technology white paper

Results 251 - 275 of 312Sort Results By: Published Date | Title | Company Name
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in todays business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solutions scalable licensing offerings, and mobile-app features that support IT staffanywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management, enterprise applications
    
Hewlett-Packard Company
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Its not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds, storage, data management
    
Riverbed
Published By: DocuSign     Published Date: Mar 23, 2016
According to Forrester Research, the new age of the customer has arrived. Driven by cloud technology and advances in mobility, the power of business has shifted to consumers. This white paper demonstrates how you can enhance the signing experience for new hires and employees alike in recruiting and in HR.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs, human resources
    
DocuSign
Published By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : 
lefthand networks, san, storage area networks, simplification of storage, central data storage, international computing
    
LeftHand Networks, Inc.
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike. Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code and their customers with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware, security management
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike. Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code and their customers with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates, security management, security policies, vulnerability management
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike. Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code and their customers with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing, software development
    
Symantec Corporation
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possibleSymantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications, data quality
    
NEC
Published By: NEC     Published Date: Aug 12, 2014
As virtualization technology evolves and improves, the server performance and power requirements for supporting a virtualized data center increase. Your aging servers are struggling to meet increasing virtual workload demands. These older, lower-performing servers further tax your data center by consuming valuable space and power. You want to update, upgrade, and consolidate to a powerful new server solution that will provide an excellent virtualization platform. In this white paper, youll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel Xeon processor E7-4890 v2, offers just that.
Tags : 
consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, workload, data center design and management
    
NEC
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
According to a 2005 survey from the CMO Council and KnowledgeStorm, prospects value white papers more than any other content produced by technology companies. And while most technology companies regularly publish white papers, they fail to get the maximum marketing value for their efforts.
Tags : 
emerging marketing, white paper, whitepaper, whitepaper marketing, white paper marketing, lead generation, zigzag
    
ZIGZAG Marketing, Inc.
Published By: Schneider Electric     Published Date: May 03, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for Industry 4.0 is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
smart machines, industry 4.0, smart factory, iiot, opc ua, data, analytics, machine services, revenue models, business models, industrial automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plants overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : 
dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change, backup and recovery
    
HP
Published By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : 
data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
    
HP
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics, activity monitoring, corporate performance management, outlooksoft, outlook soft, it management, best practices, business intelligence, business management, enterprise software, productivity
    
OutlookSoft
Published By: webMethods     Published Date: Aug 21, 2009
The goal of Business Process Productivity is to enable enterprises to become both highly agile and highly efficient, allowing them to more easily leverage their existing information technology (IT) assets to address market opportunities and pressures, and to create competitive differentiation through their business processes. This white paper describes how webMethods Fabric helps companies increase Business Process Productivity.
Tags : 
business process, bpm, bpa, productivity, competitive, business management, efficiency, web methods, webmethods, enterprise applications, business intelligence, business process automation, business process management
    
webMethods
Published By: Dell Software     Published Date: Jul 18, 2012
Choosing a help desk solution
Tags : 
technology, help desk, management, tracking problems, ticket requests, white paper, customer service, web service management, service management
    
Dell Software
Published By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : 
mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact, intact technology, documents to go
    
DataViz
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
According to a 2005 survey from the CMO Council and KnowledgeStorm, prospects value white papers more than any other content produced by technology companies. And while most technology companies regularly publish white papers, they fail to get the maximum marketing value for their efforts.
Tags : 
whitepaper marketing, white paper marketing, lead generation, zigzag
    
ZIGZAG Marketing, Inc.
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking, financial, mobile banking, provenir
    
Provenir
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was rapid growth. The pain points most often cited were manual processes that cause mistakes and inefficiencies, the need for more functionality, an inability to scale to support growth, integration problems, especially with the growing number of customer and partner systems, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support rapid growth and drive business success.
Tags : 
microsoft dynamics, crm, compliance, security, enterprise applications, customer relationship management
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance, enterprise applications, customer relationship management
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality, enterprise applications, customer relationship management
    
Microsoft Dynamics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.