level

Results 1351 - 1375 of 1729Sort Results By: Published Date | Title | Company Name
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization, security
    
SilverSky
Published By: Rackspace     Published Date: Feb 13, 2015
700 IT decision makers from organizations with more than 250 employees were interviewed throughout September 2014. Respondents came from an even distribution of sizes/sectors and were from the following countries: US (350), UK (250) and Australia (100). These interviews were conducted online using a rigorous multi-level screening process to ensure only suitable candidates were given the opportunity to participate.
Tags : 
rackspace, devops, operations, development, devops hiring
    
Rackspace
Published By: inPowered     Published Date: Sep 20, 2013
Read this white paper from inPowered and Marketing Evolution to understand how major brand marketers are leveraging their earned media, written by trusted category experts, to drive serious lifts in brand favorability, advocacy, and purchase intent and achieve ROI 7-14x campaign investment levels.
Tags : 
forrester, inpowered, marketing, earned media, media
    
inPowered
Published By: Intel     Published Date: Jan 06, 2014
This paper describes a step-by-step approach to designing such a system and presents an iterative methodology that applies at both the component level and the system level.
Tags : 
intel, hpc, high performance computing, storage, high performance storage, storage management, architecture
    
Intel
Published By: FORTRUST     Published Date: Jul 07, 2015
Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
fortrust, colocation, dcim, data center infrastructure, data center operations
    
FORTRUST
Published By: IBM     Published Date: Mar 20, 2014
This analyst report provides guidelines for how to plan an effective Enterprise Asset Management strategy, including maturity levels, processes, and technologies in context of IT Asset Management advances. The paper was developed by Enterprise Management Associates - an IT Analyst firm.
Tags : 
ibm, enterprise assets, it assets, data management, it management, enterprise asset management, ema, it organization, ibm maximo, asset management, ibm smartcloud, control desk, eam foundation, itam, ema perspective
    
IBM
Published By: Cisco     Published Date: Jun 03, 2015
As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity. In this episode, the TechWiseTV team takes a dive deep into the innovations and opportunities made possible by Cisco's new 4000 family of Integrated Services Routers. Learn how the architecture and new features that make up this exciting addition to Cisco's router portfolio are bringing more exciting new levels of integration, performance, and productivity to the branch office than ever before.
Tags : 
cisco, techwise, routers, wan, productivity, performance
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
cisco, routers, wan, wlan, rich application services, wireless devices
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity.
Tags : 
wifi, wireless, technology, network, application
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
IDC’s 2014 CloudView study interviewed Director-level and above respondents from a global sample of 19,080 enterprise executives responsible for IT decisions. Of this sample the full survey was conducted on the 3,643 respondents actively using cloud for multiple workloads
Tags : 
    
Cisco
Published By: HP Enterprise System     Published Date: Apr 03, 2014
SAP HANA is a powerful, in-memory computing platform that streamlines business suite applications, analytics, planning, predictive analysis, and sentiment analysis on a single platform, so businesses can operate in real time. The design approach for enterprise-level solutions involving SAP HANA, and the best practices surrounding them, isn’t intrinsically different from the approach to any other enterprise-level solution for technology implementations. This paper is written to address those elements of good solution design and apply them to the SAP landscape, with particular focus on the SAP HANA element.
Tags : 
sap hana, as a service solution, solutions, cost effective, operational management, accelerate value, enterprise applications, data management
    
HP Enterprise System
Published By: Phunware     Published Date: Dec 06, 2014
Case study of the partnership between The CW Network and Phunware to develop and launch a next generation mobile app to 6 million users
Tags : 
mobile apps for entertainment, mobile apps for media, mobile dynamic content, app monetization, mobile monetization, mobile content discovery, mobile dynamic content, mobile cross promotion, tv everywhere
    
Phunware
Published By: Schneider Electric     Published Date: Oct 04, 2012
Rack-based cooling solutions are now appearing which take cooling capability to levels well in excess of 10 kW per rack. Download now to learn more.
Tags : 
schneider electric, data center, energy, data center, servers, blades, power and cooling, cooling, racks
    
Schneider Electric
Published By: Pluribus Networks     Published Date: Sep 25, 2014
Software Defined Networking (SDN) allows organizations to deliver networking with the same level of flexibility and agility as virtualization has allowed them to deliver other parts of their infrastructure. This free webinar will examine current networking architectures at a high level.
Tags : 
pluribus, pluribus networks, sdn, software defined networking, distributed networking, distributed computing, network virtualization, rack switching
    
Pluribus Networks
Published By: Symantec     Published Date: Oct 20, 2014
Symantec ApplicationHA helps you create a resilient VMware environment to deliver effective business services to your end users with virtual machine restart as well as application level monitoring and restart. ApplicationHA is fully compatible with your existing tools such as VMware High Availability, vMotion, FT, DRS and SRM.
Tags : 
symantec, vmware, business applications, apm, virtualization, business technology
    
Symantec
Published By: Mentor Graphics     Published Date: Jan 29, 2015
This paper investigates the effects of DDR4’s Pseudo Open Drain (POD) driver on data bus signaling and describes methodologies for dynamically calculating the DRAM’s internal VrefDQ level required for data eye analysis.
Tags : 
mentor graphics, digital signal, board design, power integrity
    
Mentor Graphics
Published By: Wyng     Published Date: Mar 03, 2015
How are you taking your 2015 digital and social marketing to the next level in 2015? We surveyed 100+ marketing professionals on the state of digital marketing trends. Download our free "State of Digital Marketing Report" to see how marketing evolved in 2014, and where you should invest your efforts in 2015.
Tags : 
digital marketing, internet marketing, marketing strategy, digital trends, interactive marketing, customer engagement, customer experience/engagement, digital experience, customer data, emerging marketing, social marketing, hashtag marketing, instagram marketing, shoppable instagram, ecommerce, social media, ugc, consumer marketing, marketing tips, marketing tools
    
Wyng
Published By: Wyng     Published Date: Mar 03, 2015
Want to take your digital and social marketing strategy to the next level? Read this Forrester report to learn the four steps you need to take to succeed with best practices from leading brands, including SodaStream, Dr Pepper & more.
Tags : 
digital marketing, internet marketing, marketing strategy, digital trends, interactive marketing, customer engagement, customer experience/engagement, digital experience, customer data, emerging marketing, social marketing, hashtag marketing, instagram marketing, shoppable instagram, ecommerce, social media, ugc, consumer marketing, marketing tips, marketing tools
    
Wyng
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches, security, it management
    
Modis
Published By: Arthur J. Gallagher & Co.     Published Date: Oct 26, 2015
Employers of choice are committed to providing their employees with a rich benefits and compensation program while trying to decrease or maintain operating costs. Our 2015 survey - with over 3,000 participating organizations - covers everything from high-level questions about organizational priorities and benefit strategies, to current and future tactics related to medical and pharmacy benefits, wellness, work-life balance, retirement and employee communications. Download Gallagher's Benefits Strategy & Benchmarking Survey Executive Summary for a glimpse of what organizations are doing nationwide as they pursue their goals to compete, succeed and prosper in a competitive and constantly evolving market.
Tags : 
arthur j. gallagher, benefits survey, organizational priorities, medical benefits, pharmacy benefits, wellness, work-life balance, retirement, employee communications
    
Arthur J. Gallagher & Co.
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365
Published By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
Published By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
    
Lenovo
Start   Previous    48 49 50 51 52 53 54 55 56 57 58 59 60 61 62    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee