remote work

Results 1 - 25 of 222Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The migration of contact centers from on-premises to the cloud is well underway and dramatically changing how companies deliver customer experience. That’s the conclusion of this 2016 survey by 8x8 and the Contact Center Network Group (CCNG) of 154 contact center professionals in the U.S. and UK. The November 2016 survey results uncover a range of trends and opportunities that highlight the importance of analytics, the increase in remote working, and the integration of more non-voice channels into the contact center. Download this complimentary report to learn: Major business drivers that are leading contact centers to cloud Surprising top method for measuring and improving agent performance Concerns and obstacles around moving to the cloud Increased prevalence of remote working and key challenges reported The most popular non-voice channels contact center managers would like to incorporate
Tags : 
cloud contact center, ccng, analytics. remote working, non-voice channels
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
The 8x8-CCNG survey shows more and more companies are moving their contact centers to the cloud, and for a range of reasons that is appealing to almost every business center. Most prominent among those objectives are better business continuity, scalability, supporting remote workers, and integrating new technologies like multi-channel capabilities. Does your contact center employ remote agents? More than half do or respondents do! Across industries, prioritizing top talent and supporting remote workers is a growing concern. Cloud contact centers support this objective by making the full set of technologies and features available to all users, wherever they are located. Download now to learn more.
Tags : 
8x8, cloud contact center, remote work, scalability, cloud computing
    
8x8 Inc.
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. It simplifies and automates backup and restore processes across Windows and Linux environments, and remotely monitors and manages geographically distributed servers and workstations.
Tags : 
acronis, backup and recovery, 10 advanced server, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: Advantech     Published Date: Nov 08, 2010
Integrating Distributed Energy Resources into the Smart Grid
Tags : 
distributed i o, data acquisition boards, remote i o, pci data acquisition, ethernet i o, data acquisition module, ethernet data acquisition, industrial ethernet
    
Advantech
Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services
    
Aerohive
Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking
    
Aerohive
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Most companies enable workers to work remotely, and when users are remote, they expect instant secure access to the business applications they need, on the device of their choice. View the Rise of the Remote Worker infographic to better understand the challenges IT departments face around management and security of remote workers.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management
    
Aladdin
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Amazon Web Services has a long history of successfully supporting Microsoft workloads, with hundreds of thousands of customers across a wide variety of industries running their Microsoft workloads on AWS. Customers have successfully deployed virtually every Microsoft application available on the AWS Cloud, including (but not limited to) Microsoft Office, Microsoft Windows Server, Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft Skype for Business, Microsoft Dynamics products, and Microsoft Remote Desktop Services. This guide covers the benefits of moving Microsoft workloads to the Cloud and how to get started.
Tags : 
cloud, amazon, web services, microsoft, security, customer success
    
Amazon Web Services
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee