Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

ids

Results 226 - 250 of 509Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Dec 21, 2015
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand.
Tags : 
adobe, mobile, marketing, strategy, it management, wireless
    
Adobe
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts, time synchronization, networking, it management
    
CradlePoint
Published By: Avaya     Published Date: Jun 01, 2015
How well connected are you? That’s the challenge in today’s mobile, virtual business landscape as companies strive for consistent communications between employees, business partners, and clients. Too often, a remote working world can feel splintered, disconnected, and complicated, resulting in lower productivity—and lost opportunity.
Tags : 
avaya, cloud computing, mobile, unified communications, integration, application management, wireless infrastructure, wireless messaging, application integration, application performance management, enterprise software, collaboration
    
Avaya
Published By: Avaya     Published Date: Dec 30, 2015
When organizations empower their customers and employees to engage anywhere and anytime, productivity and profitability improve by 18 percent and 12 percent respectively.
Tags : 
midsize business, best practices, business intelligence, business management
    
Avaya
Published By: Avaya     Published Date: Dec 30, 2015
Empower your employees
Tags : 
collaboration, productivity, web, growth, midsize business, best practices, business intelligence, business management, employee performance
    
Avaya
Published By: RICS Software     Published Date: Aug 20, 2015
Big box retailers have already adopted modern technology to increase profits. So how can small and midsize retailers compete?
Tags : 
    
RICS Software
Published By: RICS Software     Published Date: Aug 20, 2015
Small and midsize retailers can make a couple key decisions to maximize benefits within this new environment.
Tags : 
    
RICS Software
Published By: Genesys     Published Date: Jul 19, 2017
Contact Center Interaction Management for Midsize AND Large Contact Centers
Tags : 
genesys, contact center infrastructure, cci, contact center engagement, cec
    
Genesys
Published By: Oracle Hospitality - S&E     Published Date: May 09, 2017
More than 40% of sports fans worldwide abandoned concession lines in the past 12 months – without making a purchase – because of excessive waiting, according to Oracle Hospitality Sports and Entertainment’s research report The Fan Experience: Changing the Game with Food and Beverage. The global study surveyed more than 3,500 sports fans in eight countries – Australia, Brazil, China, France, Germany, Japan, United Kingdom and United States – and focused on uncovering their top priorities. Most importantly, the survey aids venue operators by identifying “pain points” and solutions designed to trigger greater attendance and spark sales.
Tags : 
    
Oracle Hospitality - S&E
Published By: Zebra Technologies     Published Date: Sep 07, 2017
In the age of evolving shopper expectations and technology advancements, the global retail industry is in the midst of a profound shift in retail operations. To gain a deeper understanding of retailers’ focus, concerns and investment plans, Zebra conducted a global research study across a wide spectrum of retail segments, including: specialty stores, department stores, apparel merchants, supermarkets, electronics, home improvement and drugstore chains. The results of this study are shared in this 2017 Retail Vision Study.
Tags : 
inventory management, staff communication, guest safety, guest security, mobile ordering, payment solutions, loyalty/membership/rewards, access card printers, state of the hospitality industry, smart data dives, automating convenience, the personalization equation, location technologies, key qr code applications, customer service, customer satisfaction
    
Zebra Technologies
Published By: Red Hat     Published Date: Mar 28, 2019
Applications have moved outside the IT department. There’s a truism that all companies are now software companies, and the ability to rapidly provide new services and new functionality to customers is one of the key competitive differentiators a company can offer. IT agility is a stone that startup Davids can use to unseat massive Goliaths.
Tags : 
    
Red Hat
Published By: Infosys     Published Date: May 21, 2018
In these times of asymmetric development and unsustainable natural resource usage, demands from the agricultural sector are mounting. When farmers, distributors, contractors, and even consumers are under the pressure of contributing more to the system, how can every cog in this ecosystem begin an efficiency and sustainability revolution amidst all these challenges?
Tags : 
development, resources, system, revolution, challenges
    
Infosys
Published By: iShares by BlackRock     Published Date: Apr 19, 2018
In this paper, we examine the evolution of the bond market through three interconnected lenses: the liquidity environment, market structure and product preferences. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, bonds, bond market, liquids, risk management
    
iShares by BlackRock
Published By: Oracle     Published Date: Feb 03, 2012
This online study polled e-business executives at 60 midsize companies ranging from retailers and consumer product manufacturers to telecommunications and technology providers.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service, software-as-a-service, pms, product management, knowledge management, enterprise applications
    
Oracle
Published By: VMware Inc.     Published Date: Nov 23, 2010
The VMware SMB Survey is designed to help small and midsize businesses (SMBs) understand the benefits their peers are achieving with virtualization.
Tags : 
vmware, virtualization, smbs, data loss, disaster recovery, business continuity, server virtualization, database security
    
VMware Inc.
Published By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : 
isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security, small business networks, anti spam, anti spyware, anti virus, hacker detection, intrusion detection, intrusion prevention, ipsec, wireless security, vulnerability management
    
Dell SecureWorks
Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability, security intelligence, global threats, cyber attack, network security, small business networks, email security, hacker detection, security management, vulnerability management
    
Dell SecureWorks
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco
Published By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
    
RES Software
Published By: HP     Published Date: May 30, 2008
The HP StorageWorks Enterprise Virtual Array (EVA) product family offers midsize to enterprise size customers leading performance, high capacity, and high-availability storage solutions for reducing IT costs and complexity. The EVA provides virtualized storage enabling capacity pooling, simplified management, automatic performance load balancing, dynamic configuration, and re-configuration.
Tags : 
storage, storageworks, eva 4000, eva 4400, virtualization, storage virtualization, virtual storage, storage management
    
HP
Published By: HP     Published Date: Aug 03, 2009
Enterprise storage managers sometimes encounter misconceptions about the storage grid, which is a flexible new approach to enterprise storage. To help define the benefits of this new technology - as well as to clarify what a storage grid is not - read this online article to consider a handful of research observations from leading storage industry analysts.
Tags : 
enterprise storage, storage, storageworks, storage management, data management
    
HP
Published By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : 
grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management, networking, it management, data management, data mining
    
HP SAS
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Published By: Payscale, Inc     Published Date: Apr 04, 2018
What someone is paid has an enormous impact on his or her life, and can carry all kinds of implicit meanings. It can be the difference between Angela in marketing having the funds to allow her kids to join a second sport, and having to tell them not this year. It can be John the product manager having the vacation days to finally take that international trip, or having to postpone it for another day. It can mean Ashton feeling valued by her employer, or feeling like she should look elsewhere.
Tags : 
    
Payscale, Inc
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search