it management

Results 351 - 375 of 6251Sort Results By: Published Date | Title | Company Name
By: Creative Lodging Solutions     Published Date: Apr 16, 2015
Hotel room prices account for only a fraction of total corporate lodging costs. What could your company be overlooking? Read our “The Total Cost of Lodging” white paper to discover: •The top 3 largest costs in lodging management •The percentage of inaccurate hotel invoices •How to save on lodging Find expert answers to rising hotel rates, inaccurate billing, and inefficient systems. Read more to find out how to make your lodging program better!
Tags : travel management, lodging, domestic, corporate, costs, trip
     Creative Lodging Solutions
By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : web analytics, frost & sullivan, bot management, botnet
     Akamai Technologies
By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : credential abuse, bots, marketing, bot management, bot solutions
     Akamai Technologies
By: IBM APAC     Published Date: Jul 09, 2017
IT departments are under constant pressure to deliver improved user experiences that lead to revenue growth. Achieving this goal requires addressing multiple areas at once: taking advantage of the flexibility and scalability of the cloud; empowering mobile users with anytime, anywhere access; and accelerating digital transformation.
Tags : digital transformation, ecm, enterprise content management, cloud, flexibility
     IBM APAC
By: IBM APAC     Published Date: Jul 09, 2017
Are you making the most of your enterprise content? Doing so can mark the difference between being a disruptor and being disrupted. Download this infographic to find out more.
Tags : digital transformation, enterprise content, ecm, enterprise content management
     IBM APAC
By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralised administration.
Tags : entrust ssl certificates, security, security application, ssl certificates, ssl certificate management, entrust certificate services
     Entrust Datacard
By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.
Tags : entrust solutions, certificates, security, security application, authority, security management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
     Entrust Datacard
By: ShoreTel     Published Date: Oct 26, 2012
Compared with Cisco products, ShoreTel UC can offer numerous advantages, including streamlined deployment and management, easier scalability, and a significantly lower total cost of ownership (TCO).
Tags : shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution
     ShoreTel
By: EMC Converged Platforms     Published Date: Jan 12, 2016
In order for enterprises and IT organizations to truly innovate and offer differentiated value to customers, you need an IT infrastructure based on the latest advancements in computing, networking, and storage. Considering an investment in flash storage or converged infrastructure? Read this brochure to learn more about the Vblock® System 540, the industry’s first all-flash Converged Infrastructure System for high-performance mixed workloads and emerging 3rd platform applications—built on best of breed technology components including EMC XtremIO all-flash storage. All of this with the VCE™ Experience of unmatched management and one-call support.
Tags : vce, it infrastructure, all flash storage, vblock system 540, 3rd platform applications
     EMC Converged Platforms
By: Dell EMC     Published Date: Jul 05, 2016
Unity’s all flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best flash economics – price, density, and TCO.
Tags : storage management, performance management, best practices, application integration, technology, business intelligence, flash
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
Unity’s hybrid flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best hybrid economics – price, density, and TCO.
Tags : storage management, performance management, best practices, application integration, technology, business intelligence, hybrid
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : data management, business practices, data center. data application, enterprise applications, security, performance management
     Dell EMC
By: Quantum     Published Date: Jun 20, 2017
In the past, the production of professional quality corporate videos was delegated to outside agencies. Corporate business units hired marketing firms and video production houses because those outside agencies were the only ones with both the required expertise and the expensive equipment needed to generate high-quality results. Quantum teamed up with the Communications Media Management Association (CMMA) to survey their members—media production managers from leading enterprises—to learn more about the benefits and challenges of creating video in-house. Download the eBook, “The Changing Landscape of Corporate Video Production” to get the following questions answered and more: • Will in-house creative teams continue to ramp up in production? • What video formats are they currently producing and delivering? • How are they archiving their content? • What challenges are in-house teams facing as they generate more content? Today, that is changing. As the cost of video production technology drops, more corporations are recognizing the value of bringing production in-house. According to a recent report by Vidyard, 85% of businesses surveyed now have internal staff and resources producing videos in-house.
Tags : change, landscape, corporate video production, quantum
     Quantum
By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network
     Venafi
By: Heiler     Published Date: Feb 22, 2012
Multiple channel distribution is becoming increasingly important, irrespective of whether the businesses in question are B2C or B2B-focused. The key drivers are the long tail, multi-site and changes in category management. Find out more now!
Tags : heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
     Heiler
By: Heiler     Published Date: Feb 22, 2012
This white paper takes a look at First Movers, those who believe in social commerce and hope to discover what significance Product Information Management (PIM) has in this context.
Tags : heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
     Heiler
By: Heiler     Published Date: Feb 22, 2012
This white paper provides insight on how PIM is changing process and offers 6 key factors on how to succeed in implementation and change management.
Tags : heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
     Heiler
By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
     Emerson Network Power
By: Iron Mountain     Published Date: Aug 28, 2014
Download this analytics report to learn how your healthcare organization can develop a successful strategy to manage data.
Tags : iron mountain, healthcare it, health it, data management, healthcare data management, hit, meaniingful use, icd-10, information security, information management
     Iron Mountain
By: Iron Mountain     Published Date: Aug 28, 2014
Download this whitepaper to learn strategies for effective healthcare information lifecycle management.
Tags : iron mountain, healthcare data, healthcare it, hit, ehr, health information, information lifecycle management, ilm
     Iron Mountain
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com