av works

Results 251 - 275 of 331Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Nov 30, 2017
The traditional office space is dead. Chased out by the combining forces of mobility, millennials, and modernity, the advent of collaborative technology and the always connected worker have led to a brave new world of shared, open spaces. Studies show that up to 82% of knowledge workers feel they need to collaborate with others throughout the day to get work done. Yet, according to an IBM study, 78% say they struggle to effectively connect their workplace and help people collaborate—either virtually or face-to-face1. Why? The answer is not all collaboration is alike. Download this report to get the latest trends in office space utilization and find out about the three main types of collaboration and how they need to be supported differently in the work environment. The office may be shrinking, but it’s not going away anytime soon. If anything, the rising demand for more teamwork and collaboration makes the configuration of workspaces more important than ever.
Tags : 
shared office spaces, collaboration, polycom, realpresence centro, transforming workspaces, video conferencing, huddle rooms
    
Polycom
Published By: Scripted     Published Date: Apr 10, 2015
In order to execute a successful content marketing strategy, you need to have the right team to lead it. This is because it takes quality content, resources, testing and consistency to see a positive impact on your business. When lacking a proper strategy, content marketing is more detrimental to your business. After reading this e-book, you’ll know how to build a team that works best for your business — even if it is just one person.
Tags : 
content marketing, content team, pitching content, content strategy, marketing team, building teamwork
    
Scripted
Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure
    
Cisco
Published By: IBM     Published Date: Mar 31, 2016
"Colorado-based, Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans that each underwriter handles by 71%. By modeling, analyzing, and improving their existing processes, Elevations has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige
Tags : 
ibm, middleware, ibm blueworks live, process improvement, organizational performance, cloud, business technology
    
IBM
Published By: IBM     Published Date: Mar 31, 2016
"IBM invites you to join us for an expert presentation and discussion of the methods and tools available to help Lean Six Sigma teams drive increased levels of efficiency, effectiveness and quality. This webcast will focus on how Lean Six Sigma teams can use collaboration tools to: Increase process efficiency and reduce waste Improve process quality and reduce variance Listen to the 'voice of the customer' to drive process improvement IBM Blueworks Live is a process modeling tool used by Lean Six Sigma teams to improve business performance and deliver greater value to customers and stakeholders."
Tags : 
ibm, ibm operational decision manager, ibm odm advanced, process improvement, lean six sigma
    
IBM
Published By: IBM     Published Date: Nov 11, 2014
Social and cloud technologies are connecting us to more people and information than we ever could have imagined. The challenge is to get the right information from the right sources in the right context at the right time. IBM has the leading cloud collaboration platform that helps you collaborate with extended networks, focus on the relevant and filter out the rest. Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
digital frontier, social technology, cloud technology, cloud collaboration, it management, knowledge management, data management
    
IBM
Published By: Symantec     Published Date: Jan 10, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of the enterprise networks and breaches of data security. Read on to learn more about how you can prevent spoofing server to server.
Tags : 
spoofing, communications, how to prevent, s2s, preventing spoofing, new attacks, security threats, symantec, it security, it threats, it management, data management, business technology
    
