Skip to main content
 

white paper

Results 351 - 375 of 6132Sort Results By: Published Date | Title | Company Name
Published By: Zebra     Published Date: Oct 12, 2011
Re-pricing products in the store has become a strategic tool that retailers apply to increase traffic and sales. This white paper explains how retailers are profiting from mobile markdown printing and how stores can leverage different printing applications to create more value.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, retail
    
Zebra
Published By: Zebra     Published Date: Oct 12, 2011
This white paper outlines the requirements for kiosks - optimizing design, placement and component selection - in order to help you and your business meet specific use cases, various environments and goals.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, retail
    
Zebra
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Are you considering data virtualization for your organization today? If so this whitepaper synthesizes the 10 things you need to know as you commence your data virtualization journey.
Tags : 
    
TIBCO Software GmbH
Published By: TIBCO Software GmbH     Published Date: Jan 22, 2019
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
    
TIBCO Software GmbH
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper offers a detailed look at the solution’s architecture, and some of the key features that make it stand apart from the competition.
Tags : 
ca uim, infrastructure management solutions, infrastructure management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This whitepaper details the 5 essential pillars of API management and which components are required for effective, enterprise-level API Management.
Tags : 
api management, business security, components of api management, api solutions, enterprise level api management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This White Paper provides information on how enhance delivery secure and improve customer experience.
Tags : 
security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.
Tags : 
identity-based security, business protection, identity, security solutions, new trends to secure business
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 09, 2015
This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 16, 2014
A CA Technologies white paper on creating a "Win-win" for both IT and its consumers.
Tags : 
improving consumer experience, optimal it service delivery, cloud service management
    
CA Technologies
Published By: Dell     Published Date: Nov 20, 2014
A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.
Tags : 
durable devices, instantgo2, it protection, encryption
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
server migration, product support cycle, server compatibility, it support
    
Dell
Published By: TriNet     Published Date: Jan 17, 2012
Read this white paper to learn about 10 principles to follow in order to build an effective human capital plan for your organization.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, finance
    
TriNet
Published By: TriNet     Published Date: Jan 17, 2012
This white paper provides valuable insight on how to build an HR strategy that produces results in any economy.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, finance
    
TriNet
Published By: TriNet     Published Date: Jan 17, 2012
Read this white paper to learn about 10 principles to follow in order to build an effective human capital plan for your organization.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.