 Solutions, smartFocus' digital messaging objectives for enhanced inbox placement became a reality. Read the full case study to find out what Port25 can do for you and your business too!
Tags : smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting
     Port25 Solutions
By: Neverfail     Published Date: Jan 24, 2013
It's not easy to separate hype from reality. When evaluating a high availability and disaster recovery solution, consider these questions to determine the best solution for you.
Tags : top ten questions, neverfail, availability solution, disaster recovery solution, top 10
     Neverfail
By: Skillbridge Training     Published Date: Sep 20, 2013
What was once considered futuristic science fiction, Cyber warfare is now today’s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front.
Tags : 
     Skillbridge Training
By: Polycom     Published Date: Sep 07, 2016
"For over a decade Polycom and Microsoft have been addressing the challenge facing businesses across the globe—how to create the next generation workplace and allow employees to truly collaborate from anywhere. The recent rollout of Office 365 by Microsoft has made the next generation workplace a reality and Polycom is the only provider of voice and video solutions built for this new environment. In this webinar, Polycom and Microsoft experts will discuss Microsoft’s new Office 365 services and how Polycom’s portfolio of enterprise voice and video products will drive collaboration across an entire organization from desktops to conference rooms and beyond. This webinar will cover the following product and industry discussions: •What you need to know about Microsoft’s new voice capabilities in Office 365 •How to outfit your organization with voice solutions that integrate natively with Skype for Business and Office 365 •How to prepare your organization for video collaboration around Sk
Tags : 
     Polycom
By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : microsoft sharepoint, data integration, security, sharepoint solutions
     K2
By: Zane Benefits     Published Date: Sep 28, 2015
In an ideal world, health insurance would be as easy as one, two, three - right? However in reality, navigating health insurance isn’t exactly easy.
Tags : health insurance, guide, small business, self employed, reform, coverage
     Zane Benefits
By: Eaton     Published Date: Jan 26, 2016
Arc flashes—the fiery explosions that can result from short circuits in high-power electrical devices—kill hundreds of workers in the U.S. every year and permanently injure thousands more. They can also wreak financial havoc in the form of fines, lawsuits, and damage to expensive equipment. This white paper aims to fill that knowledge gap by providing introductory-level information about what arc flashes are and what you can do to prevent them.
Tags : eaton, arc flashes, data center solutions, data centers
     Eaton
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
     IBM
By: AON     Published Date: Oct 25, 2016
The unfortunate reality is that not all of your employees are going to be engaged. You can institute every program imaginable - there will always be a subset of your organization that do not Say positive things about your company, do not feel motivated to Strive to give extra effort, and do not intend to Stay with your company. All the same, this shouldn’t deter you from creating a culture of engagement.
Tags : 
     AON
By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, c-suite study, cybersecurity, security
     IBM
By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : ibm, security, maturity, c suite, cybersecurity
     IBM
By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics