Whitepaper Library
 

end users

Results 1 - 25 of 429Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Oct 10, 2018
For all organizations, server and component-level crises are unfortunate inevitabilities. Likewise, the need of end-users to revert to previous file versions is a common occurrence due to predicaments large and small. Recognizing these realities, ESG consistently recommends that organizations consider an approach to data protection that is broader than what backup alone can provide
Tags : 
    
Carbonite
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
    
Velaro
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, cloud computing, data center design and management, colocation and web hosting
    
123Together
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
    
SAP
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Akamai Technologies     Published Date: Sep 12, 2017
The ways in which the Internet supports our everyday lives have become richer, more engaging, and more mobile. This innovation is driven by the visionaries, designers, developers, and managers of the web experiences that users consume every day. By exploring new ways to solve challenges and improve products and services that enrich our lives, developers and business owners have stretched the Internet to support use cases for which it was never designed. In order to succeed, modern web experiences must seem simple to end-users, even though most ultimately require complex design and technology to deliver.
Tags : 
web experience, web design, mobile, internet supporters
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 12, 2017
Online images used to be simple. In the past, they weren’t the focal point of a page — there were only a handful of images on a given page and all users were viewing online images on a desktop with dial-up. That has all changed. Today’s web pages are dynamic, filled with images and viewed by end users on different devices with varying connectivity. As audience expectations for rich web experiences have grown, so has the requirement to deliver increasingly image-heavy web applications. The problem? The cost and complexity of creating, storing, and delivering web images tailored for every device poses a significant challenge for businesses, but failing to address the increasing diversity across devices and networks will lead to a poor and inconsistent user experience. Current solutions don’t solve this problem completely.
Tags : 
cloud image management, online images, web applications, devices, web experience
    
Akamai Technologies
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management, cloud computing
    
LifeSize, a division of Logitech
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking
    
Commvault
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-users—companies in the process of building or upgrading their data centers today—think of the security problems they face? We conducted this survey to answer key questions about buyers’ plans for security in their data centers.
Tags : 
    
Cisco
Published By: Windstream     Published Date: Oct 22, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
UCaaS enables businesses to transition their enterprise communications costs from a capital-expenditure (CapEx) to an operational-expense (OpEx) model, transforming the upfront costs related to on-premises PBX and UC deployments to a flexible per-user pricing model, which allows them to quickly scale the number of UC users up or down as business needs dictate.
Tags : 
    
Windstream
Published By: Dell     Published Date: May 13, 2016
No matter your line of business, technology implemented four years ago is likely near its end of life and may be underperforming as more users and more strenuous workloads stretch your resources thin. Adding memory and upgrading processors won't provide the same benefits to your infrastructure as a consolidation and upgrade can. Read this research report to learn how upgrading to Dell's PowerEdge VRTX with Hyper-V virtualization, Microsoft Windows Server 2012 R2, and Microsoft SQL Server 2014 could reduce costs while delivering better performance than trying to maintain aging hardware and software.
Tags : 
    
Dell
Published By: LogMeIn     Published Date: Mar 19, 2015
Remote support technology, including remote control, desktop sharing, and web collaboration, is one of the most popular platforms used across TSIA service disciplines. Today’s remote support solutions offer much more than just remote control for PCs, their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards. Remote support solutions are typically well regarded by users, consistently delivering one of the highest average satisfaction scores in TSIA’s annual Global Technology Survey. Service executives should acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support. Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits. Download this white paper to learn more.
Tags : 
remote support, remote technology, customer support, productivity, remote technology
    
LogMeIn
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.