Skip to main content
 

aps

Results 301 - 325 of 625Sort Results By: Published Date | Title | Company Name
Published By: Artemis Health     Published Date: Feb 05, 2019
If you’re like most people, you’re a procrastinator. You know you need to use benefits data to make great decisions, but it’s not at the top of your to-do list. But access to clear, actionable benefits data isn’t just nice to have; it’s a must-have. In this whitepaper, we’ll show you: • How wasted benefits spending is impacting your other strategic initiatives • The gaps in coverage you could fill with the right analysis at the right time • The ways a benefit data solution can help your employees access great care
Tags : 
    
Artemis Health
Published By: Gameffective     Published Date: Feb 26, 2019
We all know that employee engagement is important. Employees that are aligned with their goals, aware of their performance gaps, and motivated to improve, perform better. It’s stating the obvious. The big question is how to get there, and whether technology can help us do this at scale. This is where most digital motivation initiatives hit a wall. A new breed of next generation performance and feedback systems are attempting to do just that: creating and maintaining a continuous personalized conversation between employees and managers with regards to performance, development and goals. In online marketing, personalizing messages and promotional activities has been possible for some time. It is called “Marketing Automation”. Hubspot, one of the pioneers in this field, defines it thus: “software that exists with the goal of automating marketing actions. Many marketing departments have to automate repetitive tasks such as emails, social media, and other website actions. The technology of
Tags : 
    
Gameffective
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Riverbed     Published Date: Feb 26, 2015
Here's a snapshot of Riverbed’s application performance management portfolio.
Tags : 
application performance, performance management, business value
    
Riverbed
Published By: IBM APAC     Published Date: May 12, 2017
With these facts in mind, the need to help different age groups work well together is clear. Younger generations have fundamentally different views about work and the world in general, which can be problematic when they’re expected to work alongside older workers. You must find ways to bridge the gaps between generations, while empowering individual generations to work in the manner that best suits them. Read on to learn more.
Tags : 
workplace, mobile workplace, mobile environment, remote working, workplace environment, digital transformation
    
IBM APAC
Published By: Burton Group     Published Date: Apr 08, 2008
Server virtualization is a technology that has taken hold with amazing speed and is now firmly entrenched with overwhelming success in many data centers. This perspective document recaps why you should be moving ahead quickly with virtualization (if you haven’t already done so), what the implications are for IT and the business, and what the future holds as the ramifications of virtualization become apparent.
Tags : 
burton group, server, servers, virtual, virtual machine, virtual server
    
Burton Group
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
VMware
Published By: VMware     Published Date: Feb 26, 2009
CA ARCserve® Backup, CA XOsoft™ Replication, and CA XOsoft™ High Availability provide several key features that enable you to both protect virtualized servers and benefit from server virtualization in your overall recovery management strategy
Tags : 
ca arcserve backup, ca xosoft replication, ca xosoft high availability, virtualization support, recovery management strategy, virtual machines, vms, vmware consolidated backup (vcb)
    
VMware
Published By: Cornerstone OnDemand     Published Date: Dec 10, 2014
What do we mean by agility? It’s how powerfully your organization can react to changes in the marketplace, recognize and close employee skill gaps, and align the right people in the right places to handle any pivots in business strategy. How can you make your organization more agile? There are several critical things you must do. Learn about it all in this whitepaper.
Tags : 
cornerstone ondemand, agility, organizations, business agility, business strategy, employee skills, productivity
    
Cornerstone OnDemand
Published By: EMC Corporation     Published Date: Mar 11, 2011
Learn how EMC is filling the gaps through smart acquisitions and integrations that address customer needs.
Tags : 
emc, esg, data protection
    
EMC Corporation
Published By: CollabNet     Published Date: Jan 11, 2013
This paper is written to provide guidance for teams new to continuous integration or wanting to explore ways to improve their implementations.
Tags : 
agile, software development, integration, process, continuous integration, value stream maps, antipatterns
    
CollabNet
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
Nextgen was looking for a reliable, fast-to-deploy database solution with minimal support and maintenance costs.
Tags : 
nextgen, database application, database imlpementation, simple database platform, reliable database platform, affordable database platform, oracle, value added distributor
    
Oracle Global Marketing
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : 
vistaprint, case study, counteract, endpoint compliance, real time visibility, physical and virtual machines
    
ForeScout
Published By: BMC Software     Published Date: Aug 18, 2014
"“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change. strategy."
Tags : 
customer satisfaction, it support, communication, business users
    
BMC Software
Published By: BMC Software     Published Date: Oct 23, 2014
In a first-of-its-kind study, IDC has docu­mented the costs of business risks cre­ated when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models.
Tags : 
costs and risks, communication, enterprises, it service delivery models
    
BMC Software
Published By: BMC Software     Published Date: Oct 23, 2014
Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.
Tags : 
itssm, strategic partners, it organizations, itsm integration, saas
    
BMC Software
Published By: Aruba Networks     Published Date: Nov 20, 2013
Given the evolution of past major advances in wireless-LAN technologies, it should come as no surprise that products based on the still-in-development IEEE 802.11ac standard are now appearing across the board, from residence to enterprise. Just as was the case with 802.11g and 802.11n, the standards-development process is now far enough along that the semiconductor community is shipping in volume, the Wi-Fi Alliance has been able to issue an initial interoperability specification, and system-vendor products offering up to 1.3 Gbps are now available at prices very close to those of 802.11n APs but with on the order of a 30% improvement in price/performance on a spectral-efficiency basis and from 100% to more than 200% in performance overall.
Tags : 
security, assurance strategies, initial deployment, wireless-lan, wi-fi, gbps, enterprise, best practices
    
Aruba Networks
Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
VMware, Inc
Published By: Adobe     Published Date: Nov 16, 2016
The perfect stock image pulls triple duty for creative teams. That means it doesn’t just match campaign messaging. It also meets design specs for multiple channels and maps back to your overall brand guidelines. Read Finding the Perfect Image, and learn how the right stock service can help you: - Spend less time on processes and more time on creating experiences - Keep pace with every channel, including social media - Scale creative production to meet the demands of enterprise
Tags : 
adobe, stock, stock image, creative, design
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Like the oxygen we breathe, journey analytics brings life to the customer behind those devices, over time getting to know their favorite pastry choice, when they’re most likely to buy gas, and how long they stay online while in the station’s café. If you want your customers to enjoy seamless, personalized experiences, you need to treat them like people. That means marketing to the person — not the device. When you know a customer’s interests, wants, and needs — perhaps even before they do — you’ve succeeded at becoming a true experience business. For some, this may require a shift from analytics as a tool to analytics as a way of life. It may also mean evolving corporate or office culture.
Tags : 
    
Adobe
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.