independent

Results 276 - 300 of 304Sort Results By: Published Date | Title | Company Name
Published By: Motorola, Inc.     Published Date: Mar 10, 2009
Enterprise mobility has emerged as a top strategic initiative among leading global organizations. To benchmark the current state of Enterprise Mobility adoption, Motorola’s Enterprise Mobility business conducted independent research among a representative sample of enterprise mobility decision-makers, the chief purchasers of enterprise mobility solutions and various mobile workers within enterprise and commercial businesses.
Tags : 
enterprise mobility, motorola, manufacturing industry, mobile workers, digital two-way radio, voice-over-wlan, vowlan, tdma modulation
    
Motorola, Inc.
Published By: SiliconExpert Technologies     Published Date: Dec 23, 2010
A case for proactive component management using lifecycle forecasting algorithms from independent component databases.
Tags : 
obsolescence, component, bill of materials, boms, electronic parts
    
SiliconExpert Technologies
Published By: Citrix Systems     Published Date: Sep 08, 2011
See who's in the Leader's Quadrant for Application Delivery Controllers. Don't miss this chance to learn from Gartner's independent research!
Tags : 
garnter, magic, quadrant, application, delivery, controlleres, citrix, leaders, report, comparision, application delivery, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: Oracle     Published Date: Feb 03, 2012
Delivering a Unique Online Experience for Segments, Regions, and Brands: Knowing When to Use Personalization, Microsites, and Independent Sites - This white paper discusses a range of site implementation options and recommending best practices.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management, enterprise applications
    
Oracle
Published By: Riverbed     Published Date: Nov 15, 2012
An independent ROI study of Riverbed Cascade product family customers, found a remarkable three-year ROI of 364% by providing cost-effective, application-aware network performance management and more. Read on to learn more about network performance.
Tags : 
application-aware network management, roi, riverbed cascade, riverbed, it infrastructure, it projects, enterprise applications, data management, business technology
    
Riverbed
Published By: Allscripts     Published Date: Mar 11, 2015
See how Allscripts Professional EHR™ is helping Choice Medical Group raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework. Choice Medical Group is an Independent Physicians Association with 40 independent physicians spread across a 70-mile radius in the high desert. This organization must coordinate care with an additional 120 specialists and deliver quality care to an extremely rural population. Allscripts Professional EHR™ is helping the Association raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework, ensuring that geographic distance does not limit quality care availability.
Tags : 
allscripts, ehr suite, value based care, aco, accountable care organization, choice medical group
    
Allscripts
Published By: Brainshark     Published Date: Oct 21, 2013
Mobile, video and social media are growing rapidly - but not independently. This video takes a look at the relationships between each trend, and how your business can capitalize on all three to advance your communications strategy.
Tags : 
business communications, training, b2b, b2c, customer engagement, marketing, mobility, mobile, smartphone, on-demand, presentation, productivity, video communications, training, powerpoint, ppt, presentation, byod, social media, video
    
Brainshark
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat, it management
    
CDW
Published By: IBM     Published Date: Sep 27, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
ibm, ibm powervm, ibm powervm virtualization, virtualization, virtualization technology, x86, servers, business technology
    
IBM
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.
Tags : 
    
Cisco
Published By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If you’re a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If you’re an independent consultant, you’ll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
Published By: NetApp     Published Date: Jun 27, 2016
“Are solid-state arrays (SSAs) worth the extra cost? This independent survey of SSA users found that their deployments provided a positive ROI after only 5.4 months, significantly faster than hard-disk drive (HDD) storage systems. Discover why Gartner strongly advises that SSAs be considered whenever HDD-based storage systems need to be replaced. Read the report: Solid-State Array TCO Reality Check.”
Tags : 
    
NetApp
Published By: NetApp     Published Date: Jun 27, 2016
"Gartner: Moving Toward the All Solid-State Storage Data Center Are you only using solid-state arrays for your primary data? If so, you’re missing out on the benefits flash can deliver to other applications, such as active archives, data lakes, and big data infrastructures. In this independent report, Gartner finds that progressive I&O leaders are already moving toward an all solid-state data center and predicts that others will soon follow. Read the report here."
Tags : 
    
NetApp
Published By: NetApp     Published Date: Aug 26, 2016
Gartner: Moving Toward the All Solid-State Storage Data Center Are you only using solid-state arrays for your primary data? If so, you’re missing out on the benefits flash can deliver to other applications, such as active archives, data lakes, and big data infrastructures. In this independent report, Gartner finds that progressive I&O leaders are already moving toward an all solid-state data center and predicts that others will soon follow. Read the report here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Are solid-state arrays (SSAs) worth the extra cost? This independent report, based on end-user surveys and inquires, finds that SSA deployments provide a positive ROI after within months. Discover why Gartner strongly advises that SSAs be considered whenever legacy storage systems need to be replaced.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
This independent report addresses some common GDPR myths. Learn the facts about the new obligations and liabilities faced by companies that manage data in the EU and how to assess your risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Genesys     Published Date: Jul 13, 2018
Artificial intelligence (AI) can’t replicate the human touch, but it can ease your agents’ burden by handling many simple, repetitive requests. A new Forrester Consulting paper offers a look at the strengths and weaknesses of both AI and humans independently, yet how blending them together can give your customers the seamless end-to-end experience they expect. See how enterprises around the world use AI to improve customer service and uncover new revenue streams, the challenges they overcame, and why a blended solution with live agents makes sense. Download the paper to learn three key recommendations on using AI to improve agent productivity, agent satisfaction, and customer satisfaction.
Tags : 
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"Customers in the midst of digital transformation look first to the public cloud when seeking dramatic simplification, cost, utilization and flexibility advantages for their new application workloads. But using public cloud comes with its own challenges. It’s not always possible or practical for enterprises to retire their traditional, on-premises enterprise system still running the company’s most mission- critical workloads. Hybrid IT – a balanced combination of traditional infrastructure, private cloud and public cloud – is the answer. But a true hybrid IT deployment must go well beyond the current generation of hybrid cloud systems, where the on-premises and off-premises worlds have largely remained siloed and still have to be independently managed. This paper seeks to answer how to bring those siloes together by identifying eight essentials that must be met to achieve the ideal hybrid IT implementation."
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Jan 09, 2017
Is it better to build your own internal cybersecurity expertise and security intelligence & analytics platform or should you outsource the responsibilities to a team of experts? Read this paper by Securosis, L.L.C, an independent research and analysis firm, to understand the drivers, use cases and partner selection criteria for managed security monitoring.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee