paper

Results 8601 - 8625 of 9055Sort Results By: Published Date | Title | Company Name
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
This white paper discusses what's needed to ensure that mobile workers can talk across space and time boundaries and share information to speed processes.
Tags : 
ucc, mobile workforce, ucc solutions
    
BlackBerry
Published By: BlackBerry     Published Date: Oct 03, 2012
When it comes to the office of the future, what many people envision is not an office at all -- it's access to the tools and resources they need without going to an actual office. This white paper discusses how to deliver this level of access today.
Tags : 
mobile computing, mobile workforce, mobile office, blackberry
    
BlackBerry
Published By: HP-Intel®     Published Date: Jul 22, 2013
White Paper
Tags : 
healthcare, zero downtime, integration, hospital
    
HP-Intel®
Published By: HP-Intel®     Published Date: Nov 19, 2012
Why Disaster Recovery is Different in Healthcare
Tags : 
intel, healthcare, disaster recovery, bridgehead software
    
HP-Intel®
Published By: HP-Intel®     Published Date: Nov 19, 2012
Many customers of x86 servers are facing rising costs for maintenance and management of those servers.
Tags : 
intel, healthcare, idc, smb, business risk
    
HP-Intel®
Published By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
This paper examines how seven enterprise and midsize companies spanning the equipment rental, healthcare, retail, research, and telecommunications (service provider) industries were able to reduce their annual IT cost to deliver compute services by 58% by migrating to a blade platform.
Tags : 
blade, infrastructure, server, virtualization, enterprise, midsize, blade platform
    
HP - Intel® Xeon® processors
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight Remote Support, and HP Proactive Care service offerings, specifically for HP ProLiant Gen8 servers featuring Intel Xeon technologies — including an analysis of the return on investment (ROI) from these programs for existing HP customers.
Tags : 
it infrastructure, roi, enterprise, performance management, downtime, remote support, support
    
HP - Intel® Xeon® processors
Published By: HP - Intel®     Published Date: Oct 19, 2012
Many admit to being confused by the hype and haze surrounding cloud computing. This white paper aspires to separate fact from fiction, reality from myth, and, in doing so, aid senior IT executives as they make decisions around cloud computing.
Tags : 
    
HP - Intel®
Published By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance
    
HP - Intel®
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
This paper will introduce you to the necessary steps you should take to employ HootSuite social media best practices.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Don’t look far. Your best potential social advocates are actually your own employees.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
Today’s B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Download this white paper to learn why businesses seeking a competitive edge should deploy video conferencing and the pain points associated with today's video conferencing deployments and how they can be moved to the cloud. You'll also discover how the Blue Jeans cloud video conferencing service is addressing these challenges to make successful video conferencing a reality for businesses of all sizes.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
In this white paper, you will learn how third-party service providers can help Lync to become the ubiquitous solution empowering information workers, speeding decision making, and enabling the next generation of B2B and B2C communications.
Tags : 
visual collaboration, video conferencing, collaboration, unified communications
    
Blue Jeans Network
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Diversity within device fleets means rethinking mobility management. Learn more with this complimentary Gartner research paper.
Tags : 
smartphone, tablet, mobility management, mobility, security, enterprise applications
    
Good Technology Corporation
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Start   Previous    338 339 340 341 342 343 344 345 346 347 348 349 350 351 352    Next    End
Search Resource Library