adm

Results 351 - 375 of 1054Sort Results By: Published Date | Title | Company Name
Published By: VMware Citrix     Published Date: Jan 23, 2018
This paper provides guidance for selecting and purchasing a virtual workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual workspace strategy for your environment. The intended audience for this paper is enterprises seeking to empower a completely mobile workforce while enabling IT administrators to manage and secure their rapidly changing networks. IT decision-makers and lineof- business leaders alike will find the insights presented helpful for executing a mobile conversion strategy.
Tags : 
buying criteria, mobile, workforce, work solutions, vmware
    
VMware Citrix
Published By: Tricentis     Published Date: Mar 13, 2018
Testing is critical to the success of any application. In fact, your software is only as good as the testing team behind it and their ability to identify bugs before they find their way into production. Practically speaking, that means that building and nurturing an effective testing team is mission critical. But, of course, doing so is a lot easier said than done. That's because to be successful, today’s testing teams need to be cross-functional, efficient, and focused on the right things. They also have to be fully bought in and worthy of deep trust. As a result, finding the right candidates can be a challenge, so you have to get creative. Not only that, to attract and retain the best talent, you need to keep them motivated by giving them ample opportunities to learn and advance their career, while not weighing them down with the burden of time-consuming and unnecessary administrative tasks. Instead, you want to equip your team with the right tools to enable and empower them.
Tags : 
    
Tricentis
Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : 
sales, sales planning, business management
    
Xactly
Published By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix
Published By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
    
T Systems
Published By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : 
datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
    
Mimecast ABM Q4
Published By: VMware Dell     Published Date: Jan 31, 2008
As Perimeter Church's congregation expanded, their IT staff needed to find a way to meet the growing IT needs of the church with limited staff. Download this case study to learn how the Perimeter IT team has been able to perform its administrative functions much more effectively with VMware technology.
Tags : 
server management, servers, server, virtual server, virtual machine, vmware, server software, infrastructure
    
VMware Dell
Published By: VMware Dell     Published Date: Jul 02, 2008
Many companies have turned to virtualization technologies for their servers and in their data centers to simplify administration and to reduce management chores and operating costs while maintaining reliability and safeguarding against disasters. Seeing the significant benefits virtualization delivers in those environments, companies are now looking to apply the same technology to their desktop computers.
Tags : 
desktop management, desktop, virtualization, virtual infrastructure, vmware
    
VMware Dell
Published By: BMC ESM     Published Date: Nov 06, 2009
BMC helped the Dell IT group to consolidate job scheduling and job monitoring within a single dashboard, reduce by 75 percent the number of IT administrators needed for patch management, and accelerate trouble-ticket resolution with automation. Watch the customer video.
Tags : 
bsm esm, dell it, automation, consolidation, configuration management
    
BMC ESM
Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching
    
GFI Software
Published By: Dell Storage     Published Date: Oct 17, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : 
vnware, dell, technology, powervault, storage management, storage, virtual
    
Dell Storage
Published By: Dell Storage     Published Date: Oct 17, 2011
To address enterprise desktop management challenges, VMware and Dell have created a reference design to enhance administrator control and help reduce ongoing operational costs.
Tags : 
vmware, technology, dell, virtual desktop, infrastructurer, storage, desktop management
    
Dell Storage
Published By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : 
eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
ESET
Published By: Dell Storage     Published Date: Nov 08, 2011
To address enterprise desktop management challenges, VMware and Dell have created a reference design to enhance administrator control and help reduce ongoing operational costs.
Tags : 
vmware, technology, dell, virtual desktop, infrastructurer, storage, desktop management
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
The VMware® vCenter Plug-In for Dell PowerVault MD Series storage arrays enables VMware administrators to perform a wide range of storage provisioning and management tasks themselves - without having to rely on external IT resources.
Tags : 
vnware, dell, technology, powervault, storage management, storage, virtual
    
Dell Storage
Published By: LogMeIn     Published Date: Jul 12, 2016
Cette liste succincte met en avant les bonnes pratiques à l’attention des Agents et Administrateurs susceptibles d’aider votre entreprise à atteindre ses objectifs d’excellence.
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: LogMeIn     Published Date: Jul 12, 2016
Best Practices für Betreuer und Administratoren
Tags : 
live chat, customer service, customer support, live chat success, best practices for agents and admins
    
LogMeIn
Published By: Dbtech     Published Date: May 25, 2012
By converting printed medical forms to eForms, Saint Michael's Medical Center streamlined admissions, improved record keeping efficiency, and reduced print-related costs, saving more than $345,000 annually.
Tags : 
healthcare, cost, ibm, asset management, service management, technology, increased productivity, patient records
    
Dbtech
Published By: AMD     Published Date: Jul 20, 2012
Business agility can be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
amd, dell, microsoft, it administrators, virtualization, agile business execution, virtual server performance, data migration
    
AMD
Published By: WatchGuard     Published Date: Oct 17, 2012
The Cisco ASAs and point solutions were not cutting it. The 3-person IT team needed a solid multi-layered solution that was easy to manage and could consolidate many processes within one device. Learn how WatchGuard provided an easy to manage answer.
Tags : 
watchguard, it solution, administrator, it infrastructure, it security, data management, utm, unified threat management
    
WatchGuard
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This document is intended to provide pointers for administrators who are currently running HP-UX Virtual Partitions on legacy, cell-based systems, and who are considering upgrading to HP-UX vPars version 6.1.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: McAfee     Published Date: Sep 04, 2014
Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.
Tags : 
arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs, siem, seguridad
    
McAfee
Published By: Optis     Published Date: Feb 26, 2013
Managing employee leave has become a top priority for HR, especially as costs continue to rise. Find out how HR faces the puzzling challenge of managing leave and rising costs.
Tags : 
leave management system, absence management system, employee leave costs, absence management costs, leave management software, fmla management, absence management program, fmla software
    
Optis
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.