Find White Papers
Home
About Us
List Your Papers
    
> Technology > Data Center

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Data Center

Results 451 - 475 of 1933Sort Results By: Published Date | Title | Company Name
White Paper Published By: CompareBusinessProducts.com     Published Date: Jul 02, 2013
Having a contact center allows a company to give the sense to its customers that they are dealing with an established business that cares about its customers. Generally there are two different options for organizations to have their own contact center. One is to outsource the company’s contact center requirements to an already established specialist contact center business. The other is for organizations to set up their own in-house contact center. The argument is often made for outsourcing based on cost. Supporters of outsourcing say that it is prohibitively expensive to open up a contact center in-house. However, with technology continually evolving this has changed. The cloud offers opportunities for businesses to cut back on many of the previously necessary major hardware expenditures that would have been associated with setting up a contact center in the past.
Tags : 
contact centers, customer service, solution, technical, technology
    
CompareBusinessProducts.com
White Paper Published By: CompareBusinessProducts.com     Published Date: Jul 02, 2013
Often the value of the in-house call center is put on the back burner or ignored outright. This is not because no one cares for the department or finds it secondary to the company’s business. It’s because deciding the technological needs - particularly the software needs - is so darn confusing. Even after looking over a gazillion data sheets, white papers, product packets or after having the tenth meeting determining the company’s needs, there is still an uncertainty in what is needed in terms of software selection. The task can be daunting and overwhelming.
Tags : 
contact centers, call center, customer service, solution, technical
    
CompareBusinessProducts.com
White Paper Published By: CompareBusinessProducts.com     Published Date: Jul 02, 2013
CRM Vendors Comparison Chart 2013 Edition
Tags : 
crm, vendors, technology, chart, best practice
    
CompareBusinessProducts.com
White Paper Published By: CompareBusinessProducts.com     Published Date: Jul 02, 2013
Companies that understand Customer Relationship Management (CRM) well know that the Relationship – the “R” in CRM – is really critical. These users extract long term value from their solutions while the rest of the pack is happy to add an additional fractional percentage point to the return on their investment or extract some more revenue from those whom they are already doing business with.
Tags : 
crm, vendors, technology, chart, customer relationship management
    
CompareBusinessProducts.com
White Paper Published By: Navisite- A Time Warner Cable Company     Published Date: Jul 01, 2013
In recent years, IT has seen a fundamental shift toward always-on capabilities for anywhere, anytime productivity. The Cloud has taken center stage as one of the largest influencers of IT decision making, modifying company operations, impacting enterprise finances, and incorporating into profit engines.
Tags : 
navisite, daas, it decision makers, impacting enterprise finances, profit engines
    
Navisite- A Time Warner Cable Company
White Paper Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research
    
Symantec
White Paper Published By: Cisco Systems     Published Date: Jun 27, 2013
This practical guide can help you choose the best cloud solution for your company. If you are considering alternatives to an on-premises communications system, you need to thoroughly understand the issues and options. Since anyone with a server and an Internet connection can become a cloud vendor, how do you know what to ask, or who to believe? This guide gives you a three-step process, or evaluation guide, you can use to cut through the hype and make an informed decision.
Tags : 
cloud solution, integrated solution, application, network, on-premises communication system
    
Cisco Systems
White Paper Published By: Cisco Systems     Published Date: Jun 27, 2013
If you’re looking to the cloud to flexibly deploy collaboration applications and experience predictable costs and services, it is important to take several things into consideration. Cisco can help you choose the best cloud solution for your business needs. This practical guide can help you create the ideal RFP for your company.
Tags : 
cloud flexibility, technology, collaboration, application, cloud solution
    
Cisco Systems
White Paper Published By: Cisco Systems     Published Date: Jun 27, 2013
To help us understand what business leaders think about ‘the cloud’ and the impact of cloud collaboration to their businesses, we asked Forbes Insights to conduct research. In response, Forbes surveyed over 500 senior executives from global companies with sales ranging from $250 million to over $20 billion, and interviewed 15 executives. The study examined the ways business leaders increasingly look at cloud collaboration as a way to increase productivity, accelerate business results, and enhance innovation and collaboration across borders and functions.
Tags : 
cloud, collaboration, technology, business leaders, perspective
    
Cisco Systems
White Paper Published By: BMC Software     Published Date: Jun 26, 2013
Cloud is not simply a new technology platform, it’s a new way of running your IT processes. Success changes relationships with users, with services and with operations. Learn what to anticipate as you embark on cloud – and how to ensure success not just in your datacenter, but in your business.
Tags : 
cloud management, hybrid cloud, cloud planning, cloud operations, cloud users
    
BMC Software
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
saas, application, line-of-business owners, lobs, software-as-a-service
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud
    
Blue Coat Systems
White Paper Published By: BMC Software     Published Date: Jun 25, 2013
Read Enterprise Management Associates’ 2013 Private Cloud Platforms Radar Report to see how EMA evaluated BMC’s cloud management solutions. You’ll gain comprehensive analysis of the platform’s “Solution Impact,” including features, architecture, and integration, as well as “Resource Efficiency,” or time, effort, and cost. The report also evaluates vendors’ overall performance, strengths, and limitations.
Tags : 
bmc, enterprise management, cloud, platform, integration
    
BMC Software
Free Offer Published By: Salesforce.com     Published Date: Jun 24, 2013
Public cloud platforms are key to unlocking the flexibility, productivity, and economic advantages of cloud computing. Download the Forrester Research, Inc. report to learn: • Which public cloud platforms are best suited to each type of development pro • Forrester’s evaluation of the 14 most significant public cloud platforms • Why Salesforce was cited as a leader in all four categories of AD&D leaders
Tags : 
public cloud, flexibility, productivity, cloud computing, platform
    
Salesforce.com
Webinar Published By: Silver Peak     Published Date: Jun 24, 2013
This video featuring Forrester Research analyst Vanessa Alvarez looks at what is required for next-generation cloud implementations and the critical role the WAN plays in the success of cloud deployments.
Tags : 
forrester, cloud deployments, wan, wide area networks, cloud computing
    
Silver Peak
White Paper Published By: Genesys     Published Date: Jun 20, 2013
The right contact center is a business advantage, because delivering exceptional service to your customers improves their satisfaction and loyalty, and results in increased revenues. The right contact center can also reduce TCO by reducing the need for IT support and replacing inflexible voice-only ACDs that have become expensive to maintain across one or many sites.
Tags : 
contact centers, customer service, solution, technical, technology
    
Genesys
White Paper Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology
    
Red Hat
White Paper Published By: EMC Corporation     Published Date: Jun 14, 2013
Aerospec, a system engineering and manufacturing company, leverages VNXe and VMware to cut operating costs, increase reliability. They have seen a 2x increase in data access and 75% increase in storage utilization.
Tags : 
data, data access, reliability, redundant data, storage solution
    
EMC Corporation
Free Offer Published By: BeyondTrust     Published Date: Jun 10, 2013
Retina CS is a privilege and vulnerability management solution that reports on vulnerabilities and threats, least privilege implementation, Unix/Linux server security, and compliance. It does this by capturing and reporting data from your servers, desktops, cloud, mobile and virtualized environments
Tags : 
vulnerability management, privilege management, compliance, server security, linux
    
BeyondTrust
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End


Sub-Categories: Cloud Computing, Design and Facilities, Green Computing, Infrastructure, Power and Cooling, Virtualization

Search      
Madison Logic