Symantec
Published By: Jive     Published Date: Feb 12, 2015
Enabling a "digital business" is becoming an increasing priority for organizations; the transition to enabling a digital interaction model inside an organization is twofold. There are technologies that underpin interactions as well as the cultural and behavioral changes that support this transition. Enterprise social networks (ESNs), and more broadly, social workflow, can play a significant role in this particularly when thought of as both a platform and a social workflow embedded in business systems where users are getting work done. This study identifies several key areas of market opportunity and provides criteria by which vendors can be judged now and over the next 5 years.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Published By: Cisco     Published Date: Nov 17, 2015
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable. A convergence of low-cost but high-quality technology and a highly competitive business environment is making video collaboration a channel of choice for today’s information workers and decision makers. The availability of relatively low-cost technology—including high-quality video conferencing equipment, high-bandwidth networks and easy-to-use applications and tools—is bringing video collaboration within reach of today’s workforce. The impact on innovation and productivity—as well as critical business processes, from customer service to problem-solving—is only just starting to be felt.
Tags : 
cisco, forbes insights, video conferencing, productivity, collaboration, it management, knowledge management, business technology
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
cisco, zk research, infrastructure, hybrid wan, networking
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Miercom was engaged to perfirm independent, hands-on, comparative testing of competitive IEEE 802.11ac Wave 2-based WiFi Access Points (APs) from Cisco Systems, Aruba Networks and Ruckus Wireless. This report summarizes the results of the Wave 2 AP comparative testing in these areas: - Client density: Downlink throughput as the number of client per AP scales from 10 to 100. - Single vs Multi-User MIMO: Downlink throughput for MU-MIMO (Multi-User, Multiple-Input Multiple-Output), a hallmark of 802.11ac Wave 2, vs Single-User (SU-MIMO) environments. - 1 Gbps+ Link Aggregation: Tests found that Wave 2 APs can support more than 1Gbps of aggregate downlink throughput, tested over two 1-Gbps LAG (link aggregation) connections.
Tags : 
cisco systems, meiercom, client density, mimo, link aggregation, networking, it management, data management, business technology
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : 
esg brief, cisco apic, sdn controller, wan, sdn, networking, it management
    
Cisco
Published By: Riverbed     Published Date: Jul 15, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1
Tags : 
performance, management, software, networks, virtualizing servers, storage
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
In January 2012, Riverbed® Technology announced version 9.5 of its Cascade® network performance management solution, which included a number of major enhancements. Collectively, the new capabilities are designed to improve visibility into the health and activity of applications and services traversing networks from the branch to the data center.
Tags : 
advnace, visibility, virtual data centers, technology, solution, management
    
Riverbed
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security
    
Palo Alto Networks
Published By: Riverbed     Published Date: Sep 05, 2014
Riverbed announced its collaboration with partner VMware to solve performance monitoring visibility challenges arising out of the ongoing evolution of virtual network technologies and architectures within Virtual Data Center (VDC) environments. Speci?cally, Riverbed and VMware have developed IPFIX ?ow record templates that reveal valuable insights into data and session ?ows occurring within virtual networks that use VXLAN. By adding VXLAN support to its Cascade family of solutions, Riverbed will take a market-leading role in applying application-aware network performance management to Software-Defined Networks (SDNs).
Tags : 
vxlan, performance, monitoring, virtual data, insights, visibility
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
Organizations have gained significant benefit from virtualizing servers and storage environments, and now face the daunting task of deploying new network architectures to keep pace. Software-defined networking holds significant promise to deliver a new network architecture that is abstracted and virtualized; however, organizations would be well served to learn from previous efforts to virtualize other domains in order to avoid making the same mistakes. Riverbed and VMware joined forces to help eliminate those problems and make it easier to deploy VXLAN overlay networks in highly virtualized data centers by integrating application-aware network performance management software and vSphere 5.1.
Tags : 
performance management, networking, software, virtualization, architecture, servers
    
Riverbed
Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch
Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: Marketo     Published Date: Mar 20, 2018
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders t
Tags : 
    
Marketo
Published By: Eaton     Published Date: Feb 08, 2017
Not so many years ago, network closets, server rooms and data centers were designed from a “room to rack” standpoint. Deciding specifically where to store your technology typically came later in the design process. However, rapid technology refresh cycles, the need to rackmount more equipment and the desire for increased cooling capacities in an enclosed rack (known as an enclosure), have all begun to reverse that trend. Today, IT professionals are designing these critical workspaces with more of a “rack to room” methodology.
Tags : 
    
Eaton
Published By: Jigsaw     Published Date: Mar 15, 2010
One of the great myths in marketing & sales is that generating lots of 'leads' or 'awareness' for a product automatically translates into lots of new business. But quantity does not equal quality. The truth is this: if you don't have a clear denition of who your ideal customer is, why they buy, the language and stories that are meaningful to them, and where they live, you won't find them. Use this worksheet to help.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.