off site

Results 51 - 75 of 151Sort Results By: Published Date | Title | Company Name
Published By: Anaplan     Published Date: Sep 07, 2018
Le principal avantage des projets bien pense?s et bien conduits, c’est qu’ils aboutissent immanquablement au me?me re?sultat. Un cahier des charges est e?tabli, un appel d’offres est lance?, un plan projet est agre?e?, une solution est trouve?e, la mise en oeuvre se fait dans les conditions pre?vues… et le premier constat des utilisateurs est que le re?sultat final ne correspond plus aux besoins du moment. Dans un monde dont le rythme de transformation s’acce?le?re, les enjeux d’une bonne planification et mode?lisation se de?placent. Si la qualite? des mode?les et des simulations demeure importante, la capacite? a? modifier des plans, revoir des organisations, simuler des hypothe?ses impre?vues, le tout en quelques minutes, devient une impe?rieuse ne?cessite?. Un nombre croissant d’entreprises fait confiance a? Anaplan pour relever ce de?fi. Découvrez à travers cet Ebook les 5 témoignages de UFF, AXA, AccorHotels, Schneider Electric et Onduline.
Tags : 
    
Anaplan
Published By: dinCloud     Published Date: Jun 19, 2018
Despite the clear opportunity for more effective deployment of IT capability and more efficient IT management offered by cloud, most midmarket workloads are still hosted and managed on site. There is a clear trend towards greater use of managed services, and clear business benefit to embracing this hybrid IT model. The question isn’t really “will we move our midmarket business to cloud/hybrid infrastructure?” but rather, “how quickly will we effect this transition, and how will we prioritize workloads and capabilities along the way?”
Tags : 
transition, management, cloud
    
dinCloud
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: Adobe     Published Date: Mar 03, 2017
Applying for and opening financial services accounts online is on the rise. And FSI marketers are feeling the pressure to make these new accounts higher quality. The Adobe guide, Acquisition Evolved, will give you three actionable ways to improve your ability to identify and convert high-value customers. Read the guide to learn: • The DNA of customer digital behavior • How to create unified customer segments with existing data • How to adopt onsite messaging to match offsite ads
Tags : 
fsi, adobe, customer behavior, customer segments, data
    
Adobe
Published By: Reputation.com     Published Date: Jun 29, 2018
The past year ushered in some big changes for Online Reputation Management (ORM) — and the practice has become indispensable for any location-based enterprise. In 2017, review sources proliferated, consumers became more savvy about the validity of online reviews, and the position of Chief Experience Officer started to gain traction among locationbased organizations. ORM and SEO became increasingly intertwined as Google refined its search algorithms with a strong emphasis on reviews and star ratings. This year, expect to see these four trends move to the forefront: 1) Google will extend its dominance in online review volume and consumer exposure, eclipsing all other specialty sites. 2) SEO will be reinvented as user-generated reviews weigh more heavily in search rankings. 3) The voice of the customer will no longer be siloed across disconnected categories. 4) Consumer feedback from reviews and social media will drive operational improvements.
Tags : 
    
Reputation.com
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
    
Forcepoint
Published By: Motorola Solutions     Published Date: Apr 24, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your hotel to make this all possible. This guide was created to help you experience how each and every staff member on and across your properties can work smarter, safer, and deliver a top-notch guest experience when equipped with intelligence driven communications solutions.
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Apr 26, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site.
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: May 02, 2019
FORECASTER GUIDE | MANUFACTURING SOLUTIONS 2 What does it look like when all workers at your manufacturing facility can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where workers from production lines, to plant managers, engineers, security and beyond can communicate effortlessly and instantly, both on and offsite. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your facility to make this all possible. This guide was created to help you experience how each and every staff member can work smarter, safer, and minimize unwanted downtime when equipped with intelligence driven communications solutions. See how Unified Team Communications powers the collaboration between all these workers to create the next-generation in smart connected manufacturing:
Tags : 
    
Motorola Solutions
Published By: Alere Wellbeing     Published Date: Nov 09, 2011
Today, many employers have considered offering a reward or penalty to encourage employees to reduce their BMI. Yet weight bias is prevalent in the workplace even before incentives for BMI reduction are introduced. This white paper, derived from a presentation given by Dr. Rebecca Puhl and Dr. Jennifer Lovejoy, discusses weight bias, reviews well-known examples of employers who offer incentives tied to BMI, and offers practical strategies to promote a supportive worksite environment.
Tags : 
alere, human resources, employee bmi, employee incentive, reward program, whitepaper
    
Alere Wellbeing
Published By: PC Mall     Published Date: Mar 02, 2011
A typical lean branch office has a significantly different server infrastructure than a data center, but despite the differences, multisite organizations have much to gain by deploying server virtualization in their branch offices.
Tags : 
pc mall, lean branch office, server infrastructure, data center, server virtualization
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
A typical lean branch office has a significantly different server infrastructure than a data center, but despite the differences, multisite organizations have much to gain by deploying server virtualization in their branch offices.
Tags : 
server virtualization, infrastructure, data center
    
PC Mall
Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery, hybrid, data, protection, local, restores, offsite, disaster, technology
    
EVault Inc.
Published By: Cisco     Published Date: May 14, 2015
En réalité, les entreprises comptent déjà sur le département IT pour devenir plus stratégiques et plus influentes. En effet, le département IT contribue à favoriser la croissance, à doper le chiffre d'affaires, à catalyser l'innovation et à offrir de nouvelles expériences aux clients. Sa mission n'est plus de gérer ni de dépanner l'infrastructure technologique. Il a désormais pour vocation de transformer les processus et de favoriser la réussite de l'entreprise
Tags : 
cloud computing, erp, cisco
    
Cisco
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Infosys     Published Date: May 21, 2018
For our client, developing multiple digital assets and campaigns across geographies to mirror their offline strategy was a complex task. The lack of an agile digital platform further aggravated their problem. As a large pharmaceutical company with operations in virtually every country in the world, and a portfolio of well-known brands, our client had to develop and maintain several websites and digital assets to support regional launches and campaigns. However, each one was treated as a separate project which raised several challenges.
Tags : 
digital, agility, assets, campaigns, offline, brands
    
Infosys
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Published By: Nasuni     Published Date: Apr 28, 2011
Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!
Tags : 
nasuni, disaster recovery, cloud storage, offsite data protection
    
Nasuni
Published By: Comcast Business     Published Date: Mar 24, 2015
For today’s businesses, fast Internet access is more than a competitive advantage. It is an operational necessity. Changes in the way companies are working – and the tools they are using – have created the need for high-speed connections to services and individuals off-site. Across the country, in-house servers are rapidly being replaced by cloud-based infrastructure. Videoconferencing is helping businesses cut travel costs. Mobile devices – with easy links to work-related content – are enabling more employees to be more productive, from any location. All of these applications have one factor in common: they require bandwidth. And plenty of it. Download this white paper to learn more about high-speed internet connections.
Tags : 
dsl, high-speed internet, cable, internet connection, productivity, bandwith
    
Comcast Business
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.