RecruitingBlogscom

Follow Us:

 

overview

Results 76 - 100 of 664Sort Results By: Published Date | Title | Company Name
Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation
    
Brocade
Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign, campaign effectiveness
    
Bulldog Solutions
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
In today’s application economy, market success is increasingly being defined by an organization’s ability to deliver multi-channel applications that provide an exceptional and differentiated customer experience. To deliver the service levels required, IT teams need to move to establish proactive IT monitoring approaches. This white paper offers an overview of the key requirements that must be met for IT teams to establish effective proactive monitoring capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 29, 2018
From startups to established companies, containers help meet the demands of a modern digital business –supporting massively scalable, portable and fast to deploy apps. Engineered for the Modern Applications, Built by Modern Teams. Yes, it’s complex. And yes, there is much to consider. Start here for a quick overview of the essentials of container monitoring.
Tags : 
    
CA Technologies EMEA
Published By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : 
roi, soa, job scheduling, ca wa, workload automation
    
CA WA
Published By: CarbonBlack     Published Date: Mar 16, 2016
Carbon Black has integrated with Microsoft endpoint technologies to provide enhanced prevention, detection, and response capabilities. This paper from EMA provides an overview of these integrations and discusses the key benefits of Carbon Black’s partnership with Microsoft.
Tags : 
endpoint security, carbon black, ema, microsoft, protection, detection, response capabilities, security
    
CarbonBlack
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: CBRE     Published Date: Aug 02, 2017
MobileIron Access Overview
Tags : 
mobileiron, access, software solutions
    
CBRE
Published By: CBRE     Published Date: Aug 02, 2017
This three-part video blog series is my perspective on Microsoft’s strategy, the evolution of Microsoft Intune, and the critical role MobileIron plays in a Microsoft shop. My opinions are based on publicly available and third-party data plus my analysis of Microsoft’s actions. Part I of this series gives an overview of Microsoft’s strategy, and Part II provides a high-level comparison of MobileIron and Microsoft Intune.
Tags : 
microsoft strategy, mobileiron, data analysis, video blog
    
CBRE
Published By: CDC eCommerce     Published Date: Jan 20, 2011
Download this white paper to learn more about today's Multi-Channel Retail landscape, as well as trends and strategies for e-commerce, m-commerce and more.
Tags : 
mcm, cdc software, ecommerce, multi channel, retail, e-commerce, shopping, mobile
    
CDC eCommerce
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
Why should you consider Microsoft Azure? Benefits include improved efficiency and agility, scalability, lower IT costs and a consistent user experience between Microsoft's Cloud and your cloud. CDW Principal Consulting Engineer Matt Riley also says Microsoft Azure offers multi-factor authentication, giving users a more robust identity management structure, allowing them to automatically provision users. Watch this webinar to learn more about Microsoft Azure.
Tags : 
microsoft azure, scalability, user experience, authentication, security, it management, knowledge management, data management
    
CDW
Published By: CDW     Published Date: Jun 25, 2015
Receive additional savings of up to 17% on top of your current discount level, and get a trusted, hassle-free PDF solution for your organization. Overview of Adobe Acrobat CLP Program.
Tags : 
adobe, cdw, clp pack, content management
    
CDW
Published By: CDW     Published Date: Aug 07, 2015
VMware Virtual SAN creates end-to-end visibility between the virtual layer and the storage layer.
Tags : 
san, storage, architecture, cloud, virtual platform
    
CDW
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
CDW-Trend Micro
Published By: Century Interactive     Published Date: Sep 28, 2010
Call tracking overview presentation to understand the basics, FAQs and how you can take action immediately!
Tags : 
call tracking, call analytics, lead optimization, trackable phone numbers, measurement
    
Century Interactive
Published By: Cisco     Published Date: Dec 23, 2014
Download the Cisco Mobility Solution Overview to get information on providing highly secure mobile access anytime, anywhere, building a unified platform for mobile applications, and improving relationships with customers and employees through new mobile experiences.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
While providing your customers and guests with Wi-Fi, you can give them pertinent information, individual attention, and special offers. And you can learn how, where, and when they move through your venue. Customers or guests passing through your store, hotel, or other venue increasingly expect free Wi-Fi. They also expect personal service. You can give them both, which can help boost your sales. And in doing so, you can gain information that will help make your venue more attractive and profitable.
Tags : 
cisco, wifi, wireless. wan, wlan, network design, it solutions
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco has acknowledged the need to address our customers’ array of employee and consumer mobility requirements with a full set of mobility solutions.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, cisco
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top