fte

Results 251 - 275 of 1759Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Apr 22, 2015
Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that used to support this access often grew organically and were not engineered to support the widespread, high bandwidth needs of users.
Tags : 
infrastructure, wireless, bandwidth, engineering, mobile, workforce, demands, it management
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
Established in 1919, Junior Achievement USA is the world’s largest organization dedicated to educating K–12 students about workforce readiness, entrepreneurship and financial literacy through experiential, hands-on programs. The nonprofit organization reaches more than 4.6 million students per year in 201,444 classrooms and after-school locations. Nearly 220,000 volunteers, including businesspeople, parents, college students and retirees, support JA programs.
Tags : 
cdw, junior achievement usa, financial literacy, ja programs, networking, knowledge management
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
IT decision-makers at most enterprises understand the benefits that the cloud has to offer: increased agility and more predictable budgeting, among others. In many organizations, in fact, “cloud first” has become the mantra when seeking out new software solutions. But often, enterprises are less clear on the specific use cases of Infrastructure as a Service (IaaS) and how providers can help deliver IT capabilities that meet their needs and help them to achieve desired business outcomes.
Tags : 
technology, cloud, data, productivity, enterprise, business management, business technology, data center
    
CDW
Published By: CDW     Published Date: Sep 15, 2016
This white paper displays how organizations see big wins after deploying apps to improve interactions.
Tags : 
    
CDW
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, it management, knowledge management
    
CDW-Trend Micro
Published By: CenTrak     Published Date: Jun 11, 2012
Learn why RTLS accuracy can make all the difference when managing your hospital equipment. See how much money a major Southern California Hospital saved after deploying the world's most accurate real-time location system.
Tags : 
hospital asset management, asset tracking system, real-time location system, hospital tracking system
    
CenTrak
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"The days of a consistent and reliable “search, click, buy” process are long gone. In its place is often a complicated web of deliberate steps, each one inching your target consumer closer to the “buy now” button over the course of many days, weeks or months. This continually-evolving journey is no longer a clear-cut funnel, but more of a maze. Each consumer path is unique and uncertain — which means today’s e-commerce seller hasn’t reached its full potential until it’s maintaining a strong presence at every twist and turn. Download this eBook to learn how to leverage a wide range of marketplace and digital marketing tactics to reach consumers at any stage of their journey."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, consumer behavior, consumer journey, marketing, digital marketing
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"There are millions of retailers and branded manufacturers on Amazon, selling billions of products annually. That means listing your products and waiting for sales to roll in doesn’t work anymore. If you’re on Amazon, you need to stand out. In this eBook, we’ll walk you through everything you could want to know about Sponsored Products, why sellers are using it and how to leverage the program to stand out among the billions of products on Amazon. We’ll also answer some of the questions we often hear about the popular program (and some questions we haven’t heard but think you may be curious about)."
Tags : 
ecommerce, retail, amazon, advertising, selling online, online shopping, online advertising, marketing, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Cielo     Published Date: Mar 04, 2016
"Outsourcing" often gets a bad name. But when it comes to your recruitment function, partmering with an outside expert can successfully transform your approach to talent acquisition and deliver measurable business results faster.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring, human resources
    
Cielo
Published By: Cielo     Published Date: Mar 04, 2016
A few years ago, during one of the toughest economic periods in recent memory, companies were looking for the lowest-cost option for handling recruitment. “Recruitment Process Outsourcing (RPO) was an attractive solution, and cost was often the main driver when contracts were signed,” says Angela Hills, Executive Vice President at Cielo, Inc.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring, human resources
    
Cielo
Published By: Cirque Du Soleil     Published Date: Apr 04, 2017
We know “company event” is not the first thing that comes to mind when thinking about Cirque du Soleil. Cirque is known for its unique style of high quality entertainment, artistic acts that defy gravity and performances that remain in the guests’ hearts long after they have seen them…which is all the more reason why our shows are the perfect setting for a corporate outing!
Tags : 
corporate events, events, event catering, company events, event planning, company outing, entertainment
    
Cirque Du Soleil
Published By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : 
cisco, spam, anti-virus, servers, firewall
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection, networking
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security, defenses, management center
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national, data management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The technology that powers organizations has undergone several major transitions since the birth of computing. In the 1960s, the mainframe was the dominant compute model, and it gave way to minicomputing about a decade later. In the 1990s, businesses eventually shifted to PC-based computing in the client/server era. This model was eventually supplanted by Internet computing as the dominant compute model. Today, the technology industry finds itself in the midst of the most significant transition ever: the shift to mobile computing.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The discussion spotlights the innovative FlexPod for Microsoft Private Cloud. Details include: • What to expect on your journey and what you shouldn't overlook • How to make organizations truly agile and opportunistic in today's market • What organizations fail to consider and how it will affect them even after deployment
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco
Published By: Cisco     Published Date: Jan 21, 2015
The Internet of Things is one of the most often discussed and hotly debated topics in IT today. Now see how factories, utility companies, railroads, and more are taking advantage of the latest technology to gain greater insight, make more informed decisions, and get more done. Join the TechWiseTV team and guest experts as they go deep into the solutions that make it easier to gather data and put it to work from the factory floor out into the field.
Tags : 
cisco, iot, internet, things, business, information, connectivity, interconnectivity, data, technology, applications
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
Certain workloads are better suited to the private cloud, whereas other, often newer applications can benefit from deployment in the public cloud. This means that for enterprises, a comprehensive approach to hybrid cloud is both desirable and practical.
Tags : 
cloud computing, erp, productivity, applications, efficiency
    
Cisco
Published By: Cisco     Published Date: Jul 09, 2015
This white paper looks at the power of mobility as part of the midmarket enterprise’s unified communications (UC) platform and the seemingly competing interests of IT departments and other functional areas that often place stress on an organization.
Tags : 
mobility, mobile workers, byod, productivity, business technology
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
“Innovation” is an overused term. The smallest adjustments, the most trivial enhancements, and the least impactful improvements are often trumpeted as innovative. But every once in a while, something truly groundbreaking and transformative comes our way—disrupting longstanding assumptions and norms in the process. This edition of Unleashing IT showcases Cisco’s holistic approach to the future of networking: application Centric Infrastructure (aCI). Promoted by Cisco, Intel®, and ecosystem partners, aCI is a true innovation that changes the way technology is delivered in support of business priorities
Tags : 
cisco, innovation, aci, application centric infrastructure, networking, software development, it management, knowledge management
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked— first, finding a wired port to use for high-bandwidth applications, such as video or streaming media, and then shifting to wireless connections when the need to be mobile was more important than having the performance of wired. Today, though, the industry sits on the precipice of the biggest innovation in the history of wireless LAN: the release of 802.11ac Wave 2. Wave 1 of 802.11ac brought network speeds that were 1.3 Gbps (Gigabits per second), which is on par with wired networking speeds. However, 802.11ac Wave 2 shatters the gigabit barrier with speeds of up to 6.8 Gbps.
Tags : 
wifi, lan, infrastructure, poe, network, networking
    
Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.