and group

Results 301 - 325 of 449Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : mimecast, saas, email archiving, esg
     Mimecast
By: Dell and Intel®     Published Date: Nov 18, 2015
The NCSA Private Sector Program creates a high-performance computing cluster to help corporations overcome critical challenges. Through its Private Sector Program (PSP), NCSA has provided supercomputing, consulting, research, prototyping and development, and production services to more than one-third of the Fortune 50, in manufacturing, oil and gas, finance, retail/wholesale, bio/medical, life sciences, technology and other sectors. “We’re not the typical university supercomputer center, and PSP isn’t a typical group,” Giles says. “Our focus is on helping companies leverage highperformance computing in ways that make them more competitive.”
Tags : 
     Dell and Intel®
By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
     Frontier Communications
By: LogRhythm     Published Date: Aug 08, 2016
It feels as if these folks have been around forever. They started life as a SIEM with a heavy emphasis on log management. Today they are all that plus a solid suite of next-generation attributes. They have many of the attributes of next-gen SIEMs: artificial intelligence, sophisticated log correlation, sophisticated pattern recognition and behavioral analysis. Their strength is, as it always has been, log management. But “log management” has taken on an entirely new dimension with this product. As is absolutely necessary today, it has the intelligence to analyze, correlate and make sense of huge amounts of data.
Tags : security, technology, best practices, information technology, business intelligence
     LogRhythm
By: IBM     Published Date: Nov 04, 2014
Today’s consumers are on the move, and with mobile devices accounting for nearly 20 percent of site sales heading into the 2014 holiday season, creating compelling mobile experiences is no longer just a nice-to-have option. Read this research report from Aberdeen Group to get secrets on how targeted push notifications can generate unprecedented levels of engagement with customers wherever they are. Find out how to make sure every message they receive is relevant—and right on target.
Tags : mobile notifications, mobile apps, mobile consumers, site sales, push notification
     IBM
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Hewlett Packard Enterprise     Published Date: Mar 07, 2017
For decades, lasers and inkjets have dominated workgroup and enterprise printer technology. What are IT pros deploying today? As printer technologies evolve there are new considerations for IT as they strive to meet the increasing demands of both business and IT users.
Tags : 
     Hewlett Packard Enterprise
By: Juniper Networks     Published Date: Jun 22, 2017
Businesses increasingly recognize that their customers and workers are engaging in ways that were inconceivable when their essential applications were first architected, according to Chris Rechtsteiner, vice president of marketing for ServerCentral. “A group in one country has to have the exact same service levels as a location in another country, and half the people are internal end users, while the other half are external customers,” he says. As their businesses have globalized, their most strategic applications have struggled to keep pace. “Companies are coming to us, asking ‘How do we do this? How do we solve this problem?’ That’s really what it comes down to.”
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Cisco     Published Date: Dec 23, 2014
Learn challenges and benefits in this white paper from Enterprise Strategy Group (ESG).
Tags : the cloud, cloud computing, transitioning, it management
     Cisco
By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
     Cisco EMEA
By: OpenText     Published Date: May 23, 2012
Download this report and learn how to: . Monitor, analyze and report on social media content . Manage brand effectiveness . Ensure brand consistency across social media and other marketing channels . Build an effective social compliance program
Tags : brand equity, governance, social media, social compliance, brand consistency, brand effectiveness
     OpenText
By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point, on-demand software, apis, multi-tenant, single-tenant, application service provider, asp, it requirements, core software applications, context software applications, cost allocations, eos, groupware applications
     WebEx
By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
     Group M_IBM Q418
By: Motorola     Published Date: Feb 06, 2008
The need for the services provided by Specially for Children has continued to increase, placing extra demands on the group's physicians. To improve their efficiency, doctors began carrying multiple devices including cell phones, pagers and PDAs. Learn how Good Mobile Messaging helped the organization streamline its operation.
Tags : motorola, motorola good, case study
     Motorola
By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Read this report for details on the current state of succession management.
Tags : succession management, leadership continuity, automation, investment
     SumTotal, a Skillsoft Company
By: Oracle     Published Date: Mar 05, 2015
Business buyers are more demanding than ever. They expect organizations to meet their precise needs through the life-cycle of interactions with B2B brands. This means providing today’s business buyers with consumer like-experiences that allow them to do their job better and easier, and making the complex simple. Download this white paper from Aberdeen Group to learn the five best practices to get B2B e-commerce right and how to achieve best-in-class performance in customer retention, revenue growth, and operational efficiency.
Tags : oracle, b2b, commerce, empowerment, customer, e-commerce, content
     Oracle
By: HireVue     Published Date: May 16, 2018
WHY SO MANY COMPANIES ARE RETHINKING ASSESSMENTS If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates THIS EFFECTIVE SCREENING TOOL HAS UNINTENDED CONSEQUENCES In this eBook, we’ll look at the science behind traditional assessments and why despite sound science, they don’t work for candidates today- and how they can be transformed with video and artificial intelligence.
Tags : 
     HireVue
By: Creekpath     Published Date: Aug 21, 2009
There is a holistic storage-management trend taking place in companies today. IT groups are acknowledging that storage should become part of the network. What businesses are finally seeing is that storage is not an isolated island, or a group of isolated islands, but part of a holistic management domain.
Tags : holistic, storage management, storage, storage operations management, som, it management, systems management, creekpath
     Creekpath
By: IBM     Published Date: Aug 28, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : data storage, data value, ilg, data disposal, data management
     IBM
By: IBM     Published Date: Oct 22, 2014
Not storing data is cheaper than storing it. As enterprise data continues to grow and IT budgets remain flat, organizations need to more effectively maximize existing storage capacity and manage storage spend based on data value. In this white paper, Enterprise Strategy Group Sr. Analyst Mark Peters demonstrates how IBM's Information Lifecycle Governance solutions can help IT buyers improve the information economics for their organizations by curtailing data growth through defensible disposal of data.
Tags : data storage, big data, data disposal, data value, it management, data management
     IBM
By: Citrix ShareFile     Published Date: Nov 09, 2016
How are small and medium businesses (SMBs) thinking about and adapting to create a smarter, more agile workforce? SMB Group recently surveyed 730 SMB decision-makers via our 2016 Small and Medium Business Communication, Collaboration & Mobility Study to find out.
Tags : networking, software development, it management, enterprise applications, data management, it career advancement
     Citrix ShareFile
By: SugarCRM     Published Date: Jan 27, 2014
What if you could give everyone that touches customers an indispensable tool that optimizes business process, removes data silos and makes customer interaction extraordinary? See how Redglaze Group uses Sugar to give individuals access to critical data, optimize processes and improve efficiencies.
Tags : crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management
     SugarCRM
By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: ServiceNow     Published Date: Nov 07, 2019
For businesses that want to transform, modernizing ITSM is a step in the right direction. Five leading brands—SAP SuccessFactors, Experian, Group Health (Kaiser Permanente Washington), Al Jazeera Media Network, and Royal Bank of Scotland—made that move, and they aren’t looking back. Read this ebook.
Tags : 
     ServiceNow
By: Lieberman Software     Published Date: Mar 27, 2012
When Carnegie Mellon University required a way to automatically update and securely store privileged account passwords, the IT group turned to Lieberman Software. Lieberman's Enterprise Random Password Manager was operational in less than one day.
Tags : privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security, security
     Lieberman Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com