technology requirements

Results 51 - 75 of 97Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 22, 2008
This IDC white paper discusses how the current need for server virtualization, infrastructure consolidation and energy efficient technology requires significant changes to IT systems. It describes the steps to take to achieve high availability and reduce operational costs, while still adhering to the requirements of “green IT.”
Tags : 
ibm, ibm opt it, green, environmental, environment, virtualization, virtual server, virtual machine, high availability, it management
    
IBM
Published By: IBM     Published Date: Aug 31, 2009
Get rates as low as 1.50%* for hardware, and 2.30%* for software, on transactions as low as $5,000
Tags : 
financing, it solutions, ibm, systems and storage, savings, finance, financing transaction, budgeting, planning, outright purchase, technology requirements
    
IBM
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio, business technology
    
Navisite- A Time Warner Cable Company
Published By: Jobvite     Published Date: Mar 14, 2014
As recruiting continues its evolution into a more marketing focused function, recruiters are increasingly craving enhanced technology that speaks directly to their needs. But getting executive leadership to understand this fact—and invest in recruiting beyond the generic HR suite—is still an uphill battle. If you band with the right alliances, however, and uncover a vendor solution that can deliver the ROI you need while satisfying your IT and reporting requirements, you will make a strong business case that executives will have difficulty denying.
Tags : 
vendor solution, reporting requirements, business sponsor, hr suites, job seekers, ats, technology requirements, business technology
    
Jobvite
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
OpenText
Published By: EMC Backup & Recovery Solutions     Published Date: Jul 29, 2009
This document examines VMware's implementation of the Avamar technology, including a discussion of its organizational challenges and evaluation requirements. VMware's results are highlighted and future implementation plans are summarized.
Tags : 
emc, data domain, efficiency, vmware, vcenter, avamar, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
    
EMC Backup & Recovery Solutions
Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Adobe     Published Date: Apr 13, 2015
This Gigaom Research report aims to help technology decision-makers better understand: - What the modern workforce thinks it needs to succeed in this rapidly changing world of mobile-first communications and new work-collaboration technologies - How IT is supporting those needs and overall corporate objectives - If there are gaps between worker expectations and IT requirements, and how technology buyers can address them Download this Gigaom Research white paper to learn more.
Tags : 
adobe, modern workforce, platform support, platform productivity, it support, work-collaboration technologies
    
Adobe
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management
    
Arcserve
Published By: Port25 Solutions     Published Date: Mar 23, 2012
Using PowerMTA's VirtualMTA technology, Pure360 was in a position to easily provide dedicated IPs for their clients. and adhere to ReturnPath's certified sender requirements to maintain high inbox placement rates.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management
    
Port25 Solutions
Published By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology, networking, data management
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology, business technology
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: IAG Consulting     Published Date: Aug 24, 2010
If your organization is not predictably successful in technology projects, there is likely an issue in requirements. CIO?s must take action and own requirements maturity improvement. CIOs are in the best position to sell requirements maturity improvement to the organization and can greatly help the process by effectively communicating required actions, and ensuring a suitable resources allocation. There are 6 things your CIO needs to know to help him/her in their role of requirements change advocate.
Tags : 
iag, project management, project management, maturity, consulting, cio, maturity
    
IAG Consulting
Published By: Cisco     Published Date: Aug 27, 2015
Implementing multigigabit technology to address new requirements and avoid costly cabling upgrades.
Tags : 
cisco, zk wifi, multigigabit, network, 802.11 ac
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. This rule significantly expands the definition of fiduciary, spanning financial advisors as well as plan sponsors, funds, and producers who provide incentives to advisors. The rule has far-reaching impacts on business, compliance, and operations/technology and the April 2017 compliance deadline is coming up quickly. View this on-demand webinar and learn how DocuSign can help you: • Satisfy the final rule requirements by automating disclosures with a tamper-proof audit trail • Delight clients and brokers by providing a greatly improved customer experience • Meet critical DOL deadlines with rapid implementation "
Tags : 
    
DocuSign
Published By: IBM     Published Date: Oct 14, 2014
Enterprises of all sizes must defend against online attackers. While security threats continue to evolve, organizations often lack the personnel and financial resources required to protect online systems. Read this service profile to learn how IBM Managed Security Services can help you protect your security investment while reducing the cost and complexity of your security operations. Find out how IBM combines industry-leading tools, technology and expertise with flexible, scalable packaging to meet a broad range of security solution requirements.
Tags : 
security operations, deployment, service delivery, problem management, it management
    
IBM
Published By: Comcast Business     Published Date: Jan 15, 2015
It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, servers, network, pos, ecommerce
    
Comcast Business
Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, servers, network, pos, ecommerce
    
Comcast Business
Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, accounting, payroll, servers, network
    
Comcast Business
Start   Previous    1 2 3 4    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.