broad

Results 426 - 450 of 619Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : citrix, mobile. mobilizing, windows applications, microsoft windows, it management
     Citrix Systems
By: Jive Software     Published Date: Feb 24, 2014
Providing healthcare is a global, multi-level proposition that transcends single providers. The stakeholders in Cerner’s world are not only clinicians, hospitals, and medical device partners but another whole world of consultants, researchers, and industry experts. Cerner leverages Jive Social Business Software to address a number of their key social business imperatives, including accelerating innovation and providing community-based support. They put Jive to work not only to make their own business operations more productive but to connect priorities and people outside of Cerner to solve broad healthcare issues for the greater good.
Tags : jive, cerner, healthcare technology, social business software, collaboration, social networking platform, software solutions, workforce management, it management
     Jive Software
By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience, customer satisfaction, the cloud, cloud center, cloud contact center, best practices, actionable tactics, collaboration technology, integration, change management, command and control, information age, distance barriers
     Avaya
By: IBM     Published Date: Jan 09, 2014
In this Research Report, Clabby Analytics takes a closer look at IBM’s Flex System converged architecture. The new Flex System’s advanced blade offering shines compared to its closest rival: traditional blade architecture. Flex System offers superior manageability, faster communications, more storage capacity (using up to eight internal solid state drives [SSDs] per compute node) and better storage management — as well as broader/better physical/virtual system management — than all of today’s leading blade competitors.
Tags : clabby analytics, ibm, flex system, architecture, blade architecture, puresystems, pureflex, virtualization
     IBM
By: Red Hat     Published Date: Jan 08, 2014
OpenStack is an open source cloud system software project that has broad participation from the IT Industry. IDC evaluates the current situation and provides a future outlook evaluating the deployment and support model and addressing OpenStack enterprise features and support.
Tags : idc, openstack, red hat, virtualization, cloud, cloud, cloud software, storage, networking, integration, infrastructure
     Red Hat
By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : collaborative consulting, creating opportunities, driving disruption, social, mobile, analytics, cloud, infrastructure, elastic computing capacity, cloud computing, social network, mobile web, wireless data networks, drive change
     Collaborative Consulting
By: Commdex     Published Date: Nov 18, 2013
Commdex will provide tips for how FirstNet Can Deploy a National Public Safety Broadband Network - Quickly and Cost Effectively.
Tags : 
     Commdex
By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : risk, compliance, audit, risk management, cyber security, fraud
     CEB
By: RSA Security     Published Date: Nov 06, 2013
This paper discusses the value of operational technologies while acknlowledging there is a "value ceiling" for some niche tools, highlighting the opportunity to seek broader value as part of the GRC program maturity process.
Tags : grc, risk, compliance, technology, best practices, archer, rsa, security, it management
     RSA Security
By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : talent risks, talent issues, talent management, development roi
     CEB
By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers, trends and information, buying behaviors, key performance indicators, revenue performance, drive exceptional results
     ServiceSource
By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support, email support, remote pc access software, remote desktop connection, remote computer support, customer support channels
     LogMeIn Rescue
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
     IBM
By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
     IBM
By: CompHealth     Published Date: Oct 10, 2013
Employee engagement is a very broad area. In this white paper, we focus on ways engagement can affect your performance, the performance of your team and the way you feel about your job.
Tags : 
     CompHealth
By: Virgin Pulse     Published Date: Oct 03, 2013
Launching an employee wellness program and watching it take flight doesn't always mean you'll knock it out of the park. To have a measurable impact on health and well-being — and boost the bottom line — you need to sustain engagement for years. You also need to broaden your focus beyond just physical wellness. Download this paper to learn how you can have healthier, happier, more productive employees, and lower healthcare costs.
Tags : employee wellness, employee wellness program, sustained engagement, employee behavior
     Virgin Pulse
By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Ifbyphone, Inc.     Published Date: Sep 24, 2013
Voice broadcasting is more than a simple recorded phone message; Download this white paper to learn how marketing and sales professionals are using intelligence voice broadcasting to cut costs, save time and generate leads and revenue.
Tags : intelligent voice broadcasting, voice broadcasting, voice-based marketing automation
     Ifbyphone, Inc.
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: LogMeIn     Published Date: Sep 04, 2013
Organizations are implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals. Click here to find out how.
Tags : service and support, customer support, imperative, technologies, online support, remote support, evolution of support, technical support, logmein, rescue
     LogMeIn
By: IBM     Published Date: Aug 21, 2013
In many enterprises, marketing is a multichannel effort that includes a wide range of touch points. The touch points range from websites and email promotions to traditional print advertising, postal mail, and broadcast, and direct sales by phone and in-person sales teams. But too often, each channel works independently, accountable to its own objectives, unaware of the efforts and results made within other marketing channels. As a result, call centers speak to customers without knowing the offers the customers previously accepted or rejected. In addition, emails launch without reference to online promotions and websites present messages that disregard their visitors’ previous contact history.
Tags : cross channel marketing, customer communications, interactive marketing, multi-channel marketing, sales, multichannel, communications, email marketing, customer relationship management, crm
     IBM
By: BlueCat     Published Date: Aug 20, 2013
To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.
Tags : device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management, network intelligence, ip networks, network management
     BlueCat
By: Wheelhouse     Published Date: Aug 09, 2013
Business telephony is changing more rapidly than ever before. Several developments are driving this accelerating change. They range from targeted technical initiatives to broad communication technology trends. If keeping your business communication strategy up to date seems difficult now, it will become much more so in the future. It is also important to stay abreast of – or ahead of – the latest developments; if you don’t, you’ll find yourself with a seriously outdated communication system. And that could put you at a competitive disadvantage.
Tags : communications, strategy, future-proofing, telephony
     Wheelhouse
By: IBM     Published Date: Jul 31, 2013
The IBM® DevOps solution offers a new approach to traditional application lifecycle management (ALM) that can help businesses achieve sustained innovation. Broadening the scope of software development and delivery beyond a business's technology.
Tags : ibm, devops solution, software delivery
     IBM
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com