series

Results 301 - 325 of 484Sort Results By: Published Date | Title | Company Name
By: GoToWebinar     Published Date: Aug 02, 2011
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToWebinar
By: IBM     Published Date: Nov 07, 2012
This is a series of 5 papers giving an Industry POV for analytics (Banking, Insurance, Government, Telecommunications, Retail). These papers extends from Smarter Computing Industry papers with a deeper look at analytics.
Tags : retail, ibm, smarter analytics, performance, customer insight
     IBM
By: Aria Systems     Published Date: Jan 28, 2015
At Aria Systems we spend a lot of time thinking about the ways in which our technology contributes to businesses seeking to capitalize on the ever-changing ways to engage with customers. Our collective interest in the IoT and its organic overlay with a long list of monetization models should be self-evident if you’ve been reading this Internet of Things anthology series. As We embarked upon this e?ort it quickly became obvious that it would be a disservice to our readers not to elevate our thinking. We needed to go beyond what was strictly relevant to the IoT’s capacity for monetization and include perspectives that looked at the IoT from other angles.
Tags : capitalization, monetization models, organic overlay, iot, it management, enterprise applications
     Aria Systems
By: TIBCO     Published Date: May 15, 2013
•Big Data + Integration •Integration In the Age of The Customer •Impact of Mobile
Tags : big data, architecture, mobile, integration, customer, webinar
     TIBCO
By: Jobvite     Published Date: Sep 24, 2013
Optimizing Your Referral Program is an essential guide for anyone who is interested in implementing a new referral program—or for those with existing programs that are looking to improve their success rates.
Tags : 
     Jobvite
By: Cisco     Published Date: Jan 16, 2014
Miercom Lab Testing Summary Report
Tags : cisco, miercom lab, asa 5500-x series, adaptive security appliances, check point 4210, security
     Cisco
By: Kenshoo     Published Date: Oct 30, 2012
Kenshoo Global Search Advertising Trends is the first in a new series of reports reflecting aggregate campaign data across search engines like Google, Yahoo!, Bing, and Baidu. Read on to learn about paid search trends by search engines and more.
Tags : kenshoo, global search trends, search engines, search, enterprise search
     Kenshoo
By: BlackBerry Cylance     Published Date: Apr 26, 2019
The Sydney Opera House is one of the world’s busiest performing arts centers and Australia’s number one tourist destination. Each year, it attracts more than 8.2 million visitors on site and stages more than 2,000 performances attended by over 1.5 million people. Since opening its doors in 1973, the Opera House has become the symbol of modern Australia and the country’s premier tourist destination, with an iconic national-identity value that Deloitte Access Economics has estimated at $4.6 billion. On the Opera House’s 40th anniversary, it embarked on a Decade of Renewal, a series of projects to prepare the Opera House for future generations of artists, audiences, and visitors. Because renewal isn’t just about the building and the arts; it’s also about renewing technology and systems. This enabled the Opera House to engage VMtech and BlackBerry Cylance to modernize its IT server and network infrastructure, as well as information management, privacy, and cybersecurity.
Tags : 
     BlackBerry Cylance
By: Schneider Electric     Published Date: Jun 04, 2014
Business executives are challenging their IT staffs to convert data centers from cost centers into producers of business value. Data centers can make a significant impact to the bottom line by enabling the business to respond more quickly to market demands. This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery.
Tags : schneider, electric, data, infrastructure, convert data, business value, it management, data management, data center
     Schneider Electric
By: WebEx Communications     Published Date: Dec 14, 2007
As support centers have deployed this new generation of remote support solutions, they have developed a series of best practices for maximizing their benefits. Based on market research performed from 2004 to 2007, this white paper summarizes these best practices, illustrates the benefits, and suggests considerations for selecting the remote access solution that will be most effective for your support organization.
Tags : remote access, remote support, customer service, help desk, productivity, customer satisfaction, webex
     WebEx Communications
By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection, data transmission, secure file transfer, file transfer, globalscape, security
     GlobalSCAPE
By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
     Mentor Graphics
By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
     McAfee Inc
By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
     McAfee Inc
By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security
     McAfee Inc
By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection
     McAfee Inc
By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, hackers, security, data protection
     McAfee Inc
By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
     McAfee Inc
By: SAS     Published Date: Jul 02, 2012
Insights from a webinar in the Applying Business Analytics Webinar Series
Tags : kelley blue book, analytics, shawn husman, sas, enterprise analytics
     SAS
By: SAS     Published Date: Jul 02, 2012
Insights from a webinar in the 2012 SMB Quarterly Webinar Series
Tags : truecar, sas, research
     SAS
By: SAS     Published Date: Sep 13, 2013
Insights from a webinar in the Applying Business Analytics webinar series.
Tags : sas, big data, big data quality, data, terabytes, petabytes, exabytes, software development
     SAS
By: SAS     Published Date: Sep 13, 2013
Insights from a webinar in the Applying Business Analytics Webinar Series
Tags : sas, hadoop, big data, software framework, webinar, business analytics webinar series, software development, it management
     SAS
By: Taleo     Published Date: Feb 01, 2012
This paper is the second in a five part series that explores the role of business leaders in driving talent management functions and the specific tools and approaches that will make them successful.
Tags : 
     Taleo
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com