technology considerations

Results 1 - 25 of 33Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 22, 2018
• In today's ever-evolving world, content management is a moving target. With content flowing from a multitude of places, keeping up with the speed of business requires a content management strategy that's more flexible than traditional Enterprise Content Management (ECM). • As digital transformation forces organizations to rethink their processes, it's never been more important to focus on deploying a platform that works across all of your content so you can get more value out of each asset and protect yourself against technology stagnation. • Check out our ebook, 5 Considerations For Transforming Your ECM Strategy With Cloud Content Management, and learn how to bring your people and information together in the cloud.
Tags : 
    
Box
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
Blue Coat Systems
Published By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: Polycom     Published Date: Feb 25, 2015
This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers.
Tags : 
polycom, collaboration, connectivity, communication, deployment, video conferencing, infrastructure, messaging, business technology, telecom
    
Polycom
Published By: CA Technologies     Published Date: Jun 04, 2015
In the Application Economy, speed, innovation, and quality, have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition (like insurance, banking, telecommunications or retail), or a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. In this Whitepaper, learn how the Application Economy is driving Digital Transformation in companies, and how you can position your organization for success.
Tags : 
    
CA Technologies
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, firewalls, internet security, security management, business technology, research
    
Qualys
Published By: Monotype     Published Date: Jun 16, 2016
Read Monotype’s latest white paper to learn: - User interface and technology considerations at each stage of the Product Maturity Model - How using advanced font technologies in early stages can lay the groundwork for smoother transitions and advanced product features - The difference between scalable fonts and bitmap fonts
Tags : 
monotype, spark, font, product maturity model, product maturity, user interface, user experience, font technology, emerging marketing, social media, internet marketing, crm & customer care, marketing research, traditional marketing
    
Monotype
Published By: Dell EMC     Published Date: Apr 18, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
hci, hyperconverged infrastructure, storage, hybrid
    
Dell EMC
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Published By: Plantronics     Published Date: May 20, 2016
This white paper reveals seven necessary technologies to help ensure end users can take full advantage of web conferencing, from wherever they happen to be.
Tags : 
web conference, technology, web meetings, web conferencing, online conference, mobility, video conference, security, byod, bring your own device, application security, mobile computing, video conferencing, webinars & web conferencing, online video marketing, virtualization
    
Plantronics
Published By: Red Hat     Published Date: Apr 18, 2011
This IDC report discusses the clear benefits of cloud computing?and how to best obtain next-generation performance, flexibility, and savings with key technology and process considerations.
Tags : 
cloud computing, portability, and interoperability, interoperability
    
Red Hat
Published By: Intel Corp.     Published Date: Nov 21, 2017
This Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
    
Intel Corp.
Published By: Polycom     Published Date: Nov 06, 2014
This report examines the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom RealPresence Platform to readers.
Tags : 
video conferencing, basics of video conferencing, deploying video conferencing, polycom, the benefits of video conferencing, smart phones, business technology
    
Polycom
Published By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : 
allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting, vendor considerations, implementation, population health, meaningful use, triple aim, patient engagement, stage 2 requirements, electronic health record, ehr, best practices, business management, business process automation
    
Allscripts
Published By: CA Technologies     Published Date: Jun 04, 2015
In the Application Economy, speed, innovation, and quality, have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition (like insurance, banking, telecommunications or retail), or a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. In this Whitepaper, learn how the Application Economy is driving Digital Transformation in companies, and how you can position your organization for success.
Tags : 
    
CA Technologies
Published By: SEPATON     Published Date: Jun 23, 2008
Deduplication is becoming an essential tool to help data center managers control exponential data growth in the backup environment. The methods used to accomplish deduplication vary widely as do the levels of capacity optimization they can provide. Some techniques are well suited to small-to-medium sized backup environments, while others are optimized for larger enterprises. This report describes the various techniques used today to deduplicate data and highlights unique deduplication considerations for enterprise environments.
Tags : 
deduplication, sepaton, storage, vtl, virtual tape library, storage virtualization, small business networks, storage management, data deduplication
    
SEPATON
Published By: CDW     Published Date: Jun 08, 2015
This Technology Spotlight discusses the challenges organizations face in migrating off Windows Server 2003 and key considerations and steps involved in this important strategic IT undertaking.
Tags : 
servers, windows, 2003, upgrade, security, small business networks, data center design and management
    
CDW
Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet
Published By: CDW     Published Date: Jun 15, 2015
This Technology Spotlight discusses the challenges organizations face in migrating off Windows Server 2003 and key considerations and steps involved in this important strategic IT undertaking.
Tags : 
servers, windows, 2003, upgrade, server hardware, project management, service management
    
CDW
Published By: Polycom     Published Date: Sep 09, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Nov 29, 2016
40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365.
Tags : 
    
Polycom
Published By: Cisco     Published Date: Jul 11, 2016
Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact centers, their advantages and the essential considerations for selecting a vendor.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Aug 16, 2017
"40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365. "
Tags : 
polycom, office 365, cloud, voice, skype
    
Polycom
Published By: Tekscan     Published Date: Dec 07, 2017
This white paper provides a look at the underlying sensor technology and discusses important considerations in designing sensors into a robotic application.
Tags : 
tekscan, robotic sensors, robotic manufacturing, manufacturing, design technology, internetworking hardware, optical networking, enterprise resource planning, product lifecycle management, productivity, project management
    
Tekscan
Previous   1 2    Next    
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.