fte

Results 376 - 400 of 1803Sort Results By: Published Date | Title | Company Name
Published By: Code42     Published Date: Mar 31, 2017
Data migration strikes dread in the hearts of IT admins everywhere. It’s expensive, time-consuming, and often results in data loss. As the amount of enterprise data on laptops increases, the time and burden it takes to manage the continuous tech refresh process increases as well. But it doesn’t have to.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: Cohesity     Published Date: Aug 21, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 24, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions. Download this case study to find out how WestLotto reduced backup and recovery times by up to 98% with Cohesity’s hyperconverged secondary storage system.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
The City of Santa Barbara, California is located just 90 miles northwest of Los Angeles is the county seat of Santa Barbara County with a population of just over 90,000. Often referred to as the ‘American Riviera’, Santa Barbara is located between the Pacific Ocean and the Santa Ynez Mountains. Santa Barbara functions similar to a big city because it manages its own police and fire departments, city waterfront, and airport, managing an annual operating budget of just over $350M with approximately 1600 employees. The IT team supports all technology functions and operations for the City, including data backup and protection.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 26, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year. Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers, your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Dec 04, 2018
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
restaurants, quick-serve restaurants, qsr, fast food, convenience food, restaurant technology, qsr technology, guest experience, pos, digital entertainment, wifi, television, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comdata     Published Date: Jul 05, 2017
The CEO’s signature is on the dotted line and you’ve convinced your executive team to implement a virtual credit card program, also known as ePayables. That is something to celebrate! After all, you have taken the first step in automating your AP processes, improving your profit margin and reducing paper checks. But don’t celebrate for too long; it’s time to get started on implementing your program so you can start reaping the rewards.
Tags : 
    
Comdata
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, business technology
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, it management, knowledge management, storage, data management
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, it management, data management
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : 
storage, backup, recovery, best practices, networking, it management, data management
    
Commvault
Published By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : 
reporting, configuration, auditing, email reminders, data, communication, concur, maxus
    
Concur
Published By: Concur Technologies     Published Date: Oct 01, 2015
In this report we will explore the components of AP automation and the challenges they help AP departments overcome. We will also discuss how connecting business travel, related expenses and invoice management can transform an AP operation by providing total visibility into employee spend. AP leaders often believe they are leveraging the power of AP automation but are actually only using some components of a truly automated solution. Let’s explore what true automation means to accounts payable.
Tags : 
ap automation, ap departments, business travel expenses, visibility into employee spend
    
Concur Technologies
Published By: Conductor     Published Date: Apr 09, 2013
It’s no secret that natural search is now one of the most promising customer acquisition channels for organizations. Yet, it's often hard to develop a strategy from scratch. In this how-to guide, we'll walk you through every step of the process to getting your SEO program set up, including: •Making the case for natural search •Getting buy-in from managers •Starting to measure ROI from SEO Download this how-to guide to build a successful strategy, whether you're starting from scratch or have had a program in place for years.
Tags : 
how to, seo, seo software, automation, optimization, search engine optimization, natural search, organic search, budget, roi
    
Conductor
Published By: Conductor     Published Date: Aug 20, 2013
Often times, in-house or agency SEOs come across a variety of hurdles while trying to improve SEO within the organization. Two of the most common hurdles are difficulty implementing recommendations and lack of enterprise support for the SEO programs. In this white paper, a leading SEO expert shares his tips for overcoming these major obstacles by effectively involving colleagues in the SEO process.
Tags : 
seo, search engine optimization
    
Conductor
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech
    
CopiaTECH
Published By: Cornerstone OnDemand     Published Date: Sep 08, 2010
Each year, organizations around the world go through the ritual of performance appraisal. Many see it as the company's main event, in terms of performance management - the time at which most, if not all, feedback and guidance to employees is given. Progress is evaluated. Rewards are distributed. Goals are set. Then that is it, until next year. Managers often open the process with a mixture of resignation, dread and the question, Why are we doing this again?
Tags : 
cornerstone, talent management, business continuity, business performance, globalization, performance management
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Tracking employee performance is tough enough, but doing it with spreadsheets is a nightmare. It’s time consuming, error-prone and everyone in the organization suffers. And after all that hard work, what do you end up with: • Incomplete or useless employee reviews • No real organizational insight • A headache
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.