rim

Results 301 - 325 of 1438Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your small business is primed for a growing future—but with every new employee and client, you have more files to store and manage. Without a strong file sharing solution, it’s tough for your IT team to manage secure, anywhere access to key files for all your users. The solution is to adopt an enterprise-grade file sharing platform that grows with you. In this e-book, you’ll learn how enterprise-grade file sharing supports your growth with: • More efficient collaboration processes • Streamlined security and compliance • Unified access to files across locations and devices
Tags : 
    
Citrix ShareFile
Published By: Clickable, Inc.     Published Date: Jun 22, 2009
Locally placed search advertising in the U.S. is projected to grow 30 percent over the next five years, from $4.1 billion in 2008 to $5.3 billion in 2013. According to new research by Borrell Associates, this growth will be led primarily by advertising service providers that adopt scalable technology infrastructure and recalibrate their economics to allocate more customer investment to search media spend.
Tags : 
search marketing, clickable, search, seo, search engine, advertising, infrastructure, media spending
    
Clickable, Inc.
Published By: Clickatell     Published Date: May 20, 2008
Communication is a profoundly human activity and the primary driving force behind all technological development. The secret of the mobile phone’s success lies not just in its simplicity, but also in its adaptability.  Download this white paper to learn more.
Tags : 
clickatell, mobile marketing, sms marketing
    
Clickatell
Published By: Cloud Direct     Published Date: Jan 17, 2018
Azure Site Recovery replicates your on-premises physical servers and virtual machines to Azure. If an outage occurs in your primary location, you failover to the DRaaS platform within minutes and your applications and workloads will be available. When normal operations resume, you can failback to your primary location. For added reassurance, Cloud Direct is a Microsoft Gold Partner. This means in addition to our own 24/7 support, we also benefit from direct access to Microsoft support for a range of hosting scenarios – including SQL Server, Exchange and SharePoint.
Tags : 
business, cloud solutions, data centre, smb, systems, technical
    
Cloud Direct
Published By: Cloud Sherpas     Published Date: Dec 01, 2015
In this complimentary report, Cloud Sherpas shares results that uncover the shortcomings of the primary, on premise computing devices typically in use today, including extended wait times for users and high maintenance requirements for IT that lead to significant productivity losses for both groups.
Tags : 
chromebook, google chrome, google enterprise solutions, google cloud applications, business cloud apps, google app migration, cloud apps for business, google apps resellers
    
Cloud Sherpas
Published By: Cohesity     Published Date: Nov 20, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. Burris Logistics IT Team manages two data centers, one primary and another DR site that supports multiple remote locations up and down the East Coast. Download this case study to see how Burris Logistics acheived these benefits: - Over 80% reduction in backup windows - 25% CapEx savings and ongoing OpEx savings - Simplified operations with an easy-to-use and manage UI
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require “production-class” data protection, yet few data protection solutions offer such capabilities today.
Tags : 
    
Cohesity
Published By: Comcast Business     Published Date: Oct 17, 2013
Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, networking
    
Comcast Business
Published By: Comcast Business     Published Date: Oct 17, 2013
Learn how Ethernet has grown from a little-known networking protocol to the industry standard and is the best way for your IT team to cut costs, while increasing productivity.
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, ethernet, total cost of ownership, networking
    
Comcast Business
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management
    
Commvault
Published By: Compliance Associates     Published Date: Jun 29, 2015
Are you feeling the pressure to meet FDA guidelines on Quality by Design (QbD) principals for Process Validation? Existing manufacturing, LIMS, ERP and document management tools are lacking integration and on demand view of your processes. They have hidden costs, risks and create delays to scalable product manufacturing and revenue. Since the FDA is demanding scientific arguments to support process and product development activies and a lifecyle approach, consider the value of a purpose built app for Process Validation. This new class of APP will bring your products to market faster and lower the risk of costly delays. Download the Primer to learn more.
Tags : 
regulatory compliance services, validation services, regulatory compliance, fda rulings, validator, validation, validation consultants
    
Compliance Associates
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks
    
Concentric
Published By: Concur     Published Date: Dec 06, 2012
A straightforward guide that covers what expenses fraud is, what it costs the UK, whether you should be concerned, and what you can do about it.
Tags : 
expenses, fraud, criminal, intentional, personal finance, small business, finance
    
Concur
Published By: Concur     Published Date: Feb 04, 2013
Expense fraud costs a median loss of $33,000 in each instance, according to Association of Certified Fraud Examiners (ACFE). Despite the nonchalant attitude of many employees, expense fraud is a crime that affects organizations large and small.
Tags : 
fraud, expense fraud, corporate expense policy, preventing fraud, identifying fraud
    
Concur
Published By: CradlePoint     Published Date: Sep 04, 2014
Once considered experimental merchandising for adventurous retailers and cash-strapped entrepreneurs, pop-up stores have become an established national phenomenon and a legitimate means of testing product, generating buzz, building brand awareness, and driving sales for big-name retailers and ambitious upstarts alike. Growth in mobile broadband technology is expanding the possibilities for a diverse array of applications in mobile pop-up. Furthermore, the “fly-by-night” qualities that might have characterized early pop-ups have now been supplanted by dependable, secure infrastructure solutions that put temporary retail locations on par with their more permanent counterparts. Download the whitepaper to learn more!
Tags : 
pop-up stores, secure infrastructure solutions, mobile pop-up, cradlepoint
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
Retailer Uses Cradlepoint Solution to Provide Wireless Failover & Redundancy for Point-of-Sale (PoS) Systems Cradlepoint devices provide wireless backup of wired Internet connections for retail superstores in the Blinds To Go system. In the event of an outage of the primary Internet land line (T1/fi ber, DSL, or cable) at a Blinds To Go site, Cradlepoint devices automatically switch to its wireless 3G/4G broadband connection within 30 seconds. The point-of-sale (POS) systems connected to the Cradlepoint router continue to operate at broadband speeds without further interruption, ensuring continuous uptime for POS transactions at the Blinds To Go superstore.
Tags : 
    
CradlePoint
Published By: Crimson Hexagon     Published Date: Jan 14, 2013
Political humor and political memes have represented a significant portion of political engagement on Twitter throughout the 2012 presidential campaign. This white paper analyzes how satire has propagate political messages.
Tags : 
social media, messaging, political messaging, satire, memes, crimson hexagon
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Jan 14, 2013
Social media is becoming the executive equivalent to catching lightning in a bottle. It has quickly gone from ultimate focus group and brand popularity contest to a serious digital marketing platform. Read to learn about the Four C's of Social Media.
Tags : 
four c's of social media, c suite, crimson hexagon, social media, marketing
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Jan 14, 2013
With several major retail clients, the growing popularity of consumer "show rooming" piqued our interest at Crimson Hexagon. We were curious: how can we leverage online consumer opinion to address this major industry wide challenge?
Tags : 
customers, competition, crimson hexagon, social data, social media, show rooming
    
Crimson Hexagon
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.