physical

Results 301 - 325 of 482Sort Results By: Published Date | Title | Company Name
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 29, 2010
VMware sites create more storage to manage and protect than their physical counterparts. This report showcases how EMC Backup and Recovery Solutions for VMware have helped customers redesign their backup operations.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
    
EMC Backup & Recovery Solutions
Published By: Oracle     Published Date: Mar 08, 2016
While retailers scramble to manage the impact of omnichannel on their operations, the way they communicate with customers, and the methods they use to promote their products and reward loyal shoppers, many have neglected to consider what will likely be the most profound change of all: the overall impact of omnichannel data transparency. Omnichannel is destined to transform every aspect of the retail industry, including the store—its design and layout, the inclusion of mobile pointof- sale and clienteling systems, the impact of transparent inventory and what that means for fulfillment, a single view of the customer and its implications for loyalty programs, and even the physical location of stores. Retailers must stay ahead of the omnichannel curve if they expect to remain competitive in the race for customers in a commerce anywhere world, and that contest begins at the brick-and-mortar store.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 08, 2016
Ever since e-commerce became a significant part of consumer spending, retailers have worried about its impact on store traffic. While fears that e-commerce would mean the death of stores have been proven false, retailers continue to search for ways to engage with customers via both digital and physical channels. One of the most valuable options available to retailers is a click and collect program, allowing shoppers who purchase an item online or via mobile device the option to retrieve their purchase at a brick-and-mortar store. Additional elements typically included in a click and collect experience include the option to return items that were purchased online to a physical store, or to pay for items in the store and have them shipped to a residence.
Tags : 
    
Oracle
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security
    
Trend Micro, Inc.
Published By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
Arcserve
Published By: Arcserve     Published Date: Jun 11, 2014
Many small and midsized businesses are at a crossroads when it comes to selecting the right backup solution to protect their environments. Many now have a mix of physical and virtual servers to protect and when they try to use their existing backup software to protect it or, alternatively, search for new backup software that better matches their new infrastructure demands they often encounter several issues. Download to learn more!
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, networking, it management
    
Arcserve
Published By: SAS     Published Date: Apr 25, 2017
Whether you call them customers, clients, patrons, guests or patients, customers are your organization’s most important asset. And that means customer loyalty should be among your top priorities. No matter when or where the customer journey begins – from websites and online chat to physical locations and call centers – customers expect you to provide a unique and personal experience. How can you use data and analytics to recognize your best customers across channels and know exactly where they are in their customer journey? Keep reading to find out.
Tags : 
    
SAS
Published By: Silver-Peak     Published Date: Mar 21, 2012
Learn why one of the world's largest media companies chose Silver Peak virtual WAN Optimization for their cross country replication challenges including an on-demand media database requiring 7 x24 access. Complicating the challenge was a lack of space in the state-of-the-art data center for additional physical hardware. No problem.
Tags : 
silver-peak, disaster recovery, wan, technology, optimization, data center, data management, data quality
    
Silver-Peak
Published By: Silver-Peak     Published Date: Mar 21, 2012
Noted author Jim Metzler reports on the emergence of vWOCs, or virtual WAN Optimization Controllers. From the data center to the branch, virtualization is enabling a revolution in how WAN optimization is acquired and deployed. Whether combined with traditional physical appliances or fully virtualized, the new choices make universal network optimization a reality.
Tags : 
virtualization, technology, data center, data management, wan, wan optimization, vwoc, router, bandwith
    
Silver-Peak
Published By: Scale Computing     Published Date: Sep 24, 2012
Learn how this organization realized a more than 80% reduction in physical server load at a fraction of the cost of other solutions-without adding to the already complex environment of host servers. Read the complimentary case study now.
Tags : 
virtualization, infrastructure, high availability, turnkey infrastructure, storage, servers, data storage, data management, business technology, data center
    
Scale Computing
Published By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : 
enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization, application, security, knowledge management, storage, business technology
    
Silver Peak
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access, networking, cloud computing
    
Soonr
Published By: IBM     Published Date: May 07, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world. Watch this webcast to learn: • Key CHRO insights from the Global C-Suite Study • Three workforce challenges for HR in a customer-driven world • Three actions HR can take with real-life examples
Tags : 
workforce, employees, customer loyalty, branding, talent acquisition, ibm
    
IBM
Published By: VMware AirWatch     Published Date: Dec 08, 2016
The corporate world has changed and physical desktop computer infrastructure no longer makes sense for many organizations. Physical desktops are expensive, maintenance-heavy, and most importantly, cannot support the changing business IT landscape.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 09, 2016
Breaking the link between access devices and virtual desktops (VDI) in a data center provides numerous benefits including cost efficiency and access transparency regardless of a user’s physical location. However, as more organizations move away from a physical desktop to VDI, they must decide whether they should build it themselves or purchase an all-in-one cloud service. This white paper highlights the benefits of using a managed desktop cloud service that provides infrastructural support while reducing infrastructure and operational costs. Access now to discover how other organizations are saving money by utilizing a managed cloud service.
Tags : 
    
VMware AirWatch
Published By: Mitel     Published Date: Jun 29, 2016
Today’s world of business is increasingly fast-paced, competitive, technology-led and global. Cultural, technological and physical elements are working together to drive a rapid pace of change like never before. From demand for more freedom in the way we work and the Bring Your Own Device (BYOD) trend, to technology innovation and the increasing adoption of new devices, platforms and applications, to the breaking down of international and regional barriers.
Tags : 
best practices, business optimization, business management, productivity
    
Mitel
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: VSS Monitoring     Published Date: Jun 17, 2014
Read this Solution Guide to learn how to optimize monitoring & security for 40G & 100G networks While network owners are migrating to 40G & 100G infrastructures, most tools available today cannot ingest high-speed traffic. They lack both the physical interfaces and processing power to do so.
Tags : 
vss monitoring, bandwidth, network, infrastructure, 40g, 100g, interface, networking, business technology
    
VSS Monitoring
Published By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Symantec     Published Date: Apr 09, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.
Tags : 
symantec, unified data protection, data protection, virtualization security, virtual environment, backup, backup and recovery, business technology, virtualization
    
Symantec
Published By: IBM     Published Date: Jan 06, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world.
Tags : 
customer loyalty, employee support, workforce challenges, hr solutions
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept