abs

Results 276 - 300 of 475Sort Results By: Published Date | Title | Company Name
Published By: Nokia     Published Date: Aug 04, 2016
This paper presents the value of an enterprise POL based on a Bell Labs economic analysis. It examines the financial benefits of an optical network compared to traditional copper-based Ethernet architectures. Also discussed in this white paper is why a POL provides the most cost-effective option to meet the gigabit speed networking challenges of a future digital enterprise.
Tags : 
passive optical lan, copper-based ethernet, communications requirements, ethernet architecture, gigabit speed networking, digital enterprise
    
Nokia
Published By: Frontier Communications     Published Date: Dec 29, 2017
We’ve all heard the phrase “you have to spend money to make money,” and while it may be accurate to some extent, businesses also have to keep a close eye on their budgets. As you establish your technology allowance and evaluate tools to help grow your business, consider these five items as absolute essentials.
Tags : 
    
Frontier Communications
Published By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : 
cloud networking, wan, network services, application performance, technology
    
Riverbed DE
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
If a contact center executive could have anything, it would be certainty… of contact demand, resource availability, operational efficiency, and of agent performance and customer experience delivery. But certainty in a contact center is nearly impossible, and in the absence of a crystal ball, mathematical models provide the next best thing. They alert, evaluate operational risk, and propose business and resourcing solutions. And now, the best of these models also determine expected experience delivery.
Tags : 
interactive intelligence, contact center, customer service, customer experience, cost, revenue, telecom
    
Interactive Intelligence
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing
Tags : 
evaluator, group, storeonce, b5200, backup, lab, validation, paper, b6200, backup, system
    
HP and Intel® Xeon® processor
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software
    
Absolute Software
Published By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : 
endpoint protection stategy, byod, workforce mobility, absolute software, own device
    
Absolute Software
Published By: IBM     Published Date: Feb 25, 2008
Enterprise Strategy Group (ESG) Labs performed a hands-on analysis of IBM's System Storage SAN Volume Controller storage virtualization solution in order to validate its value proposition to customers. ESG Labs found that SAN Volume Controller is a rock-solid, feature-rich platform that delivers on the promise of network based storage virtualization: reducing the complexity and cost of managing SAN attached storage.
Tags : 
hardware, ibm, san volume controller, roi, storage, storage management, storage virtualization, virtualization, ibm
    
IBM
Published By: 6th Sense Analytics     Published Date: Sep 17, 2007
During this podcast, you’ll hear from Thomas Koulopoulos, founder of Delphi Group, managing director of Perot Systems Innovation Labs, and author of Smartsourcing. A widely recognized authority on IT, innovation and the globalization of business, Tom was named one of the industry’s six most influential consultants by InformationWeek magazine.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management, spending, cost efficient, 6th sense
    
6th Sense Analytics
Published By: Sophos     Published Date: Mar 26, 2013
Our experts at SophosLabs look in depth at ransomware variants and delivery mechanisms, and show how you can protect your data with a complete security strategy.
Tags : 
ransomware, sophos, data, protect, security, strategy
    
Sophos
Published By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : 
digital skills, culture, strategy, data management, processing, technology, ux design
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : 
sap, business, managing, finances, performance, performance management, finance
    
SAP
Published By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
epp, endpoint, protection, threats, malware, nss
    
McAfee
Published By: VMTurbo     Published Date: Feb 11, 2014
Moving beyond monitoring, alerting and reporting to deliver an automated control system for today's virtualized data centers.
Tags : 
vmturbo, sizing up, operations management, virtual infrastructure, it operations, analytic engine, decision-making process, storage infrastructure, optimize resources, virtualized applications, operational costs, collective model, abstraction model, big data, process automation, decision automation
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions
    
VMTurbo
Published By: Avaya     Published Date: Jun 15, 2016
Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more.
Tags : 
avaya, healthcare, case studies
    
Avaya
Published By: LogRhythm     Published Date: Apr 04, 2017
The LogRhythm Labs™ Team (Labs Team) designed this report to provide actionable intelligence regarding threat actors and the tools, techniques, and procedures (TTPs) they use. Using this information, security operations center (SOC) analysts can better detect and respond to this specific threat.
Tags : 
    
LogRhythm
Published By: 8x8 Inc.     Published Date: Feb 24, 2017
Before moving to 8x8, MOBI had a premises-based telephone and contact center system. “We had a lot of points of failure inside of our building. And because our help desk and contact center is so critical we absolutely had to do something about it.” Mobi wanted one system to handle all interactions with their customers, primarily phone calls and instant messaging. According to Mobi, “What stood out about 8x8 was that everything was managed under one roof.” Mobi has been able to achieve this with 8x8’s integrated Virtual Office and Virtual Contact Center solutions.
Tags : 
8x8, mobi, webinar, contact center, customer interaction
    
8x8 Inc.
Published By: McAfee     Published Date: Mar 31, 2017
NSS Labs performed rigorous testing of McAfee Endpoint Security v10.5 across a multitude of attack threat vectors targeting a very dynamic enterprise class endpoint attack surface. In addition, McAfee Endpoint Security v10.5 was evaluated for it's resistance against several evasion categories and false positive testing. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee's participation. Download a complimentary copy ($750 value) of this NSS Labs individual test report that provides detailed information not available elsewhere.
Tags : 
endpoint attack, endpoint protection, security, nss
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : 
data center, networking
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise forenterprise IT. Within the SDDC, the benefits of server virtualization areextended to storage and networking, so the entire infrastructure can beabstracted and centrally managed under a unified platform. IT teams areable to leverage unprecedented levels of virtualization, orchestration, andautomation to achieve the services-based delivery model that enables truedigital transformation.
Tags : 
data center, networking
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The software-defined data center (SDDC) holds tremendous promise for enterprise IT. Within the SDDC, the benefits of server virtualization are extended to storage and networking, so the entire infrastructure can be abstracted and centrally managed under a unified platform. IT teams are able to leverage unprecedented levels of virtualization, orchestration, and automation to achieve the services-based delivery model that enables true digital transformation.
Tags : 
data center, networking
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
Overwhelmed by the volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate efforts. Machine learning moves security analytics from diagnostic and descriptive to prescriptive and proactive, leading to faster and more accurate detection.
Tags : 
machine learning, advanced analytics, advanced threats, sandbox, zero-day, malware, mcafee labs, dynamic endpoint
    
McAfee
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.