realistic

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: C2C Systems     Published Date: Apr 24, 2013
IT departments often struggle to create a realistic budget for a PST elimination project – and then must justify the project among many others that may be considered higher priority by other stakeholders. This white paper is designed to give you a few logical steps to follow to create a compelling budget, to demonstrate a manageable project and ultimately, to prioritize the project.
Tags : 
pst, budget, elimination, logical, project, prioritize
    
C2C Systems
Published By: Interactive Intelligence     Published Date: Feb 14, 2012
Integrating social media for customer care isn't really the question for businesses anymore.
Tags : 
    
Interactive Intelligence
Published By: Adobe Systems     Published Date: Mar 04, 2011
Adobe Acrobat X can help give your team the power to turn unrealistic deadlines into realistic deadlines. Join the Adobe Acrobat X software webinar and go from under pressure to overachieving.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x
    
Adobe Systems
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion, security, knowledge management, enterprise applications, business technology, data center
    
Ping Identity
Published By: Forcepoint     Published Date: Apr 19, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
    
Forcepoint
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : 
denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive, architecture, network, application, cia triad, confidentiality, integrity
    
F5 Networks Inc
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
emc, vxrail, hyper-convergence, converged infrastructure, performance
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
emc, vxrail, hyper-convergence, converged infrastructure, performance
    
Dell EMC
Published By: Dell EMC     Published Date: Apr 18, 2017
In this paper the case for Hyper-Converged Appliances, and in particular the Dell EMC VxRail Appliance powered by Intel® Xeon® processor, is made from both cost and measurable effort perspectives. Strict reliance on measurables was used in lieu of anecdotal observations or customer quoted benefits in order to provide realistic and repeatable analysis.
Tags : 
dell, emc, hyper-convergence, hyper-converged appliances, analytics
    
Dell EMC
Published By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
    
3D Systems
Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security
    
Forcepoint
Published By: LogMeIn     Published Date: Jan 03, 2013
In this whitepaper, BoldChat® - with thousands of customers across 70 countries - shares analytic techniques, reporting recommendations and realistic timelines for implementing a pro-active chat program. Read on to learn more!
Tags : 
roi, live chat, bold chat, logmein, log me in, enterprise, collaboration, wireless, knowledge management, enterprise applications, business technology
    
LogMeIn
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: NetSuite     Published Date: Nov 18, 2006
This white paper reveals the most vital elements needed to develop a seamless value chain; one that realistically enables an SMB to develop valuable 2-way relationships with their most valuable customer segments.
Tags : 
crm, customer relationship management, smb, small business networks, customer service, customer satisfaction, customer interaction service, netsuite, enterprise applications
    
NetSuite
Published By: Esker     Published Date: Apr 12, 2012
This paper illustrates that solutions exist today, both as traditional software and Software as a Service, with a proven track record of success in helping companies make the transition to 100% electronic AR invoicing.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications
    
Esker
Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Your goal is high availability for the applications, databases, virtual machines (VMs), servers, and data that run your business. When access is lost or interrupted, recovery speed is critical, and must be measured in minutes and seconds, not hours of days. And if your backup and recovery strategy includes point solutions with limited coverage, legacy approaches that don't support today's modern technologies, or manual proc cesses that are time-consuming and complex, you may not be ready when disaster strikes.
Tags : 
    
Commvault ABM Oct
Published By: Gigamon     Published Date: Oct 19, 2017
The IDC Technology Spotlight, The Growing Need for New Technology and a Business Model in Network Monitoring, examines the stresses in today's mobile network planning and operations requiring a new model that incorporates a realistic approach toward cloudification. The paper also looks at the Gigamon solution for visibility in today’s mobile network, which facilitates efforts toward cloudification. This architecture provides maximum, centralized control to the mobile operator’s network planning and operations teams. Read to learn more.
Tags : 
    
Gigamon
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: EMC Corporation     Published Date: Mar 08, 2012
Data deduplication is not just altering how backup targets are used; it dramatically affects operating efficiencies, simplifies remote office data protection, and makes disaster recovery significantly more affordable and realistic. Read on.
Tags : 
leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention, information retention
    
EMC Corporation
Published By: Schneider Electric     Published Date: Mar 03, 2015
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
it equipment, small server rooms, avoiding it downtime, how to avoid it downtime, improving small server rooms, business technology
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: APC by Schneider Electric     Published Date: Jan 21, 2016
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting.
Tags : 
cbs interactive, server, data, cloud, security
    
APC by Schneider Electric
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
power, cooling, data center, data center management, server rooms
    
Schneider Electric
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee