rsa

Results 51 - 75 of 568Sort Results By: Published Date | Title | Company Name
Published By: PGi     Published Date: Nov 07, 2018
Vous n’envisageriez pas une conversation téléphonique cruciale avec un investisseur, un événement clients ou une réunion avec une partie prenante qui aurait lieu dans l’aire ouverte de votre bureau. Alors pourquoi organiseriez-vous un évènement virtuel important sur une plateforme dont les caractéristiques favorisent la collaboration et le travail en équipe pour un petit groupe ?
Tags : 
    
PGi
Published By: Adobe     Published Date: May 22, 2014
An Adobe report into building sustainable, one-to-one customer dialogues across any channel.
Tags : 
adobe, single marketing view, one-to-one customer dialogues, cross-channel conversations, adobe campaign, business technology, telecom
    
Adobe
Published By: Cleversafe     Published Date: Dec 07, 2012
The business case for why IT Executives are making a strategic shift from RAID to Information Dispersal
Tags : 
data, storage, information, digital, growing, software development, it management, business technology
    
Cleversafe
Published By: Cleversafe     Published Date: Dec 07, 2012
Meeting nearline storage and distribution needs reliably and cost effectively.
Tags : 
media, entertainment, storage, digital, challenges, cleversafe, networking, business technology
    
Cleversafe
Published By: Cleversafe     Published Date: Dec 07, 2012
A new storage method is revolutionizing data management, reducing costs while increasing reliability and security.
Tags : 
paradigm, shift, digital, storage, revolutionizing, software development, it management, business technology
    
Cleversafe
Published By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : 
shutterfly, images, growing, reliability, performance, storage, dispersal, networking, business technology
    
Cleversafe
Published By: Cleversafe     Published Date: Dec 07, 2012
Dispersed Storage is an innovative approach for cost-effectively storing large volumes of unstructured data while ensuring security, availability and reliability.
Tags : 
dispersed, storage, unstructured, availability, reliability, large volumes, it management, business technology, data center
    
Cleversafe
Published By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : 
raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
    
Cleversafe
Published By: Cleversafe     Published Date: Mar 29, 2013
Scalability has always been an important characteristic of enterprise storage systems, maybe the most important, since the rationale of consolidating storage assumes that the system can easily grow with aggregate demand.
Tags : 
object storage, cloud storage, access nodes, scalability, metadata, storage controller, backup and recovery, network attached storage, raid, storage area networks, storage management, storage virtualization, application integration, application performance management, best practices, data deduplication, business technology
    
Cleversafe
Published By: Prophix     Published Date: May 31, 2016
The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations are preventing companies from moving forward; they have become so universal and accepted in the marketplace that it is becoming more difficult to move ahead and progress the business. Flexibility, accuracy and control over the budgeting process are three prominent factors slowing this progression.
Tags : 
best practices, budgeting, business efficiency, productivity, competitive advantage
    
Prophix
Published By: Cisco     Published Date: Apr 27, 2017
La gestión de la red a través de la nube otorga mayor rendimiento y versatilidad, por una fracción del coste y sin la complejidad de las soluciones tradicionales.
Tags : 
cisco, gestión de red, meraki
    
Cisco
Published By: Schneider Electric     Published Date: Oct 17, 2016
Die Kostenverursacher der TCO warden quantifiziert. Es wird gezeigt, dass der größten Kostenverursacher unnötige Kosten aufgrund einer überdimensionierten Infrastruktur sind.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc propose d'améliorer concrètement l'alimentation, le refroidissement, les baies, la sécurité physique, ainsi que la surveillance et l'éclairage. Il s'intéresse aux petites salles serveurs et succursales d'une charge informatique de 10 kW.
Tags : 
    
Schneider Electric
Published By: Zendesk     Published Date: Dec 10, 2018
Não importa qual o tipo ou o horário de operação da sua empresa: sua porta está sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que não demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais serão eficientes para a sua organização? A resposta simples é: sim, você precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de várias formas e esperam que cada interação com a marca seja consistente com as conversas que teve antes e as que terá depois. Aprenda como com a solução omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 04, 2019
Não importa qual o tipo ou o horário de operação da sua empresa: sua porta está sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que não demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais serão eficientes para a sua organização? A resposta simples é: sim, você precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de várias formas e esperam que cada interação com a marca seja consistente com as conversas que teve antes e as que terá depois. Aprenda como com a solução omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's what’s expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the “How to Prioritize Cybersecurity Risks: A Primer for CISOs” ebook now to learn: -How to adopt a risk-based approach to prioritization – beyond what CVSS scores tell you -Why visibility into all your company’s IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from “How many vulnerabilities do we have?” to “Which vulnerabilities pose the greatest risk?”"
Tags : 
    
Tenable
Published By: IBM APAC     Published Date: Aug 25, 2017
There is a tectonic shift in the way we work. We expect the same kind of intuitive, tactile experience with our workplace technology that we now take for granted with our smartphones, tablets and gaming systems. We expect our devices to talk to each other and update automatically. Virtual meetings should be as easy to set up as a video chat, and whatever we need to do our jobs should be as easy to tailor as a streaming music or video application.
Tags : 
personal profile, news and alerts, conversation recall, system updates, productivity tips
    
IBM APAC
Published By: Workday Italy     Published Date: Sep 20, 2018
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
    
Workday Italy
Published By: Workday Italy     Published Date: Feb 04, 2019
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Logrhythm     Published Date: Sep 11, 2017
Threat Lifecycle Management ist die entscheidende Voraussetzung, um Angriffe in einer möglichst frühen Phase ihres Lebenszyklus zu erkennen und zu stoppen. TLM vereint zahlreiche Fähigkeiten und Funktionen, die es ermöglichen, neue Bedrohungen und Angriffe auf die Unternehmenssysteme zu erkennen; festzustellen, welche Risiken sie mit sich bringen; die Risiken zu minimieren; und die nötigen Maßnahmen zu ergreifen, um den Normalbetrieb wieder aufnehmen zu können. TLM hat das Ziel, schädliche Cybervorfälle, die durch erfolgreiche Angriffe auf Systeme, Netzwerke und Daten verursacht werden können, umfassend zu bewältigen beziehungsweise zu verhindern.
Tags : 
einleitung, menschen, prozesse, technologien, eine strategie entwickeln
    
Logrhythm
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Cloud computing no longer is simply the most dominant topic of conversation among the IT community and its business stakeholders: It is now a gigantic marketplace that is reshaping how IT services are provided and, more important, is helping organizations become more agile, responsive and efficient.
Tags : 
private cloud, cloud computing, agile, responsive, efficient
    
Dell & Microsoft
Published By: Cisco     Published Date: Oct 06, 2015
Learn how Cisco combines the power of Cisco Collaboration Cloud with the versatile toolbox of Cisco Unified Contact Center Express (Unified CCX) to provide multiple channels for customer engagement.
Tags : 
cisco, cisco collaboration cloud, customer care, unified ccx, customer engagement, legacy metrics, networking, it management, wireless, business technology
    
Cisco
Published By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
    
GE Healthcare
Published By: GE Healthcare     Published Date: Jun 11, 2015
Radiological Associates of Long Island implemented Universal Viewer to give radiologists PACS reading tools and advanced features across the enterprise and anywhere Internet access is available.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, radiology imaging solutions, diagnostic medical imaging, radiology, medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols
    
GE Healthcare
Published By: Dell EMC     Published Date: Nov 02, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman.
Tags : 
emc, wikibon, analysis, virtualization, cloud, hybrid, business technology, data center
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee