Whitepaper Library
 

ups

Results 226 - 250 of 429Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 11, 2008
IBM commissioned Forrester Consulting to survey 300 business and IT leaders from US and UK to determine the level of common understanding and alignment between business and IT groups on key issues related to impact of their existing processes on operational efficiency and business innovation and how BPM and SOA could improve the overall value their business processes deliver.
Tags : 
ibm, ebf, bpm, soa
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
For the last 15 years, most office desktop software has been purchased in a "suite," a set of office productivity applications for word processing, spreadsheets and presentation designed to offer extra value, beyond their purchase price. Other products may include an email client, a browser, a low-end data base product, a forms designer, a forms fill-in product, various publishing aids (templates for both the printed page and the web), collaboration and communication and business contact management.
Tags : 
desktop, office productivity, word, spreadsheets, presentation, publishing, templates, collaboration, communication, business contact, ibm, empowering people, fill-in, soa, tco, saas, cloud, mash-ups, portal, server infrastructure
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Midsized companies now have a way to automate regular backups-and restore data almost immediately.
Tags : 
backup, ibm, tivoli storage manager fastback, restore data, it management, data security
    
IBM
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Offshore development has been embraced by the vast majority of commercial software vendors and enterprise application development groups. Why? Because a world flattened by globalization makes it possible to improve competitiveness by taking advantage of the easy exchange of low-cost, high-quality technical skills.
Tags : 
offshore, offshoring, outsource, outsourcing, software, productivity, workforce, workforce management, globalization, 6th sense, 6th sense analytics
    
6th Sense Analytics
Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security
    
Proofpoint
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Published By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, network management
    
CDW
Published By: Polycom     Published Date: Apr 30, 2013
One of the simplest, most effective ways to bring healthcare to the community level is through video collaboration. When video technology is enabled through a standards-based, scalable platform, community members can all join a multipoint video call to collaborate and work together with professionals and even with groups of similarly afflicted, empathetic peers to address health issues. Patients benefit from more regular evaluations and better access to specialty support. They participate in live or recorded education sessions—regardless of location or ability to travel. And with today’s move to ubiquitous video, you cannot only do one-to-one video sessions, but groups can meet over video to share ideas and best practices.
Tags : 
healthcare, re-hospitalization, video collaboration, collaboration, video conferencing, video platform, telepresence
    
Polycom
Published By: RingCentral     Published Date: Mar 21, 2014
How RingCentral addresses common concerns about transitioning to a new phone system to deliver an easy setup without hiccups.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Cyveillance     Published Date: Apr 03, 2015
Cyber threat intelligence is unquestionably a hot buzzword in the security industry these days. It is being used to seek venture capital and fund startups. It is being pitched to the enterprise market by providers and consultants. However, in this paper, we argue that the majority of what is being billed as “threat intelligence” isn’t. It’s data. From lists of bad IPs or application vulnerabilities to malware signatures, social media data or indicators of compromise (“IOCs”), none of these things are “intelligence.” They’re data. In this white paper, we define the difference between intelligence and data, and then illustrate the theoretical discussion in a concise case study in the tangible terms of a real-world practitioner and an actual event.
Tags : 
cyber threat, intelligence, centure capital, startup, enterprise, security, protection, data, networking
    
Cyveillance
Published By: gyro     Published Date: Sep 10, 2015
The digital age has driven a rapid transformation of the IT role. No longer an order-taker, IT must now become a game-changer for the organization, according to new research gyro conducted addressing the perceptions, expectations and future priorities of IT. For IT to become a true change agent and business consultant, it must embrace its “human side” and show its relevance to business operations’ and leaders’ success. For many IT groups, this requires a change in culture and an updated mindset about the department’s ultimate purpose and focus, along with improvements in interdepartmental communication.
Tags : 
line of business, lob, future of it
    
gyro
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas, networking
    
Evident.io
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
The cloud isn’t just for large companies with thousand of employees. In fact, some of the richest and most thrilling transformations can be seen in the mom and pop stores, the virtual start-ups. In most cases, it starts with that “moment of truth”-- a realization that something can be done better. The “Moments of Truth” e-Book details four businesses that had an insight, and turned to the cloud for answers. You’ll read about: A Nashville fried chicken company is changing lives through the power of smart technology and transformative employment A virtual social media management business is truly living “the future of work” A content-focused startup is setting a whole new standard for podcasts A digital products studio is building a real community for its employees
Tags : 
    
Microsoft Office 365
Published By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, network management
    
CDW - APC
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: LogRhythm     Published Date: Apr 04, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.
Tags : 
    
LogRhythm
Published By: Adobe     Published Date: Sep 28, 2016
Download our new guide, Your Most Crucial Conversation, to learn how you can use personalized, real-time offers to give your customers what they need, right when they need it—so you can earn their trust and keep them coming back for more. Read the guide to discover how to: - Break down internal silos and speak consistently to customers - Deliver contextually relevant experiences for upsell, cross-sell, loyalty and retention - Make the transition to real-time personalization?
Tags : 
adobe, marketing, marketers, customers, customer engagement, customer loyalty, customer retention
    
Adobe
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 16, 2017
Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. Instead, try managing your wellness program by defining your workforce according to personas.
Tags : 
    
Fitbit
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.