end users

Results 1 - 25 of 495Sort Results By: Published Date | Title | Company Name
By: Dell and Intel®     Published Date: Nov 18, 2015
Unleash the extreme performance and scalability of the Lustre® parallel file system for high performance computing (HPC) workloads, including technical ‘big data’ applications common within today’s enterprises. The Dell Storage for HPC with Intel® Enterprise Edition (EE) for Lustre Solution allows end-users that need the benefits of large–scale, high bandwidth storage to tap the power and scalability of Lustre, with its simplified installation, configuration, and management features that are backed by Dell and Intel®.
Tags : 
     Dell and Intel®
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
     Cisco Umbrella EMEA
By: ConnectWise     Published Date: Aug 22, 2019
At the end of the day, monitoring is all about finding problems before they cause issues for your users, and managing expectations when problems do crop up. Once critical and basic coverage is handled, start monitoring devices to keep everything tied together. If a switch, router, or hub goes down, or a printer starts having issues, you’ll know before the complaints start rolling in. When you automate recurring processes or tasks, your team can focus on delivering value instead of putting out fires.
Tags : 
     ConnectWise
By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
     Flexential
By: MicroStrategy     Published Date: Aug 28, 2019
Over the last decade, the enterprise analytics landscape has dramatically transformed. Vendors have come and gone, and platforms have continually expanded their offerings to include new functionality and keep pace with the demands of the businesses they serve. Originally envisioned as an IT-centric tool for enterprise reporting, analytics today has evolved into a business solution—empowering a range of users across every line of business, including front-line employees, field personnel, and executives. The rise of self-service analytics over the past decade has played a key role in promoting a data-driven mindset within every business function. However, this practice is limited to a skilled few. The vast majority of business professionals lack the time, analytical skills, or inclination to conduct their own analyses, and fail to effectively use analytics on a day-to-day basis. The result? Despite decades of investments, BI adoption at most organizations remains at 30%. The failure of e
Tags : 
     MicroStrategy
By: MicroStrategy     Published Date: Aug 29, 2019
Dresner Advisory Services’ eighth annual Cloud Computing and Business Intelligence Market Study in 2019 shows user confidence at an all-time high, with cloud offerings outnumbering traditional on-premises offerings. Sentiment toward cloud and cloud BI turned sharply positive in 2018, with current and future user plans both trending up. Results from our 2019 Dresner Advisory Services New Year User Survey reinforced those findings with ongoing momentum. Sentiment is at an all-time high, and the majority of organizations—51 percent—use cloud BI in 2019. Cloud-based BI vendor products and services are now more plentiful than traditional onpremises products. Still, vendors support any deployment option the customer chooses: public, private, or hybrid, at multiple levels of scale and price. Customers benefit from these choices, which reduce the chance for vendor lock-in. Users have not settled on deployment models but are migrating toward subscription and the adoption of managed services. Ou
Tags : 
     MicroStrategy
By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
     Velaro
By: VMware SD-WAN by VeloCloud     Published Date: Aug 01, 2019
VMware named a Leader, positioned furthest for its Completeness of Vision. Read this complimentary copy of the 2018 Gartner Magic Quadrant for WAN Edge Infrastructure to find out more. *Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including and warranties of merchantability or fitness for a particular purpose.
Tags : 
     VMware SD-WAN by VeloCloud
By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
     123Together
By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
     SAP
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
     Windstream
By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
     Windstream
By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
     Cisco
By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
     Windstream
By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
     Windstream
By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
Discover the transformational power of intelligent storage. A company’s competitive success depends greatly on how well it harnesses the value of its data. However, it can be challenging to keep pace with the increases in the scale of data being generated, as well as users’ demands for accessibility. Additionally, maximizing the value of digital information requires data to be leveraged at both the optimal time and the optimal place. With HPE’s intelligent storage portfolio, organizations can modernize their IT to better understand their customers, run more agile IT functions, and improve logistical operations.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
Discover the transformational power of intelligent storage. A company’s competitive success depends greatly on how well it harnesses the value of its data. However, it can be challenging to keep pace with the increases in the scale of data being generated, as well as users’ demands for accessibility. Additionally, maximizing the value of digital information requires data to be leveraged at both the optimal time and the optimal place. With HPE’s intelligent storage portfolio, organizations can modernize their IT to better understand their customers, run more agile IT functions, and improve logistical operations.
Tags : 
     Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com