usage

Results 276 - 300 of 317Sort Results By: Published Date | Title | Company Name
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
Published By: TamoSoft     Published Date: Feb 14, 2008
This white paper covers the VoIP basics, deployment and usage of a VoIP solution over both wireless (Wi-Fi) and wired (Ethernet) network infrastructures, guidelines on efficient monitoring and analyzing VoIP network traffic, troubleshooting various VoIP problems, etc.
Tags : 
voip, wifi, voip deployment, voip monitoring, voip network, ip network, ip telephony, voice over ip
    
TamoSoft
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
    
WiChorus
Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance
    
NetSupport
Published By: MessageLabs     Published Date: Jan 13, 2009
Drawing the line between employee web usage and company policy is challenging for IT Managers. Download this whitepaper to help make informed decisions about your own web monitoring requirements FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, employee web use, employee web misuse, employee web surfing, employee internet usage, web use monitoring, web use blocking
    
MessageLabs
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : 
aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage
    
MessageLabs
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services
    
Subrago
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Published By: Extreme Reach     Published Date: Nov 04, 2010
The purpose of this report is to provide specific HD adoption details, by advertisers and broadcasters to help inform advertising practices.
Tags : 
hdtv, advertising distribution, hd usage, ad delivery
    
Extreme Reach
Published By: FPSN, LLC     Published Date: Jan 03, 2011
Creating awareness to the current state of video surveillance used for the majority of US businesses and what technology allows for the most effective systems for green usage, higher detail quality and overall smart purchases
Tags : 
ip based, megapixel, surveillance, public safety, mobile video, spy cameras, wireless, cctv
    
FPSN, LLC
Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
Use the Mission-Critical Converged Infrastructure as the foundation for the next decade of your computing. Combine years of trusted HP Integrity resiliency with HP BladeSystem efficiencies in the newest line of HP Integrity systems.
Tags : 
virtualization, hp integrity server, server, it infrastructure, data management.
    
HP and Intel® Xeon® processors
Published By: Dell Storage     Published Date: Mar 06, 2012
IT departments are beginning to shift their focus from adding more storage to improving the efficiency of the storage systems already in place. Today, the name of the game is improving productivity and efficiency. Read on to find out more.
Tags : 
fluid, data, data storage, storage, data center, flexibility, compellent, efficiency
    
Dell Storage
Published By: Dell Storage     Published Date: Mar 06, 2012
This paper discusses eight must have Dell Compellent technologies that combine to create new levels of efficiency and flexibility while cutting cost now and in the future. Find out more NOW!
Tags : 
fluid, data, data storage, storage, data center, flexibility, compellent, efficiency
    
Dell Storage
Published By: Dell Storage     Published Date: Mar 06, 2012
Please join us in this interactive, self-guided tour to determine if Dell EqualLogic storage is right for you.
Tags : 
fluid, data, data storage, storage, data center, flexibility, compellent, efficiency
    
Dell Storage
Published By: IBM     Published Date: Apr 18, 2012
IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, technology platform
    
IBM
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This complimentary white paper provides detailed configuration and testing information of common usage scenarios using HP 5820 and 5800 Switch Series utilizing IRF to form a logical switch, which connects to the server HP BladeSystem-integrated VC modules.
Tags : 
smb, hp networking, networking switch series, integration, infrastructure, server, configuration
    
HP and Intel® Xeon® processors
Published By: Adobe     Published Date: Jun 06, 2013
Video is a powerful way to reach audiences both for publishers and advertisers. You already know people are watching online video more than ever, but what are they watching? When are they watching it? What are consumers' preferred methods of watching? The Adobe Digital Index team explored these questions and other topics important to marketers and advertisers looking to make a bigger splash through the video. The research in The U.S. Digital Video Benchmark shares findings on device usage, social marketing, TV Everywhere and Ad placement
Tags : 
digital video, online video, digital video consumption, social media and video, tv content
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : 
georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Verint     Published Date: Apr 18, 2013
The vision for Celent’s Model Bank research was to try to answer an apparently simple question: “What would it look like for a bank to do everything right with today’s technology?” Of course, the question is not nearly as simple as it appears. The terms “everything” and “right” will mean very different things to different banks depending on their size, the complexity of their operations and product sets, and their technological starting points. While there is no such thing as a “Model Bank”—every bank does some things well, and others not as well when it comes to technology—it is possible to conceive of a “Model Bank” through real world examples of effective usage of technology.
Tags : 
banking, big data, technology, financial, effective use, analytics
    
Verint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.