abs

Results 301 - 325 of 505Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : messagelabs, symantec hosted services, embedded links, worm, security, malware
     Symantec.cloud
By: Skillsoft     Published Date: Oct 20, 2015
SumTotal Systems, a Skillsoft company, delivers the SumTotal Work suite of solutions that provides time and attendance, scheduling, absence and leave management, and payroll data processing.
Tags : skillsoft, sumtotal, workforce management, wfm data, payroll processing, human capital management
     Skillsoft
By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business.
Tags : healthcare, patient experience, sd-wan
     VMware SD-WAN by VeloCloud
By: Nokia     Published Date: Aug 04, 2016
This paper presents the value of an enterprise POL based on a Bell Labs economic analysis. It examines the financial benefits of an optical network compared to traditional copper-based Ethernet architectures. Also discussed in this white paper is why a POL provides the most cost-effective option to meet the gigabit speed networking challenges of a future digital enterprise.
Tags : passive optical lan, copper-based ethernet, communications requirements, ethernet architecture, gigabit speed networking, digital enterprise
     Nokia
By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
     Frontier Communications
By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : cloud networking, wan, network services, application performance, technology
     Riverbed DE
By: Interactive Intelligence     Published Date: Apr 23, 2014
If a contact center executive could have anything, it would be certainty… of contact demand, resource availability, operational efficiency, and of agent performance and customer experience delivery. But certainty in a contact center is nearly impossible, and in the absence of a crystal ball, mathematical models provide the next best thing. They alert, evaluate operational risk, and propose business and resourcing solutions. And now, the best of these models also determine expected experience delivery.
Tags : interactive intelligence, contact center, customer service, customer experience, cost, revenue, telecom, it management
     Interactive Intelligence
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing
Tags : evaluator, group, storeonce, b5200, backup, lab, validation, paper
     HP and Intel® Xeon® processor
By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software
     Absolute Software
By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : endpoint protection stategy, byod, workforce mobility, absolute software, own device
     Absolute Software
By: IBM     Published Date: Feb 25, 2008
Enterprise Strategy Group (ESG) Labs performed a hands-on analysis of IBM's System Storage SAN Volume Controller storage virtualization solution in order to validate its value proposition to customers. ESG Labs found that SAN Volume Controller is a rock-solid, feature-rich platform that delivers on the promise of network based storage virtualization: reducing the complexity and cost of managing SAN attached storage.
Tags : hardware, ibm, san volume controller, roi, storage, storage management, storage virtualization, virtualization
     IBM
By: 6th Sense Analytics     Published Date: Sep 17, 2007
During this podcast, you’ll hear from Thomas Koulopoulos, founder of Delphi Group, managing director of Perot Systems Innovation Labs, and author of Smartsourcing. A widely recognized authority on IT, innovation and the globalization of business, Tom was named one of the industry’s six most influential consultants by InformationWeek magazine.
Tags : offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management
     6th Sense Analytics
By: Sophos     Published Date: Mar 26, 2013
Our experts at SophosLabs look in depth at ransomware variants and delivery mechanisms, and show how you can protect your data with a complete security strategy.
Tags : ransomware, sophos, data, protect, security, strategy
     Sophos
By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : digital skills, culture, strategy, data management, processing, technology, ux design
     Adobe
By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : sap, business, managing, finances, performance, performance management
     SAP
By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : epp, endpoint, protection, threats, malware, nss
     McAfee
By: VMTurbo     Published Date: Feb 11, 2014
Moving beyond monitoring, alerting and reporting to deliver an automated control system for today's virtualized data centers.
Tags : vmturbo, sizing up, operations management, virtual infrastructure, it operations, analytic engine, decision-making process, storage infrastructure
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
     VMTurbo
By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, enterprise applications, data center
     VMTurbo
By: Avaya     Published Date: Jun 15, 2016
Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more.
Tags : avaya, healthcare, case studies
     Avaya
By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
     Flexera
By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
     LogRhythm
By: 8x8 Inc.     Published Date: Feb 24, 2017
Before moving to 8x8, MOBI had a premises-based telephone and contact center system. “We had a lot of points of failure inside of our building. And because our help desk and contact center is so critical we absolutely had to do something about it.” Mobi wanted one system to handle all interactions with their customers, primarily phone calls and instant messaging. According to Mobi, “What stood out about 8x8 was that everything was managed under one roof.” Mobi has been able to achieve this with 8x8’s integrated Virtual Office and Virtual Contact Center solutions.
Tags : 8x8, mobi, webinar, contact center, customer interaction
     8x8 Inc.
By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : endpoint attack, endpoint protection, security, nss
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : data center, networking
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com