• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

key

Results 276 - 300 of 3478Sort Results By: Published Date | Title | Company Name
By: QTS     Published Date: Feb 04, 2016
Download Vormetric’s Annual Data Threat Report, featuring key insights from 451 Research, to learn more about the latest trends in data encryption and data security and how your business can best protect its most vital asset: it’s data.
Tags : 
vormetric, 451 research, data encryption, data security, threat report, security, data management
    
QTS
By: Dell EMC     Published Date: Nov 10, 2015
This paper explains four key ways in which flash storage can enable and improve VDI.
Tags : 
    
Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
    
Dell EMC
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software GmbH
By: CA Technologies     Published Date: Aug 01, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, smart phones, customer interaction service, customer relationship management, customer service, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, customer interaction service, customer service, web service management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, customer satisfaction, customer experience management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, it management, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, customer satisfaction, customer experience management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, mobile data systems, mobile workers, smart phones, customer interaction service, customer relationship management, customer satisfaction, customer experience management, cloud computing
    
CA Technologies
By: CA Technologies     Published Date: Nov 12, 2014
This white paper offers a detailed look at the solution’s architecture, and some of the key features that make it stand apart from the competition.
Tags : 
ca uim, infrastructure management solutions, infrastructure management
    
CA Technologies
By: KeyBanc Capital Markets     Published Date: Nov 12, 2015
Private equity and investment banking experts share observations on what a distribution company owner can expect when preparing to sell a stake in the company, and how to prepare the business to attract potential buyers’ attention and maximize the price it can command.
Tags : 
industrial distribution, industrial distribution business owner, selling a business, private equity, financial sponsor, financial investor, strategic partner, growth strategy, investment, wealth diversification, acquisition, value creation
    
KeyBanc Capital Markets
By: Dell     Published Date: Oct 24, 2014
Microsoft is discontinuing support for Windows Server 2003 in July 2015, so now is the time to start planning your move and avoid possible server management, performance, security and compliance issues. This paper explores the new features and benefits of Windows Server 2012 R2, as well as key considerations for moving from legacy platforms. You'll also learn how Dell Software can help you prepare for the move.
Tags : 
server support, server management, it security, legacy platforms
    
Dell
By: TriNet     Published Date: Jan 18, 2012
This paper acts as a well-qualified resource to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneurs will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
    
TriNet
By: TriNet     Published Date: Jan 18, 2012
This paper acts as a well-qualified resource for to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, human resource technology, cisco certification, microsoft certification, linux certification
    
TriNet
By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
Plas Plastic Packaging in Turkey virtualizes IT, gaining return on investment in 12 months and helping employees save 10 working days a year.
Tags : 
dell, virtualization, ™poweredge ™servers, dell equallogic, plas plastic packaging, networking, it management
    
Dell Brought to you by Intel
By: Dell     Published Date: May 07, 2015
Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.
Tags : 
    
Dell
By: Dell     Published Date: Feb 04, 2015
Microsoft is discontinuing support for Windows Server 2003 in July 2015, so now is the time to start planning your move and avoid possible server management, performance, security and compliance issues. This paper explores the new features and benefits of Windows Server 2012 R2, as well as key considerations for moving from legacy platforms. You'll also learn how Dell Software can help you prepare for the move.
Tags : 
    
Dell
By: Dell     Published Date: May 04, 2015
This Infographic highlights the four key steps to building a private cloud foundation and illustrates how Dell Cloud featuring Intel® technology provides the end-to-end solutions to deliver measurable business benefits.
Tags : 
    
Dell
By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : 
mobile performance, mobile app, customer engagement, channeling
    
Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
By: KeyBank Commercial Banking     Published Date: Nov 08, 2017
See what’s on the minds of middle market leaders by reading our latest quarterly report now.
Tags : 
middle market, us economy, economic outlook, business acquisitions, business expansion, treasury regulations, corporate tax reform
    
KeyBank Commercial Banking
By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance, data management
    
Websense
By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management, data management
    
Websense
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter