addresses

Results 151 - 175 of 302Sort Results By: Published Date | Title | Company Name
Published By: Jive Software     Published Date: Feb 24, 2014
This IDC study addresses the management challenges and subsequent best practice outcomes that can be achieved through the integration of existing enterprise social network tools with other networks or enterprise applications.
Tags : 
jive, idc, social business, social software, integration, enterprise social network, esn, unified communications
    
Jive Software
Published By: CDW Quantum     Published Date: Sep 07, 2012
Have questions about what exactly Data Deduplication does for your business? This Q & A addresses a few commonly asked questions about Data Deduplication.
Tags : 
data deduplication, smb, disaster recovery, backup and recovery, data management
    
CDW Quantum
Published By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
    
LifeLock
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Microsoft     Published Date: Jul 20, 2018
This e-book addresses the opportunities and advantages that application builders gain by adopting a software as a service (SaaS) model for app development. What you will learn Learn why SaaS is the right choice for application development companies who are looking to build a competitive edge and deliver remarkable customer experiences. “Bottom line” statements at the beginning of each chapter summarize the takeaways.
Tags : 
    
Microsoft
Published By: BMC     Published Date: Nov 19, 2018
Learn how BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities
Tags : 
bmc, cognitive service management, service management, itsm, automation, digital transformation
    
BMC
Published By: NetApp     Published Date: Aug 19, 2010
This paper addresses how NetApp storage supports all strategies for SQL Server consolidation.
Tags : 
netapp, hyper-v, sql server consolidation, server virtualization, storage, tco
    
NetApp
Published By: GFI Software     Published Date: Apr 05, 2011
GFI MailArchiver is an email archiving and management solution that addresses storage issues, allows access to archived email at any time and facilitates compliance/eDiscovery requests. Why Choose GFI MailArchiver? Download this free trial to experience the benefits!
Tags : 
gfi software, mailarchiver, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: GFI Software     Published Date: Apr 05, 2011
GFI MailArchiver is an email archiving and management solution that addresses storage issues, allows access to archived email at any time and facilitates compliance/eDiscovery requests. Why Choose GFI MailArchiver? Download this free trial to experience the benefits!
Tags : 
gfi software, mailarchiver, 64 bit, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: Adobe     Published Date: Sep 23, 2019
1. This “how-to” explore-stage content helps advertisers that are either expanding or planning to expand their cross-channel coverage. The content addresses an advertiser pain point, which is the need to reach new prospects and engage them while they increasingly access content across fragmented and emerging media. 2. The advertiser challenge is to evaluate and select new, niche channels to reach their prospects and seize opportunities, but those channels may have low inventory, an ecosystem in flux, and added complexity to put in the balance. This content handholds advertisers in the face of this challenge and capture the opportunities with our SME-fueled seven steps. 3. Influence expanded use (throughput) of Advertising Cloud among current customers by helping them to activate channels such as DOOH, CTV, and programmatic audio.
Tags : 
    
Adobe
Published By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : 
data loss, ibm, data protection, backup and recovery
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 is designed to help enterprise organizations attain a 360-degree view of customers, achieve reliable user adoption, adapt quickly to business change, and accelerate project delivery and returns-all on a platform that provides enterprise levels of scalability and performance. Microsoft Dynamics CRM 4.0 addresses the stringent requirements of the enterprise in the areas of performance and scalability, application flexibility, efficient manageability, and network configurability.
Tags : 
microsoft, microsoft crm, microsoft dynamics
    
Microsoft Dynamics
Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers
    
Stratus Technologies
Published By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development
    
NexGen
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing
    
ESET
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
    
Proofpoint
Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing
    
LockLizard
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: IBM Corp     Published Date: Sep 23, 2011
The ever-increasing pace of data growth calls for a comprehensive storage strategy that protects data infrastructure from performance problems and is also flexible enough to handle changing business requirements. Read the advisory brief from Frost & Sullivan's Stratecast group and learn how IBM's suite of storage solutions addresses big data challenges. You'll also learn how you can introduce scalability and efficiency to your storage environment - avoiding the storage Armageddon.
Tags : 
technology, storage, esg, capacity, ibm
    
IBM Corp
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
Get no nonsense, practical guidance on how to succeed as a cloud provider in the marketplace. Focusing on reality and not hype, this whitepaper addresses how to best evaluate cloud services/offerings, implement operations and approach customer engagement.
Tags : 
ibm, cloud business, providers, service, service providers, strategy, ecosystem, business services
    
IBM Cloud Business
Published By: CenturyLink     Published Date: Nov 18, 2011
There are more people on earth than total IPv4 addresses, and they're expected to run out by the end of 2011. Preparing for the transition now can help you maintain business continuity during the changeover while taking advantage of immediate business benefits.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: Cisco     Published Date: Nov 08, 2012
This white paper addresses technical professionals who want to increase the efficiency and flexibility of their data center and are considering deployment of private cloud or delivery of IT as a service (ITaaS).
Tags : 
business agility, data center, unified data centers, cloud computing, cisco, virtualization, automation, itaas
    
Cisco
Published By: CDW     Published Date: Aug 28, 2015
Here are five ways that the Cisco Unified Computing System (Cisco UCS) addresses these challenges with the radically simplified Cisco UCS servers.
Tags : 
storage, servers, cloud computing, architecture, convergence, infrastructure
    
CDW
Published By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo
Published By: Enterprise Mobile     Published Date: Jul 14, 2014
The right apps can enhance employee productivity, reduce expenses and increase profitability which means apps decisions are among the most important decisions your organization makes. This brief addresses everything from app costs to how choose the right platform to build on.
Tags : 
managed mobility services, mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile management, device management, mobile applications
    
Enterprise Mobile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library