location

Results 576 - 600 of 820Sort Results By: Published Date | Title | Company Name
Published By: RingCentral     Published Date: May 14, 2013
Headquartered in San Francisco, with offices in Chicago, Los Angelos, and Miami, TRUSTe helps businesses build consumer trust and increase engagement across online properties. When a company moves to a new location, it has the opportunity to start fresh. Moving to the new offices, TRUSTe decided to explore the benefits of adopting a hosted phone system and doing away with their traditional PBX infrastructure. Learn why TRUSTe finds time savings and independence with RingCentral.
Tags : 
ringcentral, hosted phone systems, phone systems, time savings, independence
    
RingCentral
Published By: RingCentral     Published Date: May 14, 2013
Whether you are starting a new business or expanding your existing business, you will need to choose a business phone system that meets your organization's requirements. The obvious decision would be to go with what you already know - your service provider from your previous company, or the phone system at your other office location. Read this white paper to know what every business needs to know when selecting a phone system.
Tags : 
ringcentral, buyer's guide, selecting a phone system, business phone systems, service providers of phone systems
    
RingCentral
Published By: Polycom     Published Date: Sep 24, 2014
Dynamic work environments are made-up of people on the move and virtual teams across different time zones. This makes it challenging to access an expert or to secure information. You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI). Polycom and Microsoft® deliver a complete and interoperable end-to-end unified communications (UC) solution for voice, video, conferencing and collaboration and connect people from any device, and from any location.
Tags : 
solutions, environments, challenging, communication, deployment, roi, secure, information, quality voice, video, expert, virtual, team, dynamic, time zones, tools, software development, enterprise applications
    
Polycom
Published By: ReadyTalk     Published Date: Jul 07, 2016
By now, most people have had the experience of attending a webinar. An attendee logs on, and spends a certain amount of time listening to audio and viewing a slide presentation. It is likely that attendees will interact via online polling and ask questions during the presentation. Hopefully they will leave the experience with a few takeaways. Webinars have proven to be a great marketing tool, as well as a valuable way to connect people in various geographic locations to information. But, how much of the webinar do attendees actually listen to?
Tags : 
best practices, business optimization, business management, productivity, engagement practices, business intelligence
    
ReadyTalk
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: VMware AirWatch     Published Date: Dec 09, 2016
Breaking the link between access devices and virtual desktops (VDI) in a data center provides numerous benefits including cost efficiency and access transparency regardless of a user’s physical location. However, as more organizations move away from a physical desktop to VDI, they must decide whether they should build it themselves or purchase an all-in-one cloud service. This white paper highlights the benefits of using a managed desktop cloud service that provides infrastructural support while reducing infrastructure and operational costs. Access now to discover how other organizations are saving money by utilizing a managed cloud service.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
    
VMware AirWatch
Published By: Mitel     Published Date: Jun 29, 2016
Picture a contact centre. Did your brain conjure an image of a sea of low-walled cubicles with agents speaking into headsets? Until recently, that’s what most contact centres were—a single site where agents commute to the office and complete their work at a fixed location. Today, contact centre agents are not bound to the office; they can work just about anywhere: at home, in hired office space or even on the move from a mobile device. But that’s not the only benefit that mobility has on customer service. Here are five ways you can boost customer service levels using mobility.
Tags : 
best practices, business optimization, business management, customer service, productivity, contact management, business intelligence, customer satisfaction
    
Mitel
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement, gps, mobile data systems, mobile workers, business intelligence
    
SAP
Published By: SAP     Published Date: Jun 30, 2011
This white paper explores why today's executives still lack the relevant information or data quality to make decisions in a timely manner. Inside, learn about the biggest decisions-making challenges facings modern businesses and three keys to achieving better data-driven decisions.
Tags : 
sap, smbs, high-quality data, erp software solution, decision management, data visibility, data quality, corporate strategy, business activities, resource allocation, compliance, metrics, tec, business activity monitoring, business intelligence, business metrics, enterprise resource planning
    
SAP
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
Better health care at lower costs, for everyone – how do health care providers get there? Understanding the gaps in patient care, patient needs, and the geographic distribution of the patient population are important elements to consider when making decisions about improving the quality of care and reducing its costs. To effectively analyze gaps in patient care, the data needs to be in a single place or system. However, in many organizations, data is spread across a myriad of spreadsheets and database systems. Data not organized for visual exploration and coherent analysis isn’t useful for decision making. Hence the need for visually appealing and scalable analytical tools to help organizations be more efficient, effective and economically successful.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 04, 2018
Location analytics is the process of integrating geographical data into business intelligence (BI) and analytics-led decision making. Location analytics creates meaningful insight from relationships found in geospatial data to solve a broad variety of business and social problems. Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston, dallas, interoperability, network architecture, network management, it spending, project management
    
NetShelter - CyrusOne
Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own, data management, data center
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 09, 2016
IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center’s power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are not understood and considered. Finally, the fault-tolerant nature of a highly virtualized environment could raise questions about the level of redundancy required in the physical infrastructure. These particular effects of virtualization are discussed and possible solutions or methods for dealing with them are offered.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, optimized power, virtualization, power and cooling, data center design and management
    
Schneider Electric
Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies, wireless application software, wireless communications, wireless service providers, application integration, business intelligence, business management
    
iDirect
Published By: iDirect     Published Date: Oct 13, 2011
Find out why utilities are expanding their use of satellite communications to provide reliable, intelligent connectivity to remote locations-and how it can work in your organization. Download the report.
Tags : 
idirect, pike research, technology, satellite, smart grid, communications, grid applications, wireless application software, wireless communications, wireless infrastructure, application integration, application performance management, business intelligence
    
iDirect
Published By: Bomgar     Published Date: Feb 28, 2008
Support virtualization enables your support reps to be at multiple locations at once, solving support issues with unbelievable speed and effectiveness.  Over 3,500+ organizations have virtualized their support reps and have decreased IT costs while increasing support rep productivity.
Tags : 
virtual support, customer service, customer support, remote support, remote workers, bomgar, remote access, server virtualization, productivity
    
Bomgar
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
With continued expansion of organizational storage allocation requirements, the time required for file-based data backup also continues to increase yet the time allotted for this data backup remains constant, exposing a critical issue. Though backup software vendors continue making advancements in technology to speed up the process, disk fragmentation will continue to remain an unresolved issue that must be addressed on the file system level to solve this bottleneck.
Tags : 
storage, storage management, backup, data backup, disk backup, defrag, defragment, defragmentation, optimize backup, optimizing backup, diskeeper, diskkeeper, disk keeper, network management, backup and recovery, desktop management
    
Diskeeper Corporation
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.