events

Results 226 - 242 of 242Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Feb 01, 2016
Login Storms and other unplanned events can max out VDI resources and slow service delivery to a crawl. Learn how leading Healthcare Delivery Organizations have used Login VSI and Pure Storage to simulate peak login periods and plan for the worst in order to deliver the best VDI experience possible.
Tags : 
vdi, login storm, vdi resources, healthcare delivery organizations, login vsi, pure storage, peak login periods, vdi experience, it management, enterprise applications
    
Pure Storage
Published By: PGi     Published Date: Nov 07, 2018
Webinare unterscheiden sich von kollaborativen Web-Meetings basierend auf Umfang, Geschäftsverhalten, Geschäftsanforderungen und Erwartungen der Teilnehmer. Webinare sind strukturierte, vorab geplante, One-to-Many LiveEvents, die höchst skalierbar sind und gestreamte Präsentationen sowie DesktopSharing, Stimmenabgaben, Umfragen und Chat-Funktionen bieten. Infolgedessen erfordern sie unterschiedliche Planung, Förderung, Übertragung und Messung.
Tags : 
    
PGi
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data, business technology
    
LogRhythm
Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas, iocs, evalueserve, real-time siem, security
    
McAfee
Published By: Kaon     Published Date: Jul 07, 2011
In this complimentary white paper, discover how new interactive technologies allow companies to obtain quick ROIs - in the hundreds of thousands - while creating emotional customer connections at events. Learn how your 2011 marketing programs will generate greater ROI with new interactive marketing technologies.
Tags : 
kaon interactive, roi, marketing technologies, virtual product demonstrations, trade show trends, sales team, virtual technology
    
Kaon
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors. There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient.
Tags : 
specimen, labeling, benefit, hospitals
    
Zebra Technologies
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations, knowledge management, enterprise applications, business technology
    
BlackBerry
Published By: Marin Software     Published Date: Jun 24, 2008
One of the big challenges in search engine marketing is getting all of the volume you want from your campaign.  However, the available volume in paid search is sometimes limited, and prevents you from getting to where you want to in your campaign. In other words, people only search so much on keywords related to your campaign, and there is nothing you can do with your paid search campaign that can change that. Getting at as much (profitable) volume as you can is what it ends up being all about.
Tags : 
lead volume, paid search, ppc, marin, marin software, keywords, pay per click, cost per click, cost per lead
    
Marin Software
Published By: MeQuilibrium     Published Date: Jul 25, 2018
In today’s competitive work environment, attracting and retaining top talent is paramount and expensive. Companies recruit high performing employees with deep experience, invest in training, and reward outcomes. Yet while talent and experience are critical, new evidence suggests those attributes may not be enough. It’s not simply how well a person can perform in a typical situation, but how quickly they can return to high performance after an inevitable setback. Resilience is the ability to become strong, healthy or successful again after something bad happens. It includes (learnable) cognitive and emotional skills that reduce the degree and duration of episodes of discouragement, reluctance or defeat that often follow negative events. A resilient worker will quickly put the event in perspective and search for alternative solutions while their less-resilient colleagues experience a letdown or assign blame. This paper describes how resilience, measured by the meQ Score, corresponds to w
Tags : 
    
MeQuilibrium
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center, analytical applications, business intelligence
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : 
ibm, optimization, security, cyber crime, network security, it security
    
IBM
Published By: Dell     Published Date: Nov 09, 2012
Learn how to enable Microsoft® Hyper-V virtualization role and hardware events log in Windows Server 2012 for Dell PowerEdge servers. Discover how you can view basic hardware information about your system easily without installing any software agents.
Tags : 
hyper v, microsoft hyper v, windows server 2012, dell power edge, business technology, data center
    
Dell
Published By: Progress Software     Published Date: Sep 27, 2010
What are the top strategies to expand visibility of all business operations? How can you reduce your time-to-value? If you're looking for a better, timelier way to respond to the changing conditions and events that impact your business, register for Your Business Moves Faster When You're at the Controls.
Tags : 
progress, cto, business operations, webcast, idc, improvements
    
Progress Software
Published By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how to accelerate the path to IoT through the Visible Value Chain (VVC). It enables organizations to gain real-time visibility into their operations allowing them to be more nimble, agile, and make better-informed business decisions. Once organizations have seamlessly enabled device connection to the data center, they can see events occurring throughout their value chain in real time—and act upon them. Doing so creates new value and intelligence from both legacy and new devices, while mining the vast riches of Big Data.
Tags : 
zebra, internet, visible value chain, vvc, big data, data center, device connection, iot, it management, enterprise applications
    
Zebra
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept