assessing

Results 1 - 25 of 138Sort Results By: Published Date | Title | Company Name
By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage, it management, data management, data center
     Intel Corp.
By: IBM     Published Date: May 05, 2016
Join this webinar to get a deep dive into the Customer Experience in Retail and to hear how retailers are performing across multiple dimensions. See the results from the Customer Experience Index Survey, assessing more than 550 retailers in 23 countries. The Customer Experience Index Survey findings: - Explore how retailers are creating differentiated brand experiences for their customers across channels - Provide a benchmark for your brand experience in terms of capability, coverage and compliance. - Assess your aptitude for responding with relevance and speed to the priorities that matter most to your customers
Tags : ibm, retail, customer experience, customer experience survey
     IBM
By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
     NAVEX Global
By: Citrix Systems     Published Date: Feb 14, 2019
"Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: 1. Ensure end-to-end network visibility for your operations 2. Gain real-time analytics for application optimization and uptime 3. Scale your application infrastructure according to workload demand Read the e-book today to find out all six must-haves for application delivery in the cloud."
Tags : 
     Citrix Systems
By: RingCentral     Published Date: May 22, 2014
The Cloud; software as service across the Internet, is experiencing mass proliferation for everything from banking to CRM. Communications are part of this migration and offer a compelling solution over the retro, hardware-based systems known as PBX. This paper illustrates comparative anatomies of the old and new models. Major benefits of cloud communications are detailed, including the elimination of costs, removal of complexity for managing the system, alleviating IT resources, and the benefits of one system with a host of features. A deep-dive of the technology supporting the solution is included.
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes, voip, enterprise applications, data center
     RingCentral
By: RingCentral     Published Date: Nov 10, 2015
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : ringcentral, network, cloud, voip, wireless, security, data center
     RingCentral
By: Ring Central     Published Date: Mar 21, 2016
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : ring central, cloud phone service, communications, network, cloud, enterprise applications
     Ring Central
By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : best practices, risk management, foreign corrupt practice act, technology, business management
     IBM
By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad, design/simulation council, product value management, software level modeling, model-driven systems, automotive trends, sysml, csrs, mechatronics, enterprise applications
     IBM
By: Staples     Published Date: May 24, 2016
It’s a business reality: Companies are always looking to trim costs, and IT budgets are no exception. In your next deep dive, don’t overlook printing expenses. By assessing your existing infrastructure and processes through a managed print services (MPS) program, you can lower your total cost of ownership by 15 to 30 percent. Learn more by reading this white paper from Staples Business Advantage.
Tags : managed print services, print costs
     Staples
By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : veracode, application security, sans, security, enterprise applications
     Veracode
By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn how Crimson Hexagon developed a framework for measuring advertising effectiveness by analyzing the online conversations surrounding Target's major Black Friday ad campaigns in 2011 and 2012.
Tags : campaign effectiveness, ad campaign effectiveness, online conversation, ad agencies, ad appraisal
     Crimson Hexagon
By: Adobe     Published Date: Mar 05, 2014
Adobe has an exceptional understanding of, and a vision for, campaign management technology. We’ve drawn from our experience to create this document to help you better differentiate the myriad of solutions on the market. This guide provides a comprehensive list of questions and criteria to help companies evaluate campaign management solutions
Tags : adobe, technology, marketing, cmo, campaign management, customer, data, solutions, strategy, analytics
     Adobe
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have b
Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage
     HP and Intel® Xeon® processor
By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : druva, blue hill, enterprise, archive, data, user data, security, enterprise applications
     Druva
By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: Sep 26, 2017
Analyst paper outlining storage challenges, and the value of the all-flash data center as a means to achieving maximum business value from data and app performance. Includes tips for gaining support from business leaders.
Tags : 
     Hewlett Packard Enterprise
By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. To find out more download this whitepaper today.
Tags : 
     Hewlett Packard Enterprise
By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : ibm, network management, networking, green, green computing, green datacenter, green data center, data center, environmental
     IBM
By: Oracle Corp.     Published Date: Oct 15, 2012
Download this assessment of Oracle Database Appliance from Nucleus Research, to discover the various compelling features of the appliance.
Tags : database appliance, sql, high availability, oracle
     Oracle Corp.
By: Adobe     Published Date: Feb 08, 2016
These days, email is the glue that ties your customers’ identity together across channels.
Tags : adobe, email, marketing, strategy, roi, cross channel, enterprise applications
     Adobe
By: AWS     Published Date: Jun 15, 2016
If cloud architectures were human beings, their development stage would fall squarely in the middle of adolescence. Enterprises are at an inflection point with their cloud deployments as they migrate from ad hoc projects to full-fledged, mature, integrated cloud architectures. The discussion around cloud reflects the trepidation and uncertainty that come with adolescence: Cloud advocates express excitement, whereas others voice concern about these developments.
Tags : 
     AWS
By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security, storage
     Symantec
By: Symantec     Published Date: Feb 07, 2013
This whitepaper discusses what to look for in a virtualization protection solution and then considers the merits of a separate solution for protecting one’s virtual environment.
Tags : symantec, virtual backup, virtual protection, data protection, backup server, unfied solutions
     Symantec
Start   Previous   1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com