Skip to main content
 

remote

Results 351 - 375 of 753Sort Results By: Published Date | Title | Company Name
Published By: Interactive Intelligence     Published Date: Oct 10, 2012
Download this whitepaper to learn 11 ways that you can leverage remote agents.
Tags : 
remote agents, home agents, customer experience, customer contact, contact centers
    
Interactive Intelligence
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast will describe the new features of TSM 6.1 and will recommend strategies for assessing your current environment, upgrading to 6.1 and how to maximize the monitoring benefits. We will include lessons learned and advice for avoiding pitfalls.
Tags : 
ibm, tivoli, storage manager, tsm, data management, assessment, remote administration, conversion
    
Mainline Information Systems
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives. Contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable
    
Time Warner Cable Business Class
Published By: NetApp     Published Date: Aug 19, 2010
View this on-demand webcast to gain insight into design considerations and deployment best practices for SharePoint in a virtualized environment.
Tags : 
netapp, hyper-v, virtualize sharepoint, storage, server investment, deployment best practices, microsoft, data storage
    
NetApp
Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security
    
NACR
Published By: IBM     Published Date: Mar 11, 2008
More and more employees are working remotely or traveling around the world to meet with colleagues, customers and partners. Jobs are no longer tied to a specific physical location, and people have come to rely on devices such as mobile phones, personal digital assistants (PDAs) and laptops to stay connected and productive.
Tags : 
ibm, convergence, collaboration, pda, unified communications, productivity
    
IBM
Published By: IBM     Published Date: Mar 17, 2008
Clients setting up smaller offices want to invest in the same type of technology as their larger competitors. Larger clients setting up remote branches need compute power not only at their head office, but also at distributed locations where key decisions that impact the local operation are made.This white paper compares the IBM BladeCenter S offering to the HP c3000 offering and articulates why IBM BladeCenter S is the best choice for small blade chassis platforms.
Tags : 
ibm, move up, kvm switch, kvm, bladecenter, blade center, bladesystem, blade system
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Oct 21, 2009
This paper examines the impact and adoption rates of 11 Green IT initiatives in mid-size organizations around the world.
Tags : 
green it, ibm, server virtualization, storage consolidation, desktop virtualization, pc power management, printer consolidation, remote conferencing
    
IBM
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Apr 14, 2009
Has the economic meltdown taken its toll on your business? Is the endless onslaught of bad news making it difficult to maintain a positive perspective? The good news is that despite the economic downturn, there’s never been a better time to raise the bar for your IT capabilities. Mature virtualization solutions, new affordable uptime solutions, powerful integrated capabilities and an increased focus on operational simplicity all enable businesses like yours to enhance IT operations — without biting off too much of your budget. Here are five things you can do immediately and affordably to add value to your business.
Tags : 
stratus, cost cutting, it costs, it infrastructure, it capabilities, budget, economics, economic downturn
    
Stratus Technologies
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Expedia is the world's leading online travel company, providing business and leisure travelers with tools and information to easily research, plan, book, and experience travel. As the company’s early rapid growth stabilized, its IT department sought ways to help employees become more productive and collaborate more effectively across long distances. To meet this goal, the department deployed Microsoft® Exchange Server 2007.
Tags : 
expedia, microsoft, microsoft exchange, exchange server, messaging, collaboration
    
Microsoft Exchange
Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
    
Cisco
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.