• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

usage

Results 251 - 275 of 311Sort Results By: Published Date | Title | Company Name
By: Coupa Software Inc.     Published Date: May 30, 2017
Whether you’re looking to make your first eProcurement purchase or expanding technology usage across the full range of spend management process, the Forrester Wave: eProcurement Report identifies leading eProcurement solutions.
Tags : 
coupa, eprocurement, ecommerce, finance management, epayment, web service security, customer interaction service, customer service
    
Coupa Software Inc.
By: IBM     Published Date: Dec 06, 2013
Data workloads are rapidly evolving and changing. Today's enterprises have many different types of applications, with different usage patterns, all constantly accessing data. As a result, data services need to be more robust and scalable. IBM PureApplication System and IBM PureData™ System for Transactions are designed to meet these needs. This paper shows how the latest technology and expertise built into these systems gives businesses an innovative approach to rapidly create and manage highly scalable data services, without the complexity of traditional approaches.
Tags : 
ibm, ibm puredata system, ibm pureapplication system, data, data center, data management, applications, workloads
    
IBM
By: Oracle     Published Date: Mar 04, 2014
This report looks at customers’ and businesses’ attitudes toward usage of multichannel interactions, and identifies the issues and potential pitfalls that businesses will face when trying to improve the customer communications across channels.
Tags : 
oracle, multichannel, oracle service cloud, cross chanel, mobile service, telephony, wireless communications
    
Oracle
By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper explains how to quantify the electricity savings and provides examples of methods that can greatly reduce electrical power consumption.
Tags : 
apc by schneider electric, electricity usage, energy efficient data centers, power consumption, network infrastructure, total cost of ownership, tco, infrastructure
    
APC by Schneider Electric
By: Cisco     Published Date: May 11, 2015
An infographic displaying the time usage and activities of a hypothetical executive.
Tags : 
innovation, technology, efficiency, communications
    
Cisco
By: AdRoll     Published Date: Feb 21, 2018
This is Econsultancy’s second State of Marketing Attribution report, published in association with AdRoll and based on an online survey of 987 practitioners in Europe, North America and Asia-Pacific. We expanded on last year’s report, which focused solely on Europe, and made the report a global comparison. This report reviews the current adoption levels of marketing attribution, the confidence in its usage and the effectiveness of companies’ attribution methods.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
    
AirDefense
By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards
    
Aladdin
By: Schneider Electric     Published Date: May 03, 2018
While many OEMs are aware of new technologies to make machines more energy-efficient, they are reluctant to make changes due to the perception that it will make their machines more expensive to sell. The constraints of cost reduction, usage of resources and energy reduction are becoming key drivers in the industry as consumers require manufacturers to be more “green”. This paper demonstrates how incorporating sustainable design can add value to their machines and differentiate OEMs from the competition.
Tags : 
    
Schneider Electric
By: IBM     Published Date: Apr 23, 2008
The IBM Active Energy Manager is a unique software tool that gives you the detailed information you need to closely and accurately monitor power consumption in your data center. Watch this IBM demo to see the extensive capabilities of Active Energy Manager, from setting automatic caps on energy usage to tracking trends over any time period you specify.
Tags : 
energy, energy efficient, power, data center, datacenter, ibm, ibm opt it, opt it
    
IBM
By: IBM     Published Date: Jun 11, 2008
According to Selfserviceworld.com, 50 percent of consumers prefer to use credit cards at self-checkout counters. As credit card usage continues to rise, it's beneficial for retailers to consider non-cash methods of payment. Download the white paper and see how self-checkout solutions from IBM can help increase sales and improve customer satisfaction.
Tags : 
checkout, retail, point of sale, pos, customer service, ibm, mmdg, customer satisfaction
    
IBM
By: IBM     Published Date: Jun 19, 2008
Discover the high performance, flexibility and extreme availability of IBM System x3550 Express rack-mount server. IBM PowerExecutive software manages energy usage to keep costs and heat output down. And advanced predictive failure analysis and Light Path Diagnostics keep you up and running, reduce down time and service costs. Watch this video demo of the IBM System x3550 Express to see how it compares to competitive products and how it can bring savings, power and reliability to your business.
Tags : 
ibm, express seller, system x, server, infrastructure, server hardware, servers
    
IBM
By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile
    
PKWARE
By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security
    
Secure Computing
By: Quocirca     Published Date: Jul 11, 2007
Wide areas networks (WANs) are essential to the majority of businesses, connecting remote locations and individuals back to centralized IT resources. But as the network is expected to handle more bandwidth intensive applications such as voice and video it is essential to ensure the WAN usage is well managed – eliminating unwanted traffic and accelerating business content.
Tags : 
wan, wans, wide area network, wan acceleration, remote workers, bandwidth management, traffic management, quocirca
    
Quocirca
By: Quocirca     Published Date: Sep 13, 2007
The general public is becoming increasingly cynical about the environment claims of businesses and with much bad press around data centers, information technology (IT) is in the front line. But data centers are actually the easiest bit of IT to control and consolidating infrastructure into them can help reduce the overall energy usage of IT and, if used well, IT itself can help businesses reduce their overall carbon footprint.
Tags : 
environment, environmental, green, green business, efficient, efficiency, energy, energy efficient
    
Quocirca
By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony
    
Ingate Systems
By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP including Least Cost Routing (LCR).
Tags : 
ip fax, faxing, ip faxing, foip, fax server, gfi, real time, real-time faxing
    
GFI
By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
    
Knoa
By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks
By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
By: TamoSoft     Published Date: Feb 14, 2008
This white paper covers the VoIP basics, deployment and usage of a VoIP solution over both wireless (Wi-Fi) and wired (Ethernet) network infrastructures, guidelines on efficient monitoring and analyzing VoIP network traffic, troubleshooting various VoIP problems, etc.
Tags : 
voip, wifi, voip deployment, voip monitoring, voip network, ip network, ip telephony, voice over ip
    
TamoSoft
By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
    
WiChorus
By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance
    
NetSupport
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter