RSS feed Get our RSS feed

News by Topic

asp

Results 251 - 275 of 510Sort Results By: Published Date | Title | Company Name
By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : media, media companies, broadcasters, content, create content, audience, deliver content, content management
     Equinix
By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm
     IBM
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
     Commvault
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : encryption, data loss prevention, mobile app
     Commvault
By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
     Puppet
By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
     Cisco
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
     Kaspersky Lab Australia and New Zealand
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : technology innovation, technology, technology for education, byod, education
     Kaspersky Lab Australia and New Zealand
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : security application, virtualisation, security, kaspersky, security solutions
     Kaspersky Lab Australia and New Zealand
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : prevent cyber-attacks, cyber-attacks, security application, security
     Kaspersky Lab Australia and New Zealand
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
     Kaspersky Lab Australia and New Zealand
By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : data, data recovery, data backup, midsized business
     HPE
By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : siemens, arc defense, fault-resistant, medium voltage, electrical emergency
     Siemens
By: VMware AirWatch     Published Date: May 24, 2016
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine “BYOD” è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell’acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell’IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l’orario di ufficio, sfruttando tutti i vantaggi derivanti dall’uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT. I fenomeni del BYOD e della consumerizzazione dell’IT hanno continuato a crescere parallelamente alla riduzione dei prezzi dei dispositivi e al miglioramento delle caratteristiche di connettività.
Tags : best practices, business optimization, business management, program management
     VMware AirWatch
By: illusive networks     Published Date: May 18, 2016
The only way to stop cyber attackers in their tracks is to learn to think like an attacker. To give you better insight into what tools attackers are using, we've compiled a list of 15 "must-have" tools for aspiring attackers. Download this guide and learn about Open source tool cyber attackers use, such as Kali Linux and Wireshark, Password cracking tools that automatically test all possible combinations , and Tools such as Nmap, which lets users "map" a target network and its ports.
Tags : 
     illusive networks
By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : kaspersky, ransomware, encyyption, data access, email security, company security
     Kaspersky
By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
     Kaspersky
By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : kaspersky, virtualization security, security management, light agent
     Kaspersky
By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimate’s award-winning UltiPro® suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : software, network management, network solutions, best practices, business intelligence, productivity, business optimization
     SolidFire_NetApp
By: Cisco     Published Date: Apr 18, 2016
If you’re like most people, the reason you’re looking at OpenStack for a private cloud is because your developers fell in love with public cloud, and you want to give them the same experience, but with better economics, control, and performance of a private cloud. The reality is that instead of looking to replicate the public cloud experience, privately, we often run in to people that want to fiddle with every aspect of the infrastructure and OpenStack® itself. Companies start off looking for a public cloud experience, but quickly become more interested in the choice of hypervisor, network models and storage architecture -- none of which are even up for discussion in a public cloud. These questions aren’t wrong to ask, they just shouldn’t matter to you. What should matter is the experience your developers will have in your private cloud, how your apps will run, and how your private cloud will integrate with your existing systems and apps.
Tags : 
     Cisco
By: Cisco     Published Date: Apr 04, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : cisco systems, mobility, going digital, midsize businesses, smb, mobility infrastructure
     Cisco
By: IBM     Published Date: Mar 28, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decision about a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : ibm, mwd advisors, talent analytics
     IBM
By: Adobe     Published Date: Mar 17, 2016
Continued reliance on wet signatures is risky, especially in sales, where speed and ease of business are vital to revenue. In this Forbes Insights paper, learn how moving to e-signatures can transform all aspects of the sales cycle.
Tags : adobe, sales performance, electronic signature, sales cycle, sales
     Adobe
By: Oracle     Published Date: Mar 08, 2016
While retailers scramble to manage the impact of omnichannel on their operations, the way they communicate with customers, and the methods they use to promote their products and reward loyal shoppers, many have neglected to consider what will likely be the most profound change of all: the overall impact of omnichannel data transparency. Omnichannel is destined to transform every aspect of the retail industry, including the store—its design and layout, the inclusion of mobile pointof- sale and clienteling systems, the impact of transparent inventory and what that means for fulfillment, a single view of the customer and its implications for loyalty programs, and even the physical location of stores. Retailers must stay ahead of the omnichannel curve if they expect to remain competitive in the race for customers in a commerce anywhere world, and that contest begins at the brick-and-mortar store.
Tags : 
     Oracle
By: IBM     Published Date: Mar 07, 2016
Predictive Maintenance for Dummies helps you grasp the concepts of predictive maintenance and put the benefits to use.
Tags : ibm, predictive maintenance, operations, data, competitive advantage
     IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics