RSS feed Get our RSS feed

News by Topic

desktops

Results 1 - 25 of 186Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Spectrum Enterprise     Published Date: Mar 01, 2019
The scalability of its EP-LAN lets MMC Corp seize new opportunities without adding infrastructure. For example, Scales and Trusler are looking at virtual desktops or virtual desktop image [VDI] files for some offices and even job sites. “We’ll probably have to scale some bandwidth internally for that,” Trusler notes, “but if we do the VDI internally or we do it with an external third party, it doesn’t really matter… because we can get them on that EP-LAN network and we can get the bandwidth that we need… quickly.” EP-LAN is scalable. In most cases, adding additional services at a specific customer location can easily be turned up by Spectrum Enterprise remotely. Choosing a fiber EP-LAN over MPLS not only met the challenge to connect MMC Corp locations: it created an IT platform that continues to scale to support rapid expansion and innovation.
Tags : 
     Spectrum Enterprise
By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
     Nice Systems
By: Cisco     Published Date: Jan 15, 2019
Cisco HyperFlex systems, with NVIDIA GRID and VDI for Microsoft Windows 10, is faster to deploy, simpler to manage, more secure, and easier to scale. It’s time to plan your transition to Windows 10 for enhanced flexibility and an uncompromised user experience.
Tags : 
     Cisco
By: Cisco and NVIDIA Corporation     Published Date: Jan 09, 2019
We deliver the power you need to give your users an uncompromised experience and the flexibility to tailor a solution to your needs and budget. Delivering virtual desktops on Cisco HyperFlex systems makes your job easier while also enabling you to provide excellent support to your users now and into the future. It’s time to plan your transition to Windows 10. Cisco HyperFlex systems with NVIDIA GRID and VDI is your solution.
Tags : 
     Cisco and NVIDIA Corporation
By: Group M_IBM Q119     Published Date: Dec 20, 2018
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
     Group M_IBM Q119
By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
     Akamai Technologies
By: Citrix Systems     Published Date: Nov 13, 2018
Explore the benefits of combining Citrix SD-WAN and Citrix Virtual Apps and Desktops to deliver apps to every user, everywhere. Software-defined WAN (SD-WAN) technology makes it possible to deliver a great user experience, regardless of how great your connection is. Citrix SD-WAN delivers an integrated solution that optimizes the value of Citrix Virtual Apps and Desktops virtual app and desktop delivery. This integrated solution lets you: provide more bandwidth over available connections, optimize performance for real-time network conditions, and ensure always-on connections with a quality experience. Download the eBook: Supercharging your Citrix Virtual Apps and Desktops user experiences with Citrix SD-WAN and learn: -Why WANs have trouble keeping up -How Citrix SD-WAN ensures reliability and optimal experiences -How real customers are utilizing this solution
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Nov 13, 2018
Nowadays, employees expect intuitive tools that are not only easy to use but also enable them to work when, where, and how they need without constraint. Get this e-book to learn five ways Citrix Workspace prioritizes user experience and security by providing: -Easy access to all apps, desktops, and files -Reliable, high-quality 3-D graphics, videoconferencing and virtual apps from any location -File sharing across devices -Mobile productivity apps
Tags : 
     Citrix Systems
By: PGi     Published Date: Nov 07, 2018
Webinare unterscheiden sich von kollaborativen Web-Meetings basierend auf Umfang, Geschäftsverhalten, Geschäftsanforderungen und Erwartungen der Teilnehmer. Webinare sind strukturierte, vorab geplante, One-to-Many LiveEvents, die höchst skalierbar sind und gestreamte Präsentationen sowie DesktopSharing, Stimmenabgaben, Umfragen und Chat-Funktionen bieten. Infolgedessen erfordern sie unterschiedliche Planung, Förderung, Übertragung und Messung.
Tags : 
     PGi
By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
     Cisco and NVIDIA Corporation
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     Group M_IBM Q418
By: Anaplan     Published Date: Sep 07, 2018
Viele Menschen arbeiten gern mit Spreadsheets, beispielsweise zur Verwaltung ihrer persönlichen Finanzen. Aber in einem professionellen Umfeld, in dem mehrere Personen Zugriff auf Daten benötigen, um die zu aktualisieren und zu ändern, gelangen Spreadsheets schnell an ihre Grenzen. Trotz aller Unzulänglichkeiten und Probleme werden Spreadsheets jedoch nach wie vor für die Planung und Analyse in Unternehmen eingesetzt. Das mag daran liegen, dass ihre massive Verbreitung auf Desktops und Laptops den Eindruck vermittelt, es würde sich um eine kostengünstige Option handeln. Wenn Sie Ihre Daten besser im Griff haben möchten und die Planung und Analyse nicht mehr mit Spreadsheets durchführen möchten, ist Anaplan die richtige Alternative: Die Plattform bietet ihnen nämlich nicht nur die intuitive Bedienung und Nutzerfreundlichkeit von Spreadsheets, sondern auch die Sicherheit und Skalierbarkeit einer Enterprise-Lösung
Tags : 
     Anaplan
By: Dell EMC     Published Date: Aug 06, 2018
Download this whitepaper to learn about how Dell's family of commercial class desktops are tailored to your workforce needs by unleashing your business with the power to do more.
Tags : 
     Dell EMC
By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : hospital, cyber, security, data
     Cylance
By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
     IBM
By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : vpn, proxies, security, security breach, technology
     Akamai Technologies
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: Dell EMC     Published Date: May 09, 2018
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of
Tags : 
     Dell EMC
By: MobileIron     Published Date: May 07, 2018
Ready or not, the global mobility trend is forcing enterprises to enable a modern, mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As enterprise users increasingly demand the ability to use their own mobile devices and desktops for modern work, IT is quickly impacted by end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. Considering that smartphone adoption is expected to grow from 1.47 billion devices in 2016 to more than 1.7 billion in 2021, it’s clear that organizations need a comprehensive way to quickly onboard and secure a vast range of employee devices coming into the enterprise.
Tags : endpoint, management, business, workforce, desktop, device, mobile
     MobileIron
By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : byod, strategy, endpoint, management, uem, business, applications, data
     MobileIron
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
     Hewlett Packard Enterprise
By: MobileIron     Published Date: Mar 02, 2018
Enable Business Transformation with MobileIron EMM
Tags : 
     MobileIron
By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
IBM MaaS360 provides unified endpoint management (UEM) across desktops, laptops, tablets, smartphones, and the Internet of Things (IoT).
Tags : internet of things, uem, unified endpoint management, iot
     Group M_IBM Q1'18
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics