demo

Results 301 - 325 of 788Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Nov 09, 2015
One of the biggest challenges when migrating to Office 365 from your existing Exchange infrastructure, is that of Active Directory integration. Watch this demo to learn how to easily connect your Office 365 environment back to Active Directory without any new servers in your data center.
Tags : 
okta, office 365, directory sync, active directory, software development, it management, platforms, data management
    
Okta
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management, security, enterprise applications
    
Flexera
Published By: Oblong     Published Date: Nov 18, 2016
Fujitsu created the Open Innovation Gateway (OIG) in the Silicon Valley as a platform dedicated to advancing the implementation of innovative practices in June 2015. The OIG spurs practical results and achieves goals based on collaboration throughout the organization from a wide range of fields. Fujitsu has been using the immersive Mezzanine solution as the collaborative heart of the OIG. Mezzanine allows remote teams to simultaneously share information on any device. Meeting participants can gesturally move and organize information across an immersive digital workspace. To achieve the same collaborative results as Fujitsu, schedule a demo at one of our locations and experience an immersive digital workspace first hand.
Tags : 
    
Oblong
Published By: HP Inc.     Published Date: Feb 14, 2019
How to overcome complexity and be ready for future growth. The modern production digital print market brought a world of opportunities for micro-runs and variable data printing into the hands of Print Service Providers (PSPs). With print available in any quantity to anyone, print is being democratized, resulting in ever-greater numbers of increasingly smaller jobs. The old print model of high-volume static print is being replaced with a myriad of micro-runs and micro-jobs. Automation that allows PSP owners to master the ensuing complexity and respond faster than ever before is enabling them to refocus on market development and on delivering value.
Tags : 
    
HP Inc.
Published By: OKTA     Published Date: Oct 23, 2017
As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
Tags : 
    
OKTA
Published By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
Published By: Reputation.com     Published Date: Jun 29, 2018
Brand perception begins online, with the local online reputation of doctors, clinics and hospitals. In late 2017, Reputation.com set out to understand how consumers use the internet to look for healthcare services online, particularly when interacting with healthcare-related ratings and reviews. We surveyed healthcare consumers across the U.S. in a representative range of demographic groups for answers to some key questions: • What are consumers and patients really looking for in online reviews? • What ratings and review factors are most important when choosing a doctor? • What sites are most used and trusted for this information? Findings confirmed that online reviews are an essential part of the healthcare consumer’s decision-making. In this report, we’ll look at the key findings in detail.
Tags : 
    
Reputation.com
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Abacus Labs     Published Date: Jun 14, 2018
As more pressure is placed on the finance team to provide meaningful insights more frequently, it is becoming increasingly necessary to speed up business processes, as well as have immediate access to the most up-to-date information. The traditional expense reporting process is a drain from both perspectives. Using software to manage employee expenses can provide a more efficient means of managing the process, however most solutions are simply a digital version of the traditional paper process. This can limit the amount of time savings you can gain. This paper will demonstrate the time savings you can accomplish by implementing a real time expense reporting solution versus one that relies on employee generated expense reports.
Tags : 
expense, reporting, roi, calculations, digital, employee, finance
    
Abacus Labs
Published By: CFA Institute     Published Date: Mar 05, 2019
Develop your skills in effective investment performance evaluation and manager search and selection with the Certificate in Investment Performance Measurement (CIPM®) Program. Completing the CIPM Program will help you: Deliver more actionable investment insights. Improve manager search and selection. Develop skills in performance appraisal, attribution, and presentation. Increase your understanding of factors that drive portfolio risk and return. Demonstrate your commitment to maintaining globally relevant and practice-based investment performance evaluation skills. Want to learn more? Fill out this form to receive more information about the CIPM Program and download the program fact sheet.
Tags : 
    
CFA Institute
Published By: Pure Storage     Published Date: Feb 02, 2017
Lesen Sie in diesem Whitepaper , um herauszufinden, wie Sie Ihr Unternehmen die Vorteile von erschwinglichen All-Flash-Speicher nutzen können.
Tags : 
flash storage, storage, cost, cloud, cloud computing
    
Pure Storage
Published By: Pure Storage     Published Date: Feb 02, 2017
Lesen Sie dieses Whitepaper, um herauszufinden, wie Ihr Unternehmen die Vorteile der erschwinglichen All-Flash-Speicher nutzen können.
Tags : 
flash-speicher, cloud-anwendungen, kosten, leistung, it-management, business agility
    
Pure Storage
Published By: Lawson     Published Date: May 11, 2011
Check out this Lawson Talent Management demo and see for yourself how Lawson Talent Management works and what it can do for your organization.
Tags : 
lawson hcm, spaces demo, talent management solution, human capital management system, strategy, execution, actionable content
    
Lawson
Published By: CCMI     Published Date: Jul 20, 2011
Telecom expense management is a critical and well-established discipline that has grown to encompass the challenging problem of mobile device and cost management. And now there's a simple, self-service approach to successful mobile expense management (MEM) that is simple to implement and demonstrates immediate results.
Tags : 
xigo, ccmi, mem, mobile expense management, voice report, telecom expense management, tem, mobile device management, mobility management
    
CCMI
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Epson Robotics Media     Published Date: Feb 09, 2018
Digital Elektronik bought four Epson robots for the job, and these robots completed the task in just a few months. Since then Digital Elektronik has used the robots for new applications, some similar but others quite different, demonstrating a key advantage of Epson robots in being flexible and reusable. Volker Spanier, head of factory automation at Epson Germany, says, “I think this is an excellent example of how Epson robots can improve production line efficiency and complete tasks that may not even be possible by hand. It’s also great to see our robots involved in the construction of such a memorable landmark that will stand the test of time.”
Tags : 
robotics, epson, technology, robots
    
Epson Robotics Media
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: Aprimo     Published Date: May 01, 2012
The explosion of digital channels is creating a widening gap between classic single click attribution and the reality that marketers face when planning cross-channel campaigns with multiple touch points across many digital screens. This Aprimo White Paper will demonstrate some of the ways marketers can transform attribution and better manage marketing spend, improve planning and enhance the customer journey.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Arcserve     Published Date: Jul 23, 2010
This IDG Research Services study demonstrates that CIOs and IT leaders recognize the business impact of application performance. It's all about end-user and customer satisfaction, increasing productivity, and lowering costs.
Tags : 
ca technologies, cio, application performance management, customer satisfaction, productivity
    
Arcserve
Published By: Arcserve     Published Date: Jul 26, 2010
View this flash demo that shows the Assess stage of the management lifecycle and how our customers are able to discover and determine where opportunities exist for consolidation and rationalization across physical, virtual, mainframe, distributed and cloud environments.
Tags : 
ca technologies, data center, management lifecycle, consolidation, cloud environment, virtualization project, cloud computing, data center design and management
    
Arcserve
Published By: Cisco     Published Date: Nov 17, 2015
Gain Immediate Value from Your Connected Factory Architecture! Imagine if you could reconfigure your production line in days instead of weeks. Or if you could cut long search times for parts in half using factory wireless across a connected factory architecture. These are only a few of the reasons why leading manufacturers deploy Cisco’s Connected Factory Solution. Now you can try out these new technologies and capabilities on a small scale, with low financial risk in your own plant with the Cisco Connected Factory Starter Kit. Create a living lab and test out one or more specific use cases. Use it as a demo to get buy in from stakeholders. Or get one production line up and running immediately and roll out a more comprehensive deployment later on.
Tags : 
cisco, connected factory, starter kit, manufacturing process management, programmable logic controllers, plcs, wireless equipment connectivity, convergence, data integration, infrastructure management, business intelligence, data analytics, workforce automation, networking, security
    
Cisco
Published By: Microsoft Windows     Published Date: Mar 31, 2017
This Microsoft-commissioned report demonstrates how deploying Windows 10 can reduce costs and provide significant benefits to your organization. The report found an ROI of 233% with a payback period of only 14 months.
Tags : 
    
Microsoft Windows
Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect
    
Absolute Software
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com