location data

Results 151 - 175 of 268Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Feb 17, 2017
In this white paper, we will look into: • The changing face of the colocation buyer • Industry structure, including mergers and acquisitions • The Internet of Things and big data • Edge computing • Cloud computing and Internet Giants • The impact of data center infrastructure management (DCIM) • Data center design architectures
Tags : 
colocation, iot, internet of things, big data, edge computing, cloud computing, dcim, data center infrastructure management, data center design architectures
    
Schneider Electric
Published By: ADP     Published Date: Nov 16, 2017
People are the most important part of your organization. Understanding what they do, how they do it, and even why they do it, provides invaluable insights for optimizing your processes, department, or entire organization. And as a business leader, in many ways you’ve never had it so good. There’s more people data available than ever before, and you’ve got the opportunity to put it to work through data-driven initiatives like changes to workforce demographics, employee retention, or benefits allocations. And most important, you have a chance to fuel business decision-making with smart workforce insights. Once you’ve learned how to turn your people data into real business value, you’ll create more visibility within your business, and everyone will see that the rewards of HR analytics are worth the effort. It’s time to take the opportunity to prove the value of data-driven HR. No more darkness. Otherwise, the only journey ahead is into some challenging pitfalls. We’ve identified five of t
Tags : 
    
ADP
Published By: Nasuni     Published Date: Nov 19, 2014
When world-class architecture and design firm Perkins+Will needed a high performance storage platform to support their global teams, they turned to Nasuni. With 24 locations around the world, traditional storage and data protection schemes were becoming expensive and difficult to manage. Teams in different locations wanted access to shared project data. Nasuni has allowed Perkins+Will to deploy a high performance storage platform that delivers data protection and synchronization at a fraction of the cost and complexity of any existing solution.
Tags : 
storage management, data protection, data synchronization
    
Nasuni
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Published By: Progress     Published Date: Jan 22, 2019
The customer experience is incredibly important to business success and is often tied to customer engagement, retention rates, revenue, purchase frequency and overall loyalty. Today, the customer journey is incredibly complex, with everything from geographic location to data quality influencing the customer experience. As a result, brands may not be making the most of their customer experiences.
Tags : 
    
Progress
Published By: Panduit     Published Date: Aug 28, 2018
Interested in learning how the right physical and network infrastructure approach in your colocation data center facility can help you stabilize costs, provide better security, and help promote growth for you and your tenants? Download the Panduit white paper Optimizing Colocation Infrastructure Strategies to learn how to overcome the challenges of aging colocation data center infrastructure and onboard new tenants quickly.
Tags : 
panduit, colocation, data center, data center management, infrastructure, colocation provider
    
Panduit
Published By: Panduit     Published Date: Oct 09, 2018
Interested in learning how to stabilize costs and promote growth for you and your tenants? Download the Panduit white paper Colocation Provider Strategies for Success to learn how you can enable ongoing monitoring and maximize your colo data center’s efficiency.
Tags : 
panduit, colocation, data center management, network monitoring
    
Panduit
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Sage     Published Date: Jul 08, 2015
This white paper describes how ERP technology can improve efficiency by: • Standardizing and automating business processes—locally as well as across multiple locations and countries—to accelerate business operations. • Offering a fully integrated suite of business management applications that share a common dataset and extending these applications over the Internet, allowing visibility and collaboration across departments, as well as with customers, partners, suppliers, and remote users. • Providing flexible and customizable reporting to improve business reporting, analysis,and insight.
Tags : 
enterprise resource planning, erp, efficiency, operating costs, standardization, automation, business management
    
Sage
Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : 
sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy, analytics
    
SDL Web Content Management Solutions
Published By: Internap     Published Date: Aug 22, 2011
Deciding on colocation and trying to select a provider? Download the guide to learn about driving factors, benefits, assessment considerations and more.
Tags : 
internap, colocation, buyer's guide, roi, prospective provider, drivers, smb, enterprise, it infrastructure, data center
    
Internap
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As organizations become more distributed, directors of network security teams must provide connectivity to new locations, applications and systems at a moment’s notice. What’s more, protecting users and data from rising threats is changing the demands for network performance, manageability and security. In this session, we discuss how distributed organizations are enabling new locations, both physical and virtual, to be brought up quickly and managed consistently. We then examine how to take advantage of commodity broadband instead of traditional leased lines, implement business security processes seamlessly across all locations, and how to interactively monitor remote environments. Presenter: Michael Knapp, Director of Network Security Architects, Forcepoint This session is part of the Forcepoint-sponsored Network Security eSummit in partnership with the MIS Training Institute (MISTI). Watch the other event sessions: Digital Transformation and the Intersection of Networks, Securi
Tags : 
    
Forcepoint
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.