client

Results 726 - 750 of 1098Sort Results By: Published Date | Title | Company Name
Published By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : 
globality, legal, compliance, regulations, local regulations, security management, security policies, best practices, business management, information management, financial management
    
Globality
Published By: Microsoft     Published Date: Jul 20, 2018
Cloud computing has ushered in a golden era for software companies. The clouds low barrier to entry allows creativity to flourish, especially for software developers who are creating applications directly on cloud-based infrastructure. Cloud-based infrastructure enables developers to do what they love: solve business problems and bring innovative new ideas to life, using their choice of tools. In a Software as a Service (SaaS) model, applications can easily be deployed to a cloud service, and delivered to clients who appreciate the ease of access and low cost. The cloud model relieves the developer and the enterprise IT professional from the burden of managing or maintaining capital-intense infrastructure. But the clouds low barrier to entry also allows competing software providers to enter the market every day, from every sector. Independent software vendors, or ISVs, are pressured by increased competition to deliver their applications faster, with greater functionality and ease of
Tags : 
    
Microsoft
Published By: SAP Concur     Published Date: Aug 07, 2019
"Companies need to provide a seamless experience for their road warriors who are traversing the globe in search of new clients, attending conferences, exploring new business opportunities and checking on projects. The goal of automating the T&E function isnt just to save the company time and money, although that is a significant consideration. With policies in place, companies can ensure that business travelers are adhering to allowances for meals, hotels and other travel-related expenses. Companies that establish clear policies for how employees can book and pay for travel and which vendors to use can negotiate discounts and rewards with hotels, rental car agencies and airlines. In addition to the financial benefits of an expense management policy, employee satisfaction is also at stake. Creating a realistic travel policy that is clear, simple and easily accessible makes employees happy. A quick and hassle-free travel expense management process reduces traveler stress, enabling
Tags : 
    
SAP Concur
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
NetCompany, a services company in the Nordics, needed to provide a state-of-the-art technology solution for document sharing and team collaboration while ensuring robust security for client documents. Learn how Documents Cloud Service helped.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 12, 2017
Recently, cloud-native has been touted as the panacea to all the development concerns. In this webcast, James Governor, a Redmonk analyst and founder, will share what cloud-native really is and how it helps your business. He will highlight organizations that lead the new era of development innovation with agile and continuous methodologies and follow cloud-native development practices. Aaron De Los Reyes, Sr. Director of Oracle Technology at Cognizant, will then share how they and their clients are approaching the shift to cloud-native development and migration strategies for their legacy deployments.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, data leakage protection, dlp, smart security, data-stealing, anti spam, anti spyware, anti virus, hacker detection, internet security, policy based management, enterprise software
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging, anti spam, anti spyware, anti virus
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, anti spam, anti virus, phishing, security management, web service security
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging, anti spam, anti spyware, anti virus, application security, email security, internet security
    
Trend Micro SPN
Published By: HP and Intel Xeon processor     Published Date: Aug 10, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated
Tags : 
intel, deduplicated, storage, network
    
HP and Intel Xeon processor
Published By: Ipswitch     Published Date: May 15, 2014
In this free on demand webinar, youll get a first-hand look at how leading companies leverage Managed File Transfer to improve security, reduce risk and relieve pressure on their IT departments.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer, ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch
Published By: IBM     Published Date: Mar 17, 2008
Clients setting up smaller offices want to invest in the same type of technology as their larger competitors. Larger clients setting up remote branches need compute power not only at their head office, but also at distributed locations where key decisions that impact the local operation are made.This white paper compares the IBM BladeCenter S offering to the HP c3000 offering and articulates why IBM BladeCenter S is the best choice for small blade chassis platforms.
Tags : 
ibm, move up, kvm switch, kvm, bladecenter, blade center, bladesystem, blade system, blade, blades, blade server, storage, small business networks, blade servers
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
Read the white paper to see how IBM Lotus Notes and Domino software empowers users to take action, create and share knowledge and collaborate with teams. And discover how this new kind of desktop application, leveraged from 20 years of leadership can help deliver an enhanced user experience, drive greater business value and boost IT performance.
Tags : 
ibm, lotus, lotus notes, lotus domino, it performance, collaboration, connect, desktop application, connect, socialize, communicate, user experience, eclipse, alloy, developers, client, sap, it performance, green, optimize
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
In this white paper, you'll see how Lotus Notes 8.5 boosts bandwidth by storing one copy of attachments, rather than allowing duplicate via threads. You'll also discover how upgrading lets you elevate collaboration and enhance efficiency with tools that empower users to take action, create and share knowledge, and collaborate with teams.
Tags : 
ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities, lotus, lotus notes, lotus domino, it performance, collaboration
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : 
kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities
    
IBM
Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
For the last 15 years, most office desktop software has been purchased in a "suite," a set of office productivity applications for word processing, spreadsheets and presentation designed to offer extra value, beyond their purchase price. Other products may include an email client, a browser, a low-end data base product, a forms designer, a forms fill-in product, various publishing aids (templates for both the printed page and the web), collaboration and communication and business contact management.
Tags : 
desktop, office productivity, word, spreadsheets, presentation, publishing, templates, collaboration, communication, business contact, ibm, empowering people, fill-in, soa, tco, saas, cloud, mash-ups, portal, server infrastructure
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde, cem, customer experience management, blogs, wikis, user profiles, tagging, feeds, mobile services, lotus, wireless, enterprise applications, mobile computing
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
This whitepaper captures the lessons learned from various Project Liberate engagements worldwide and presents best practices from these case studies as well as advice on negotiating strategies. The information is based on publicly available data sources (which are subject to change as offerings change), customer feedback, and IBM’s own experience in dealing with these offerings. Learn more today!
Tags : 
ibm, wibm, consulting engagement, customer experience, microsoft enterprise agreement, microsoft enterprise agreements, cal, core client access license, sms, moss, configuration management, mui, product deployment, epp, employee purchase program, epp, hup, enterprise applications, customer relationship management, customer satisfaction
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
Project Liberate: Consulting Engagement to help customers understand alternatives when negotiating a Microsoft Enterprise Agreement.
Tags : 
ibm ep, empowering people, software license expense, consulting engagement, microsoft enterprise agreement, cost reduction, tco, spend management, client access licenses, project liberate, negotiating strategies, system management software, total cost of ownership, software outsourcing
    
IBM
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Learn how Stratus Mission-Critical Managed services have delivered 100% business capability for a clients' global operation - so they can 'have their cake and eat it too!'
Tags : 
stratus, business capability, business process, it components, business centric managed service, slas, mission critical environments, disaster prevention, knowledge management, enterprise applications, application performance management, business management, business process automation, business process management, sla
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician, application integration, application performance management, business activity monitoring, business management, project management
    
Stratus Technologies
Published By: Dell Storage     Published Date: Jan 16, 2009
Dickinson Wright PLLC has a long history of success – founded in 1878, the law firm has been serving clients for more than a century. From offices in Michigan and Washington D.C., Dickinson Wright’s 450+ employees deliver comprehensive legal services to organizations of all sizes – from individuals and new ventures to small and large companies to government units.
Tags : 
dell, dickinson wright, equallogic san, storage area networks, legal services, equallogic functionality, storage, iscsi, storage management
    
Dell Storage
Published By: Savvis     Published Date: Jul 07, 2010
By choosing Savvis as a provider for all its infrastructure, Wall Street Systems is succeeding in the fiercely competitive SaaS marketplace by delivering reliable, scalable, mission-critical solutions to its highly demanding client base.
Tags : 
savvis symphony, saas, software-as-a-service, infrastructure, software outsourcing
    
Savvis
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.