• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

providers

Results 876 - 900 of 915Sort Results By: Published Date | Title | Company Name
By: Intel Corp.     Published Date: Apr 25, 2012
Download this guide, which is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed by three cloud infrastructure providers.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
By: Polycom     Published Date: Dec 18, 2014
In the next few years we shall see explosive growth in the use of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. The technology has developed considerably from early adopters to its current form of mass market roll-out. It’s anticipated that nearly half of information workers will have some type of personal video solution in 2016, up from just 15% today. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses will be looking to providers of telephony, business applications and network infrastructure services to include this capability as part of their offering. This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom
By: Intel     Published Date: May 23, 2017
Using the IP Multimedia System (IMS) architecture, Communications Service Providers (CSPs) can offer session-based services. Any Internet Protocol/Session Internet Protocol (IP/SIP) device can establish a session with the control servers’ Call Session Control Function (CSCF) and then establish connections with other IP/ SIP devices to deliver voice, video, and data sessions between the two end-clients.
Tags : 
    
Intel
By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : 
virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
    
SafeNet
By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan
    
WebEx
By: Intel     Published Date: May 02, 2017
Enabling communications service providers to scale up and support rapidly rising 4G LTE traffic while controlling costs
Tags : 
virtualisation, cost reduction, network transformation
    
Intel
By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel
By: SAP     Published Date: Jul 17, 2012
This research is a continuation of our Visi-MAP Module-1. While we identified hot technologies, emerging manufacturing approaches and high growth enabling applications in Module-1 of the research, Module-2 will provide an industry case analysis for various end-user challenge scenarios and solution/technology approaches. The primary aim is to catalyze end-user adoption of these solutions and make them into common practices. Live case examples of each of the company are also discussed in detail to encapsulate the delivery model of solution providers.
Tags : 
sap, manufacturing, white paper, research, technology, case analysis, ebusiness, business intelligence
    
SAP
By: VMTurbo     Published Date: Mar 25, 2015
In this paper, we outline the need for “Software-Driven Control” – the intelligence or “control plane” that can take advantage of these new software-defined capabilities, enabling enterprises and service providers to bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : 
vmturbo, cloud control plane, software-driven control, software-defined capabilities, software-defined datacenter, it management, knowledge management, enterprise applications
    
VMTurbo
By: InsideUpbg     Published Date: May 21, 2015
Table of Contents Facts about Business VoIP | Key Benefits of Business VoIP | Major Drawbacks | Top Questions to Ask Vendors | Evaluating Providers
Tags : 
    
InsideUpbg
By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
By: eDataSource     Published Date: Jan 05, 2015
We track daily 25 million email campaigns from 50,000 brands. Download this 1 page white paper on how we do it and learn how you gain real-time e-mail competitive intelligence.
Tags : 
email campaigns, email competitive intelligence, email monitoring, real-time, email service providers
    
eDataSource
By: Pure Storage     Published Date: Feb 01, 2016
Hear from Assistant IT Director Mike Russell on how Shannon Medical is using Unidesk and Pure Storage to successfully deploy VDI, deliver McKesson EMR, and give providers persistent, personal desktops to maximize patient outcomes.
Tags : 
unidesk, pure storage, vdi, vdi deployment, mckesson emr, it management, enterprise applications
    
Pure Storage
By: Lenovo     Published Date: Jun 09, 2015
Tier-1 Original Equipment Manufacturers (OEMs) like HP, Dell and Lenovo are facing new competition from Original Design Manufacturers (ODMs), and other companies providing “white-box” equipment based on open-source specifications. As this paper will discuss, there are more factors than initial price
Tags : 
lenovo, cloud provider, hardware, msp, odm, infrastructure, internetworking hardware, server hardware
    
Lenovo
By: AppDynamics     Published Date: Sep 20, 2017
Every industry is going through digital transformation. Whether retail, manufacturing, media, finance, or software - in order to survive organizations are changing the way they operate in order to meet the demands of today’s connected customers. Whether it’s Uber redefining urban transportation for consumers, Slack enabling teams to collaborate in totally new ways, or Docker rivaling legacy virtualization providers, innovation is being powered by technology, and it’s happening faster than ever before.
Tags : 
development operations, digital transformation, application, automation, safeguards
    
AppDynamics
By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening, human resource technology
    
HireRight
By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure
    
Black Box
By: PGi     Published Date: May 03, 2019
Frost & Sullivan research shows that unified communications (UC) is here to stay, with almost two-thirds of companies reporting that UC is deployed within their organization. GlobalMeet partnered with Frost & Sullivan to define unified communications as a service and outline how the cloud-based solution supports corporate goals. UCaaS delivers a wide variety of benefits to businesses, but not all UCaaS solutions are alike. Download the white paper to learn what key features and functionality to look for when evaluating potential UCaaS providers.
Tags : 
    
PGi
By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE
By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. It’s the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation
    
Auth0
By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Data sharing is the first priority in web conferencing. Web conferencing doesn't work well for day-to-day collaboration. Everything is a scheduled, “meet-me” conference. You can’t just call someone. Web conferencing providers don’t offer a complete solution. You have to separately manage and integrate video systems and instant messaging through independent platforms that do not integrate into the web conferencing service, resulting in an inferior and disjointed user experience. Download now to learn why Lifesize Cloud is the ONLY solution you need!
Tags : 
lifesize, web conferencing, team collaboration, data sharing, video systems, software development, wireless, data management
    
LifeSize, a division of Logitech
By: SilverSky     Published Date: Mar 26, 2014
In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.
Tags : 
silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution
    
SilverSky
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter