RSS feed Get our RSS feed

News by Topic

technical

Results 351 - 375 of 573Sort Results By: Published Date | Title | Company Name
By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
     Zebra Technologies
By: VMware     Published Date: Dec 17, 2012
This technical white paper covers the the vSphere(r) Storage Appliance (VSA) architecture, deployment of a VSA cluster, and basic monitoring and management.
Tags : storage, shared storage, cloud, drs, disaster recovery
     VMware
By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : virtualization, cloud, vmware, security, compliance
     VMware
By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : blade servers, datacenter, agility, intel
     HP and Intel® Xeon® processors
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: NetApp     Published Date: Dec 01, 2009
This technical report (TR) provides guidelines and best practices for integrated architectures and implementations of Microsoft® Hyper-V with NetApp® storage solutions.
Tags : netapp, storage, microsoft virtualization, technical report, integrated architectures, hyper-v, cluster network, configuration
     NetApp
By: Lumension     Published Date: Sep 18, 2012
A Technical Paper on Lumension Intelligent Whitelisting
Tags : intelligent white listing, lumension, malware, endpoint
     Lumension
By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing
     Quark, Inc.
By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing
     Quark, Inc.
By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Encouraging self-service BI adoption is both a technical and a human resource effort. This white paper offers a 10-point checklist for improving this process, and includes these questions and more in this easy-to-read white paper.
Tags : ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi
     GrapeCity, Inc.
By: LogMeIn     Published Date: Sep 04, 2013
This paper conveys how the pressure to increase customer satisfaction metrics with less funding will increase as companies look for new ways to differentiate their services and reduce customer churn.
Tags : 5 tips for customer service, customer experience, improving customer experience, logmein, rescue, support desk, technical support, customer experience management
     LogMeIn
By: LogMeIn     Published Date: Sep 04, 2013
This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers.
Tags : support services, logmein, rescue, hdi research corner, service experience, technical support, satisfaction, organizational satisfaction
     LogMeIn
By: LogMeIn     Published Date: Sep 04, 2013
Organizations are implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals. Click here to find out how.
Tags : service and support, customer support, imperative, technologies, online support, remote support, evolution of support, technical support
     LogMeIn
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: Marketo     Published Date: Mar 18, 2015
Did you know that 80% of all marketers say their organizations will need to undergo dramatic changes in the next 3-5 years in order to keep up with increased technical and consumer demands? This recorded webinar will explore what is on top of the mind for these marketing executives.
Tags : marketo, new marketing trends, marketing trends, social marketing, mobile marketing, new marketing tools, sales tools, roi
     Marketo
By: Polycom     Published Date: Oct 31, 2014
Description: Lync expert and blogger Jeff Schertz presented about deploying video for Microsoft Lync and preparing for a Lync Room System. You have questions and Jeff Schertz has the answers when it comes to anything Lync, including video implementation. Jeff led a technical discussion on how to deploy video for Lync and what you need for the Microsoft Lync Room System.
Tags : best practices, network, services, topics, architects, video-enabling, lync, environment
     Polycom
By: ReadyTalk     Published Date: Jul 07, 2016
Let’s face it, employees in Information Technology have a tough job. You’re the technical experts, responsible for hardware and software as well as business processes and sometimes project management. You’re also charged with being experts in communications, sales, marketing, psychology, counseling, and more just to get your company to adopt new ways of doing things or new technology. This is especially true when trying to deliver everything on time and on budget.
Tags : best practices, business optimization, business management, productivity, information technology, communication
     ReadyTalk
By: HP AppPulse Mobile     Published Date: Jun 05, 2015
HP has developed a fast, easy method to measure and monitor the user experience in a truly meaningful way: from the user’s perspective. It’s called “FunDex,” a single score from 0 to 100 that encapsulates the average overall user experience. This paper will show you how to measure and monitor your FunDex.
Tags : user experience, customer satisfaction, mobile, infographic
     HP AppPulse Mobile
By: HP AppPulse Mobile     Published Date: Jun 19, 2015
There are plenty of statistics confirming that the user experience determines the success of mobile apps—and the success of the business. This paper explores the challenges of mobile app user experience measurement and a more intelligent approach to measuring what truly matters.
Tags : 
     HP AppPulse Mobile
By: Rackspace     Published Date: Mar 08, 2016
Determining which model works best for your organization means understanding the following requirements: Technical: Can the workload actually be hosted in the cloud? Compliance: Regulation may determine where and how their data and workloads can be run and stored. Security: Each workload has separate security requirements, creating challenges to run in the public cloud.
Tags : cloud model, public cloud, diy cloud, hybrid cloud, rackspace, compliance, cloud security
     Rackspace
By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 123together, it strategies, contact management, email, economy, stability, collaboration, green it
     123Together
By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     BlackBerry Cylance
By: Tripwire     Published Date: Apr 28, 2010
Learn more about the survey results and how the right attitudes and technical controls can change that outlook.
Tags : tripwire, pci compliance, pci dss, it security
     Tripwire
By: Flimp Media     Published Date: Jan 26, 2010
This report, discusses the uses, applications and benefits of video landing pages for email marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective online video email marketing campaigns using video landing pages without programming or advanced technical skills.
Tags : flimp, b2b, idc, intelligent digital collateral, landing pages, email marketing, emarketing, measurability
     Flimp Media
By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media
     Flimp Media
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics