2012

Results 126 - 150 of 251Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Dec 04, 2012
IDC forecasts the worldwide enterprise network equipment market will reach $42.6 billion in revenue in 2012.
Tags : 
bussiness value, unified, mobility, video, reduced costs, availability
    
HP
Published By: IBM     Published Date: Jan 02, 2014
Discusses why converged systems, such as IBM PureSystems platforms, can radically simplify the IT life cycle and how these changes can deliver business value by accelerating time to market, improving application performance, and reducing required staff time.
Tags : 
ibm, idc, puresystems, cut costs, increase agility, it life cycle, converged systems, application development
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles
    
IBM
Published By: GlobalEnglish     Published Date: Jan 23, 2013
The Business English Index was launched to track the competency across companies, industries and geographies in business communications using English. To read more about the metrics and BEI score across countries and industries, read this whitepaper
Tags : 
business english index, english, communication, business, business knowledge, workforce performance
    
GlobalEnglish
Published By: Riverbed     Published Date: Aug 19, 2014
Since 20017, IDC has been conducting interviews with Riverbed Steelhead customers to assess the financial impact of the Steelhead WAN optimization solution. As Riverbed Technology has added features and functionality to Steelhead, IDC has worked with Riverbed to update and add to this research by conducting additional in-depth interviews with Steelhead customers - most recently in 2012.
Tags : 
business, value, wan, optimization, financial impact, research
    
Riverbed
Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media, mobile, byod
    
IBM
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report
    
Arbor Networks
Published By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
Arbor
Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention
    
IBM
Published By: Oracle Corp.     Published Date: Sep 19, 2012
An Oracle White Paper - August 2012
Tags : 
oracle, enterprise, process management, complex event processing, management, processing
    
Oracle Corp.
Published By: Kronos     Published Date: Sep 20, 2018
East Alabama Medical Center (EAMC) in Opelika, Alabama, is a 314-bed facility that employs 2,700, including 770 inpatient nurses. With a mission focused on providing high-quality, compassionate healthcare, the hospital celebrated its 60th anniversary in 2012. In the prior year EAMC was recognized as one of only five hospitals in Alabama named a Top Hospital for Patient Experiences by Women Certified®. This distinction joins others the hospital has won, such as being listed among the Top 100 Heart Hospitals in the U.S. and on Fortune magazine’s “100 Best Places to Work” in America.
Tags : 
    
Kronos
Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft
    
Symantec
Published By: CDW     Published Date: Apr 22, 2015
To get a handle on what was possible, and all that would be involved, Bob Stirton, director of information technology for the Kansas City Chiefs football organization, sent Network Engineer Scott Fletcher on a scouting mission to the 2012 Super Bowl at Lucas Oil Stadium in Indianapolis. Fletcher watched first-hand the inner workings of a recently installed Cisco Systems wireless network in full-on, gameday action.
Tags : 
wifi, wireless, technology, network
    
CDW
Published By: Kenshoo     Published Date: Oct 30, 2012
Christmas shopping on the Internet has come of age. In fact, 2011 was its debutante year. Last year, consumers embraced e-commerce with enthusiasm, and retailers reaped the rewards. Here's our recap of 2011 along with some predictions for 2012.
Tags : 
kenshoo, 2012 e-commerce, best practices, search marketing, clicks, impressions, search advertising
    
Kenshoo
Published By: Kenshoo     Published Date: Oct 30, 2012
In the Kenshoo 2012 best practices tip sheet for the US, we explore the numbers for the holiday season including advertising, search engine advertising, impressions, clicks and much more.
Tags : 
best practices, kenshoo, holiday season, search engine advertising, impressions, clicks, holiday season
    
Kenshoo
Published By: Cisco     Published Date: May 15, 2015
Au cours de l'ete 2012, Forrester Consulting a commence a travaillar sur un projet de recherche commande par NetApp consistant a etudier le ROI que les enterprises sont susceptibles d'enregistrer en adoptant la plateforme FlexPod.
Tags : 
data center, software, networking, roi, cisco, platform, enterprise
    
Cisco
Published By: HotSchedules     Published Date: Jul 28, 2017
After filing for bankruptcy in 2012, the Real Mex Restaurant Brands turned their stores’ performance and sales around with the help of HotSchedules Activity-Based Forecasting Module.
Tags : 
retail management, business growth, performance scheduling, management, retail performance
    
HotSchedules
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
The basis for Legal Hold and Data Preservation Best Practices was the exceptional work by the group of presenters at the 2012 Conference on Preservation Excellence, held in Portland, Oregon in late September. The conference focused solely on the area of data preservation best practices. Download this White Paper for more information.
Tags : 
legal, preservation, legal hold, data, technology, best practices
    
CompareBusinessProducts.com
Published By: Adecco     Published Date: Sep 25, 2017
Cloud computing generated $100 billion in 2012, which is estimated to be $127 billion by 2017 and an impressive $500 billion by 2020. What was once an innovative technology of the future is now the standard way of doing business. The challenge for companies is to leverage what still works well from their in-house legacy infrastructure and augment that with a new cloudbased infrastructure to meet their future needs. Learn how to transition to advanced cloud usage and build a strong team for your company.
Tags : 
cloud computing, cloud based infrastructure, cloud transition, team building
    
Adecco
Published By: LogMeIn     Published Date: Jan 03, 2013
This report examines online shopper’s attitudes, opinions, and behaviors towards live chat as well as the satisfaction levels of chats resultant from both opt-in scenarios and pro-active invitations.
Tags : 
live chat, roi, effectiveness 2012, report, opt in scenario, live chat, collaboration, logmein
    
LogMeIn
Published By: Bronto     Published Date: Sep 09, 2013
Bronto Software and Retail Systems Research have just published survey findings of 179 retailers regarding their holiday 2012 online marketing plans. Download the report to discover the quantitative findings.
Tags : 
online marketing, holiday marketing, mobile marketing, social marketing
    
Bronto
Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner
    
LogRhythm
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library