coverage

Results 76 - 96 of 96Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
Located at a hub of innovation, Hyatt Regency Santa Clara caters to sophisticated, technology-savvy guests. This made it the perfect location for Hyatt Hotels to use as a model property in its quest to create the digital hotel of the future. Wi-Fi is one of the most visible services a hotel provides, and is crucial to guest experiences and loyalty. “We had limited Wi-Fi coverage that was not designed for the modern, mobile digital guest,” explains Dania Duke, general manager at Hyatt Regency Santa Clara. “We quickly learned that to stay competitive in Silicon Valley, we need to have the fastest, best Wi-Fi available.”
Tags : 
    
Cisco
Published By: Tricentis     Published Date: Jun 22, 2015
This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.
Tags : 
testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
Tricentis
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business
    
Entrust Datacard
Published By: JBoss     Published Date: Sep 23, 2008
Most white papers and webinars available on the Internet about choosing enterprise middleware focus the selection process around criteria such as licensing costs, technical coverage of long lists of specified functionalities, and vendor viability. While these criteria may have been suitable in the past, the experience of many enterprise architects leading J2EE projects over the past few years suggest that they are not enough. What’s missing? People costs.
Tags : 
middleware, jboss, roi, productivity, redhat, red hat, linux, penguin
    
JBoss
Published By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, discover the hidden costs of out-of-the-box Wi-Fi. Fluctuating connections can potentially cost thousands per day! Now get cost outlays for 5 vendors in 2 different scenarios; learn which 10 component(s) may avoid catastrophe; and find out when to prioritize coverage over capacity. If your business is riding on Wi-Fi, it pays to play it safe. Learn how-download your copy of this free white paper now.
Tags : 
ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless
    
Ruckus Wireless
Published By: CBIZ     Published Date: Aug 27, 2013
With so many provisions and rules involved in the Affordable Care Act, it’s easy to get confused about what takes effect when. This timeline covers from 2010 through 2018 in a clear, 1-page layout. It also indicates what provisions apply to all plans and those which apply only to non-grandfathered plans.
Tags : 
timeline, aca timeline, patient-centered outcome research fee, fsa cap, summary of benefits coverage, notice of marketplace options, health care reform, affordable care act
    
CBIZ
Published By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : 
health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage
    
CBIZ
Published By: Brandwatch     Published Date: Apr 22, 2015
Download this case study to learn how agency DDB was able to use Brandwatch’s powerful coverage and flexible filtering capabilities to measure the success of its new Game of Thrones campaign.
Tags : 
social media, social analytics, social media monitoring, campaign measurement, campaign management, social listening, social business intelligence, social media campaigns
    
Brandwatch
Published By: Cision     Published Date: May 02, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands
    
Cision
Published By: Cision     Published Date: Jul 08, 2016
Social. Emails. Blogs. Brands have more ways than ever to reach customers, yet your brand, your competitors, mom-and-pop shops and Fortune 500s fiercely compete for media coverage. What gives?
Tags : 
cision, media coverage, public relations, brands
    
Cision
Published By: Informatica     Published Date: Jul 07, 2011
Build your business case for MDM with an illustrated, step-by-step approach that shows executives and managers how MDM generates a single, reliable data set to empower customer- and partner- facing teams to improve sales, customer service and channel operations.
Tags : 
informatica, master data management, mdm, data set, competitive advantage, channel coverage, customer view, bad data
    
Informatica
Published By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : 
elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
    
Elastic Collision
Published By: TriNet     Published Date: Jun 13, 2011
How to Get the Package You Need -Without Breaking the Bank
Tags : 
trinet, benefits, human resources, costs, health plans, smb, insurance, doctors
    
TriNet
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
The intent of this whitepaper is to explain the business requirement for physically auditing assets, to explore the bene?ts associated with conducting physical audits and to provide a step by step process for performing them.
Tags : 
real asset management, ram, physical audits, write-offs, data standards, manual, barcode, data consolidation
    
Real Asset Management Inc.
Published By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : 
georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage
    
CDW
Published By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If you’re a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If you’re an independent consultant, you’ll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report
    
ArborNetworks
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
    
Akamai Technologies
Published By: Tricentis     Published Date: Jan 08, 2018
Data. It seems to be everywhere today and yet we can never get enough of it. But as it turns out, a lack of data isn’t our problem -- our problem is the difficulty piecing together, understanding and finding the story in all the data that’s in front of us. In software testing in particular, the need for consolidated, meaningful test metrics has never been higher. As both the pace of development and the cost of delivering poor quality software increase, we need these metrics to help us test smarter, better and faster. Fortunately, business intelligence now exists to make this goal a reality. The analytics these tools provide can help drive efficient and effective testing by providing teams with insight on everything from testing quality and coverage to velocity and more. And this knowledge can position the QA team as trusted experts to advise the entire software development team on steps that can ensure a better quality end result.
Tags : 
    
Tricentis
Published By: Darktrace     Published Date: Jun 17, 2019
The self-learning capability of Darktrace’s Enterprise Immune System allows TruWest to stay ahead of today’s sophisticated attackers, affording the credit union and its clients confidence in the integrity of their data and in the security of their assets. And with Darktrace’s coverage of Office 365, TruWest’s entire digital environment is protected by world-leading cyber AI.
Tags : 
    
Darktrace
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4     Next   End
Search Resource Library