business internet

Results 151 - 175 of 270Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 28, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates. According to Aberdeen Group, the user experience is key. It is more important than ever to have friendly and interactive platforms. In terms of talent acquisition, companies that prioritize the candidate experience are more than twice as likely to improve their cost per hire on a year–by-year basis.1 In addition, social capabilities can enable recruiting professionals to use the Internet for job applications, social referrals and video interviewing. Mobile integration also enables users to connect with information where and when they need it. With better tools and insight into people and data, organizations can much more quickly identify talent, match capabilities to market needs, retain the best talent and improve recruiting outcomes. Simply put, rec
Tags : 
ibm, talent acquisition, human resources, recruiting
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Schneider Electric     Published Date: Aug 15, 2017
In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. Speed, efficiency, flexibility, and scale are now critical for winning the race to meet new connectivity and processing demands caused by the Internet of Things (IoT) and Big Data.
Tags : 
planning process, reference designs, cost analysis, design, site selection, schneider, electric
    
Schneider Electric
Published By: IBM     Published Date: Jul 13, 2017
Leaders embracing the ioT are gaining new values, including accelerating innovation, enhancing operations, and improving engagement. Disruptors are utilizing the internet of things and recomposing their businesses by digital transformation. There are many different ways to unlock the potential of the internet of things. The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, innovation, enhancing operations, digital transformation, iot technologies
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The fax market is changing significantly though not in the way predicted by many. Far from an inevitable decline brought about by the emergence of e-mail, the demand for fax, particularly from larger companies, is actually growing. The way that fax is managed within the business is also undergoing a significant period of transition.
Tags : 
kudos, lane, lane telecommunications, fax over ip, foip, ip network, integrated business communications, integrated ip, voice market, voip, multi- function peripherals, mfps, erp, public switched telephone network, pstn, fax over internet protocol, t.37, store and forward, t.38, real-time
    
Lane Telecommunications
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
The introduction of e-mail and its exponential expansion into every aspect of business life presented a significant challenge to the fax industry and for some observers it was a foregone conclusion that fax was destined for a rapid demise. It is interesting to note, therefore, that fax has actually continued on a steady growth path that is predicted to continue well into the future.
Tags : 
kudos, lane, fax, foip, fax over internet protocol, migration strategy, network resources, multifunctional peripherals, mfp, lan, erp, crm, business management, in-house pbx, passport fax server, sms, compliance, voip, voice over internet protocol, security
    
Lane Telecommunications
Published By: SAS     Published Date: Jun 06, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
Businesses use the Internet as a vital global resource for huge benefits in linking workers, suppliers and customers. However, connecting with the global Internet exposes your company network to many threats.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: IBM     Published Date: Jul 27, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
insights, trends, business models, iot, internet of things, situational awareness, big data cloud computing, viable substitutes, customer engagement
    
IBM
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication, encryption, sgc, http
    
VeriSign, Inc.
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, security solution, ssl, trust, malicious activity, online businesses, sensitive information, e-commerce security, internet threat management
    
VeriSign, Inc.
Published By: Intermedia     Published Date: Nov 10, 2008
There are two main BlackBerry smartphone mobile connectivity options, and they are quite different. The first is the BlackBerry Internet Service, in which your mobile carrier acts as a liaison between your email and your BlackBerry smartphone. The second option is to use a BlackBerry Enterprise Server, which directly links your wireless device to your email, contacts, calendars and business applications— virtually automatically and almost instantly. If you’re using a BlackBerry smartphone solely for personal email, then a BlackBerry Internet Service account is all you need, and you can stop reading here. But if you’re a business user and are only using BlackBerry Internet Service, you’re leaving lots of important functionality unused.
Tags : 
intermedia, blackberry enterprise server, blackberry business user, blackberry internet service, blackberry smartphone
    
Intermedia
Published By: RingCentral     Published Date: Dec 05, 2013
Evolving businesses can better serve customers and enhance the way employees work by adopting the most readily available and affordable technology. Click here to read how leading edge communication begins and ends with a high-speed Internet-enabled, cloud-based, IP-connected phone service from RingCentral.
Tags : 
internet, ringcentral, ring central, business internet, business phone, cloud phone, cloud computing, cloud services, mobile employees, wireless, medical phones, mobile / wireless, document imaging, enterprise content management, electronic health records
    
RingCentral
Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator
    
ForgeRock
Published By: IBM     Published Date: Jan 21, 2016
Take this assessment, designed specifically for communication service providers, to find out how effective your organization is at harnessing the power of big data and analytics to drive excellence across your organization.
Tags : 
ibm, telecommunications, analytics, marketing, business technology, internet marketing, crm & customer care, telecom
    
IBM
Published By: Gomez IT     Published Date: Apr 01, 2011
Compuware recently commissioned a global IDC survey of 474 business and IT decision makers to better understand what performance and availability information they need to have in order to effectively operate their Internet-enabled business activities.
Tags : 
compuware, performance optimization, idc survey, internet-enabled business, business risk
    
Gomez IT
Published By: Gomez IT     Published Date: May 24, 2011
In a recent global survey of 474 business and IT decision makers, conducted by IDC on behalf of Compuware, respondents offered insights about their needs for effective operation of Internet-enabled business activities.
Tags : 
gomez, compuware, web performance management, idc, slas, service level agreements, end-user experience, multi-device, multi-browser
    
Gomez IT
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate, ev ssl certificate
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.