integral

Results 1 - 25 of 94Sort Results By: Published Date | Title | Company Name
By: Aberdeen Group     Published Date: Sep 11, 2012
This book helps put the private cloud model of computing into perspective for both businesses and technical leaders, providing valuable insight on how to make cloud computing an integral part of your business.
Tags : cloud, computing, aberdeen, technology, ibm, cloud, private cloud, business
     Aberdeen Group
By: Aberdeen-IBM     Published Date: Sep 12, 2012
This book helps put the private cloud model of computing into perspective for both businesses and technical leaders, providing valuable insight on how to make cloud computing an integral part of your business and more.
Tags : cloud, computing, aberdeen, technology, ibm, cloud, private cloud, business
     Aberdeen-IBM
By: Adobe     Published Date: Mar 06, 2015
Responsive web design is an integral part of customer engagement in our multi-device world. But the additional costs and resources can be hard to justify for budget holders demanding proof of ROI.
Tags : responsive web design, customer engagement, roi, adobe
     Adobe
By: Adobe     Published Date: Apr 30, 2015
Responsive web design is an integral part of customer engagement in our multi-device world. But the additional costs and resources can be hard to justify for budget holders demanding proof of ROI.
Tags : adobe, application development, delivery, roi, digital investments, responsive web design
     Adobe
By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml
     Alt-N Technologies
By: Aquire     Published Date: Oct 07, 2011
Gain a clear understanding of what workforce analytics are and how they are integral for strategic planning to support your company's overall strategies from the creators of Human Resource Executive's 2010 Top Product, Aquire InSight.
Tags : workforce analytics, aquire, aquire insight, workforce analytics software, hr reports, hr metrics, hr trends, hr dashboard
     Aquire
By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
     AT&T
By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
     AT&T
By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
     BlackBerry
By: Blackberry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
     Blackberry
By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
     BlueCat
By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : documents, workflows, business process, document management
     Brother
By: Business.com     Published Date: Oct 09, 2012
Credit cards are an integral part of modern business. Even customers who don't use credit will want to use debit or gift cards based around similar technology.
Tags : credit card, processing, credit card terminal, business technology
     Business.com
By: Cisco     Published Date: Dec 21, 2016
Across organizations from all sectors, the network is becoming more integral to daily operations. This is acutely felt by public sector organizations in the United States, namely federal, state, and local governmental organizations. Public sector organizations contend with the challenge of ensuring the security of highly sensitive data on the network in the midst of uncertain budgets and, in many cases, outdated infrastructure. At the same time, many public sector organizations grapple with a complex web of compliance protocols that must be supported on the network. This Analyst Connection explores the need for network infrastructure upgrades that include "foundational security."
Tags : 
     Cisco
By: Cisco Umbrella EMEA     Published Date: Aug 09, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
     Cisco Umbrella EMEA
By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : customer centric messaging, clickatell, standard bank
     Clickatell
By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
     Damballa
By: Dell EMC     Published Date: May 09, 2019
Now more than ever, IT technologists need to take control of PC infrastructure costs while deploying secure and manageable client solutions for their end users. With all the options available, how can IT pros position the right PC lifecycle solutions with management to make IT deployment, maintenance and continuous modernization simple? Download this interactive eGuide, brought to you by Dell and Intel® to learn more about ways to support today’s modern PCs with unparalleled efficiency, treating PC acquisition, usage and retirement as an integral part of IT and business operations.
Tags : 
     Dell EMC
By: Delphix     Published Date: Jun 27, 2014
Companies too often overlook the business gains a better archiving strategy can deliver, from enabling access to and preservation of critical data to more easily complying with regulations. Download this white paper to learn how Delphix can be an intregal part of ensuring your archiving strategy actually enables your business.
Tags : regulation, legal hold and delivery, integral, archiving strategy, networking, it management, data management
     Delphix
By: Domino Data Lab     Published Date: Feb 08, 2019
A data science platform is where all data science work takes place and acts as the system of record for predictive models. While a few leading model-driven businesses have made the data science platform an integral part of their enterprise architecture, most companies are still trying to understand what a data science platform is and how it fits into their architecture. Data science is unlike other technical disciplines, and models are not like software or data. Therefore, a data science platform requires a different type of technology platform. This document provides IT leaders with the top 10 questions to ask of data science platforms to ensure the platform handles the uniqueness of data science work.
Tags : 
     Domino Data Lab
By: Epicor     Published Date: Nov 18, 2015
It’s no secret that mobile devices are now integral to our working lives, replacing the traditional desk as we do more of our work on the move or from home.
Tags : epicor, mobile, device, competitive advantage, data management
     Epicor
By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
     Equinix EMEA
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of joint solutions including their Maximum Availability Architecture (MAA). By taking advantage of F5’s Application Ready Network for Oracle Application Server 10g, an integral part of Oracle Fusion Middleware, organizations can achieve an secure and optimized platform for delivering Oracle applications across the LAN and WAN.
Tags : application ready network guide, application server, oracle, maximum availability architecture, internet-enabled enterprise software, application delivery networking, oracle applications, networking
     F5 Networks Inc
By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
     GFI
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com