Skip to main content
 

technology

Results 4926 - 4950 of 5370Sort Results By: Published Date | Title | Company Name
Published By: IntaPeople     Published Date: Nov 04, 2010
Great perks are often handed out freely to the sales team, but what about the IT staff that support this function? If employers are going to grow their business, they need to keep their best IT staff happy.
Tags : 
business, staff retention, technology, human resources, management
    
IntaPeople
Published By: Taleo     Published Date: Jan 25, 2012
Notably, more than 1,000 CEOs were asked: "How important are the following sources of competitive advantage in sustaining your growth over the long term?" The number one response - chosen by 97 percent - was "access to, and retention of, key talent."
Tags : 
taleo, human resources, talent retention, talent management, hr management, employee talent
    
Taleo
Published By: Phoenix Contact USA     Published Date: Nov 09, 2010
A WirelessHART gateway with WLAN connection means better communication, flexibility and increased efficiency for your HART sensor network.
Tags : 
industrial wireless technology, wirelesshart, wirelesshart gateway
    
Phoenix Contact USA
Published By: Prinzo Group     Published Date: Dec 01, 2010
Preempting enterprise resource planning (ERP) project failure could well become the Holy Grail for organizations seeking to improve their technology infrastructure, organizational efficiency, and competitiveness.
Tags : 
erp, software implementation, project assurance, software project management, enterprise software, enterprise resource planning, implementation
    
Prinzo Group
Published By: EMC Corporation     Published Date: May 27, 2011
This Buyer Case Study by IDC details the EMC IT mission to transform its backup and recovery operations, with data deduplication technology at the core of this transformation.
Tags : 
emc, backup and recovery, data deduplication, availability, network bandwidth, idc buyer case study, enterprise datacenter
    
EMC Corporation
Published By: Hitachi ID Systems     Published Date: Dec 20, 2010
IAM in the Cloud: an overview of technology and value
Tags : 
identity management, cloud computing, iam, security
    
Hitachi ID Systems
Published By: Red Hat     Published Date: Jan 21, 2011
Chuck Dubuque - Product Marketing Manager, Red Hat Server and desktop virtualization technologies, which bring cost and agility advantages to enterprise IT, have become mainstream in most datacenters. However, after nearly 10 years, virtualized servers still only represent about 30 percent of x86 production workloads due to technology limitations and the expense of proprietary virtualization platforms. In this session, Chuck Dubuque will cover: * The benefits of datacenter virtualization * Technologies in the open source community that will enable pervasive virtualization * The move to the cloud * The particular advantages of Red Hat Enterprise Virtualization and the Red Hat subscription model
Tags : 
red hat virtual tradeshow, live event, business agility, enterprise virtualization, product marketing, server, desktop virtualization, datacenter, virtualized server
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: FPSN, LLC     Published Date: Jan 03, 2011
Creating awareness to the current state of video surveillance used for the majority of US businesses and what technology allows for the most effective systems for green usage, higher detail quality and overall smart purchases
Tags : 
ip based, megapixel, surveillance, public safety, mobile video, spy cameras, wireless, cctv, network video, outdoor surveillance, crime video, green energy
    
FPSN, LLC
Published By: ESET, LLC.     Published Date: Oct 27, 2011
If you're looking to evaluate antivirus software based on its price, you're missing the larger picture. You need an antivirus solution that will work with today's complicated infrastructures that include virtualization, you need proactive protection from malware and you need an antivirus solution that won't rob your employees of productivity. Register for the "Finding the Right Antivirus Solution e-Kit" to better understand what goes into the process of evaluating antivirus software.
Tags : 
eset, technology, security, anti virus, internet security
    
ESET, LLC.
Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
Published By: Agile     Published Date: Jan 24, 2011
This paper explains the current environment IT organizations are faced with in terms of hiring and retaining top talent, and provides four hiring strategies technology leaders must consider to remain competitive.
Tags : 
it staffing, it recruitment, hiring top talent, it jobs, high-demand it skills
    
Agile
Published By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : 
e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance
    
Forensics Consulting Solutions
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to backup processes. A new architectural approach allows IT to project virtual servers and data to the edge, providing for local access and performance. Learn to take advantage of this new approach to recover faster, reduce risk, and save money.
Tags : 
it services, virtual servers, recovery, reduce risk, storage, performace
    
Riverbed Technology, Inc.
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk
    
Riverbed Technology, Inc.
Published By: ACT-IAC     Published Date: Feb 03, 2011
Comments by the American Council for Technology-Industry Advisory Council represented in Office of Management and Budget memorandum
Tags : 
federal it, technology, communications, acquisition, government, omb
    
ACT-IAC
Published By: IBM Software     Published Date: Feb 08, 2011
This guide outlines a systematic approach to software evaluation and selection that aligns best practices and leading-edge technology with planning activities in an organization.
Tags : 
ibm cognos, planning and budgeting, forecasting, software evaluation, business intelligence, performance management
    
IBM Software
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services, stocks, equities, filtering companies, filter, electronic trading, back-office
    
ETNA Software
Published By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : 
verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer
    
VeriSign
Published By: conTgo     Published Date: Feb 14, 2011
Levering Social Media and Mobile Technology in Times of Crisis
Tags : 
social, media, corporate, travel, crisis, mobile, technology, services, disruption, contgo, intelligent.travel, kurt, george
    
conTgo
Published By: ETNA Software     Published Date: Feb 22, 2011
This whitepaper covers programming and design aspects of installation experience customization.
Tags : 
silverlight, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Published By: KernSafe Technology     Published Date: Feb 23, 2011
KernSafe add support forr High-Availability iSCSI SAN in iStorage Serve for Windows Server 2008
Tags : 
kernsafe, istorage server, high-availability, iscsi, iscsi san, windows server 2008, windows, storage, virtualization, storage virtualization
    
KernSafe Technology
Published By: ISOdx Solutions     Published Date: Feb 24, 2011
Customer support performance has declined in tandem with increase of technology complexity. Incidents are harder to solve, customer downtime has escalated ??customer success is impacted and the bottom line is stressed. Suppor
Tags : 
automated diagnostics
    
ISOdx Solutions
Published By: e-LYNXX Corporation     Published Date: Feb 25, 2011
AVS Technology's automated vendor selection procedure creates a competitive bidding environment that encourages bidders to reduce their pricing by 25% to 50% to fill production gaps.
Tags : 
avs technology, new procurement process
    
e-LYNXX Corporation
Start   Previous    191 192 193 194 195 196 197 198 199 200 201 202 203 204 205    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.