school

Results 176 - 200 of 208Sort Results By: Published Date | Title | Company Name
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: Astaro     Published Date: Aug 10, 2009
The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.
Tags : 
inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter, security gateway, internet security, internet, firewall, proxy
    
Astaro
Published By: SAS     Published Date: Jun 05, 2017
For organizations to succeed with the onslaught of devices, sensors and tools that innovation garners, data must no longer be treated as a byproduct but instead as an asset. And data-driven innovation must start at the top. That's what Michael Schrage, Fellow at MIT Sloan School's Initiative on the Digital Economy, said during the Harvard Business Review webinar, Leadership and Big Data Innovation. Find out why data experimentation, governance and culture are part of the next leadership challenge for organizations.
Tags : 
    
SAS
Published By: Polycom     Published Date: Dec 18, 2014
To remain significant in an increasingly digital information driven world, IT leaders need to drive tangible business value. Dr Carsten Sørensen, Associate Professor in Digital Innovation at The London School of Economics and Political Science, outlines how IT is no longer confined to being a support function but is becoming business critical across all departments.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, infographic, global, trends
    
Polycom
Published By: DocuSign     Published Date: Apr 12, 2017
Learn how Salesforce, Smartsheet, and School of Rock implemented DocuSign in their organization and see an increase in ROI.
Tags : 
    
DocuSign
Published By: Oracle     Published Date: Sep 30, 2014
Authentication. Whitelists. Spam complaints. Metrics. Ensuring email deliverability is harder than it sounds in today’s complex technical landscape. Make sure your team has all the nitty-gritty know-how you need to get your best messages into inboxes – and to protect your sender reputation.
Tags : 
oracle, marketing, cloud, connected, customer, modern, sales, sites visited
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
Mobile devices are transforming how we interact with each other and the world. Tapping mobile potential doesn’t have to take sorcery. Don’t let your efforts to keep up create a fragmented customer experience. You need an orchestrated way to plan, respond, and thrive in the new mobile marketing world. Read how.
Tags : 
oracle, marketing, cloud, connected, customer, modern
    
Oracle
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Madison Logic     Published Date: Jun 03, 2013
With the right execution, an effective B2B lead nurturing program begins as soon as a prospect interacts with your content, and continues until a relationship has been built, the lead is qualified and forwarded to a sales person for follow up - which can take months. However, nurturing has proven to be extremely worthwhile, as half of all buyers' inquiries eventually result in a purchase. This white paper summarizes the key takeaways of Madison Logic's recent webinar, Lead Nurturing: A Multi-Touch Journey, which features: Ruth P. Stevens, Adjunct Professor, Columbia Business School; Author, Maximizing Lead Generation: The Complete Guide for B2B Marketers Erik Matlick, CEO Madison Logic Lana McGilvray, (Moderator) Principle, Blast PR
Tags : 
    
Madison Logic
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
Denison University utilizes a multi-faceted direct marketing program to communicate with their alumni and other key constituents. Email marketing has become a more important part of their development strategy in recent years due to the cost effectiveness, tracking capabilities and growing use of email and internet to contribute to the school’s Annual Fund.
Tags : 
brightwave, email design, email marketing, philanthropy, fund raising, fund raiser, alumni, alumnus, university, college
    
BrightWave Marketing
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management on higher education and K-12 campuses and details how a suitable anti spam solution must address particular challenges for campus IT administrators.
Tags : 
spam, antispam, anti-spam, university, universities, college, colleges, school, education, institution, dormitory, spam management, email security, roaring penguin
    
Roaring Penguin
Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
    
Cyberoam
Published By: AT&T     Published Date: Jun 25, 2008
To maximize investments in mobile technology, companies must be able to measure productivity gains from mobile working. Professor Marco Iansiti of the Harvard Business School and Jay Jamrog, Senior Vice President of Research with the Institute for Corporate Productivity, offer advice.
Tags : 
productivity, mobility, mobile technology, mobile technologies, pda, at&t
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Revinetix, Inc.     Published Date: Nov 11, 2010
Standard School District in Bakersfield, CA had outgrown their backup system and needed to find a replacement. This case study describes their challenges and how they solved their backup problem with a complete disk backup solution.
Tags : 
revinetix, school district, data protection, disk backup, network backup, tape backup, backup solution, exchange backup, sql backup, windows backup, school districts, affordable backup, flexible backup
    
Revinetix, Inc.
Published By: Revinetix, Inc.     Published Date: Nov 12, 2010
Juan Diego Catholic High School, with 500+ networked Apple Mac computers, needed to replace their poor performing tape backup system. They evaluated disk backup appliance solutions and select the Revinetix Sentio.
Tags : 
revinetix, disk backup, tape backup, backup appliance, deduplication, education, netwotk backup, backup solutions, school district, mac backup, apple backup, mac network
    
Revinetix, Inc.
Published By: BlackBerry     Published Date: Oct 03, 2012
RIM recently worked with Park Manor Public School in Elmira, ON to integrate BlackBerry PlayBook tablets in two Grade 6 classrooms. Check out this great story on the value of PlayBook tablets in Education!
Tags : 
tablets, blackberry, rim, classroom applications, real world applications, mobile computing
    
BlackBerry
Published By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance
    
HP - Intel®
Published By: CDW     Published Date: Nov 12, 2012
Cedar Falls Schools create an infrastructure to support classroom technology programs ahead.
Tags : 
cdw, case study, cedar falls, byod, bring your own device, bandwidth
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Preparing for the influx of mobile computing devices in schools.
Tags : 
cdw, consumerization of technology, mobile computing devices, influx of byod
    
CDW
Published By: Aerohive     Published Date: May 19, 2015
The Leys School had an objective to provide pupils with a home-like IT experience.
Tags : 
wi-fi solutions, eduaction, aerohive wi-fi solution benefits, wi-fi network challenges, wi-fi experience, wlan, improve education with wi-fi solutions, wlan solutions, aerohive
    
Aerohive
Published By: Harvard Business School     Published Date: Jan 30, 2015
It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
Harvard Business School
Published By: Harvard Business School     Published Date: Feb 12, 2015
To thrive, companies need to innovate. And to innovate, companies need collaboration. Discover how bringing together diverse expertise, experience, and points of view can help you maximize contributions from every member of your team—and drive new levels of success.
Tags : 
high potentials leadership, high potential leaders, high-impact or fast-track individuals, top performers, harvard business school, executive education program, collective genius, linda hill, effective leaders
    
Harvard Business School
Published By: Rosetta Stone     Published Date: Nov 28, 2016
World language acquisition is an important component of global competitiveness, but only one in five U.S. public school students study a world language.
Tags : 
    
Rosetta Stone
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library