lease

Results 251 - 275 of 443Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 24, 2012
Progressive retailers have shifted to integrated store lifecycle (SLM) systems enabled by Integrated Workplace Management System (IWMS) to provide a seamless integration of all phases of the entire real estate lifecycle process from market planning; through site selection, store design and construction; to day-to-day operations such as lease administration and facility management.
Tags : ibm, lease, lifecycle management, retail, real estate
     IBM
By: IBM     Published Date: Apr 24, 2012
Get the latest research on how the new lease accounting standard affects your company. Find out what 179 senior executives think about the new lease accounting standard and how it will impact their companies. Read this comprehensive analyst report to learn more.
Tags : ibm, lease, lease accounting standard, project management, operations
     IBM
By: Experian QAS     Published Date: Aug 09, 2012
Experian® and Moody's Analytics® just released their quarterly report on small businesses and the results provided deep insight into the future of the U.S. economy. To understand how your business may be impacted, download the full report for free today!
Tags : small business, experian, moody analytics, business analytics, economy, marketing
     Experian QAS
By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : mssps, managed security service, security challenges, security professionals, security, it management, enterprise applications
     SilverSky
By: VMTurbo     Published Date: Jul 08, 2015
This E-Book covers a brief history of the OpenStack cloud operating system, its releases and projects, significant enterprise adoptions, and the function and contributions VMTurbo.
Tags : cloud strategy, cloud operating systems, enterprise adoption, database management, business integration, web interface, application management, software licensing
     VMTurbo
By: Polycom     Published Date: Apr 30, 2013
In December 2012, Wainhouse Research (WR) and Polycom jointly created and fielded a WR-branded survey focused on the benefits that organizations realize via the use of video conferencing. Invitations to participate in the survey were released in numerous ways including: - Via email invites to a list of Polycom end-user contacts - Via email invites to a list of WR end-user contacts - Via clickable banners on numerous websites This document provides a top-level view of the survey data, along with some additional findings and observations.
Tags : video conferencing, telepresence, end-user, video conferencing, video collaboration
     Polycom
By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : ema, vss, 100g, visibility solutions, nvc, npb, it management
     VSS Monitoring
By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : cloud, computing, on-demand, management, interaction, network, access, configurable
     HP
By: Quark Software     Published Date: Mar 19, 2015
With the proliferation of customer experience initiatives, content marketing and an increasing need to fulfill content delivery on mobile devices, digital publishing has now become an important component of the digital toolbox for every organization. Research firm InfoTrends recently released the 2015 Digital Publication Platform Market Overview, which finds that: • Over 90% of enterprises are moving towards electronic documentation. • The digital publishing platform landscape is made up of approximately 60 to 80 main companies, but is dominated by a few vendors that can be considered influencers. • The digital publishing platform market will grow by a 25% CAGR (compound annual growth rate) over the next five years. Learn more about the market, solution providers and take a look at the future of digital publishing in the InfoTrends Digital Publication Platform Market Report.
Tags : digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing
     Quark Software
By: Equinix     Published Date: Jul 13, 2015
We're Equinix. We run global data centers that protect, connect and power the digital economy. This eBook is all about improving network performance. In it, we'll take a quick look at the current state of the information-driven world and the growing demands on enterprise networks. Then you'll learn about Equinix Performance Hub and the ways you can leverage it to optimize and future-proof your network. You'll pick up some tips and trends along the way, and we'll give you the opportunity to explore more links in each section, such as videos and analyst papers. So go ahead and dig in.
Tags : enterprise network, data centers, network performance, information-driven world, data management
     Equinix
By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
     MobileIron
By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : technology, security, best practices, solutions, network management, detection, protection
     Cyphort
By: Cambium Networks     Published Date: Oct 03, 2016
Cambium Networks’ fixed wireless broadband solutions provide an attractive ROI for electric utilities when replacing leased-lines for: Redundant backbone IP network rings Smart meter and distribution automation aggregation transport Transport for substation and distribution SCADA data Remote office connectivity Mobile WiFi connectivity in substations and operation centers Download this white paper to learn more.
Tags : wireless broadband, roi, mobile wi-fi connectivity, smart meter
     Cambium Networks
By: CrowdStrike     Published Date: Jun 06, 2018
Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where noexecutable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
     CrowdStrike
By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2B Commerce Suites, Q3 2018 report. Forrester evaluated the 12 most significant B2B commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and [SAP] C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength, fully functional commerce platform.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
     Google - SAP
By: Google - SAP     Published Date: Jun 20, 2019
SAP has been recognized as a leader in The Forrester Wave: B2C Commerce Suites, Q3 2018 report. Forrester evaluated the 11 most significant B2C commerce suite providers. According to the report, “SAP Commerce Cloud delivers a full featured suite that leverages the strengths of the SAP ecosystem and integration with the SAP S/4HANA and SAP C/4HANA applications.” The report also notes that “SAP Commerce Cloud is a best fit for companies looking for an industrial-strength full function commerce platform that is in wide use across several industry verticals.” Deliver personalized digital commerce experiences with SAP Customer Experience. For more details on the Wave evaluation, please download the complimentary copy of the report.
Tags : 
     Google - SAP
By: Oracle     Published Date: Feb 10, 2016
In every company, today's ideas determine tomorrow's market profile. With rising competition, success can be achieved through a well-defined innovation process--one that connects upstream idea valuation to downstream production and release-to-market. To accomplish this, companies need to take a holistic approach to innovation management, connecting the process throughout all phases of the innovation lifecycle.
Tags : oracle, innovation management, best practices, holistic process, innovation process, innovation lifecycle, it management, data management
     Oracle
By: Epsilon     Published Date: Jun 22, 2012
Epsilon and the Direct Marketing Association's Email Experience Council released the Q1 2012 North America Email Trends and Benchmarks which show a steady increase in open rates over both Q4 2011 and Q1 2011.
Tags : epsilon, marketing, email marketing, marketing trends, email trends
     Epsilon
By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
     Centrify Corporation
By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
     Mimecast
By: MoreVisibility     Published Date: Dec 19, 2017
Google has recently released several new products. One of the best visualization tools to hit the market is Google Data Studio. Not only is this product free to all Google Accounts, it’s a great way to visualize your data into a comprehensive report for your business. Here, we will highlight 5 reasons why you should be leveraging Google Data Studio to enhance your reporting.
Tags : 
     MoreVisibility
By: Kaseya     Published Date: Feb 16, 2011
The goal for this suite is to give you ITIL in a box. This release includes Incident Management, Service Request Management, Problem Management and Change Management.
Tags : kaseya, itil, incident management, service request management, problem management, change management, service desk
     Kaseya
By: SugarCRM     Published Date: Jan 17, 2014
The latest release of SugarCRM’s flagship product gives users new tools to build extraordinary customer relationships. Read an in-depth analysis of SugarCRM’s enhanced ability to help companies execute their customer-facing initiatives from Ovum, a leading technology research firm.
Tags : swot assessment, sugarcrm, catalyst, software, crm, sugarcrm v7, relationship management, customer relationship
     SugarCRM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com