work practices

Results 226 - 250 of 381Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Apr 24, 2015
A brief on how to use network auditing and configuration with the maximum of efficiency and utility.
Tags : 
networking, api, applications, management, visualizing, best practices, monitoring, auditing
    
Riverbed
Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand. Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : 
cisco, design, network architecture, mobile devices, best practices, vmdc, data center, cloud computing, iaas
    
Cisco
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl
    
Symantec
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions, make first move into the cloud, best practices cloud computing, security data
    
Macquarie Telecom
Published By: IBM     Published Date: Mar 10, 2015
Agile is a cornerstone of software delivery from IT to complex and embedded systems. This research-based paper reports on key challenges, patterns and working practices for extending Agile to cross-discipline deployment in product and systems development.
Tags : 
ibm, agile deployment, embedded software, product development, systems development
    
IBM
Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint is written by CEOs who “get it,” i.e., the challenges CEOs face in maintaining a suitable work–life balance. These leaders are dedicated to their organizations, and work the requisite long hours, yet they all recognize the value — and necessity — of taking time out to nourish the rest of their lives.
Tags : 
work-life balance, burnout, healthy balance, business practices, success strategies, coping mechanisms
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
Read this white paper to learn about how Skillsoft's acquisition of SumTotal Sytems LLC is a huge step forward to deliver relevant, real-world support to the modern workforce where they are working and when they need it in a new combined content, service, and software delivery paradigm.
Tags : 
workforce support services, employee experience, communication mechanisms, enterprise, service performance, technology performance, business practices
    
Skillsoft
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how a simple, open and smart network can help with accelerating the deployment and delivery of applications. This Whitepaper on Network Virtualization best practices explains how to transform and bridge the virtual and physical networks.
Tags : 
network virtualization, best practices, networking, juniper, juniper networks
    
Juniper Networks
Published By: Teradata     Published Date: Jan 30, 2015
Our goal is to share best practices so you can understand how designing a data lake strategy can enhance and amplify existing investments and create new forms of business value.
Tags : 
data lake, data warehouse, enterprise data, migration, enterprise use, data lake strategy, business value
    
Teradata
Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework
    
Intralinks
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices
    
Qualys
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
The number of employees still engaged after their first six months on the job is roughly 40%. As the workplace continues to evolve, it’s more important than ever to develop an engagement strategy that will combat the fatigue you’ll see among the other 60% of your employees. You can’t rely on 20th-century strategies for 21st-century challenges. Download our article to learn the top 6 workplace trends you’ll experience in 2015, as well as best practices to follow to drive engagement.
Tags : 
employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives, reward ideas, recognition programs, recognition gifts, employee programs, recognition ideas, employee motivation, recognition program ideas
    
BI WORLDWIDE
Published By: Polycom     Published Date: Dec 18, 2014
IT leaders are now at the center of a significant technological and marketplace shift and must understand how the world is changing and the role video will play in the world of tomorrow. In our infographic, global futurist Jack Uldrich outlines the key trends driving the evolution of work practices, and what this means for the CIO of today.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, infographic, global, trends
    
Polycom
Published By: Esker     Published Date: Dec 08, 2014
Approximately 79% of customers seeking customer service and support wish it were easier and more convenient to obtain.* Read the new Customer Service Workbook to discover industry tips and best practices for bringing efficiency and profitability to order management while freeing up your CSRs to: • Process orders quicker with fewer errors • Carry out customer engagement strategies • Manage order volumes at current staffing levels • Increase customer loyalty
Tags : 
customer service, csr, outbound calls, self-service, strategies, automation, electronic workflow, visibility, streamline, social media
    
Esker
Published By: Dell     Published Date: Nov 20, 2014
In extreme conditions, you need reliable technology. Whether you are a first responder, work in dangerous locations, wild weather, or just need your equipment to be able to withstand the same harsh conditions you do, Dell allows you to access information quickly - in extreme environments where traditional notebooks simply cannot live up to your expectations. How do you work in such harsh environments and keep information secure and long-lasting without the fear of losing critical information? And how do you keep the information secure, yet utilize a manageable system? Download this interactive infographic today to become informed on Dell's best practices.
Tags : 
mobility, real-world systems, extreme environments
    
Dell
Published By: Juniper Networks     Published Date: Oct 28, 2014
To learn how to simplify network operations to bring apps to market more quickly and reliably, get our eBook on network automation. Read about how you can make the most of the cloud with SDN and open, intelligent network architectures.
Tags : 
network automation, cloud, juniper, best practices
    
Juniper Networks
Published By: nlyte Software     Published Date: Oct 27, 2014
Much of the focus on flexible datacenters centers around the software application, compute, networking, and storage layers. Only after an initiative has begun are the most suitable best practices in datacenter infrastructure management (DCIM) considered.
Tags : 
nlyte, data centers, agile data centers, infrastructure, networking, storage
    
nlyte Software
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library