HR Hero Your Employment Law Resource
 

enterprise network

Results 226 - 250 of 629Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking, gig speed, mobile, big data, analytics, automation
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
The quick-service restaurant industry continues to be a favorite among consumers who look to the sector for a wide variety of food served quickly and at a low price. The speed and efficiency of QSRs, which include the emergent “fast casual” restaurants, match today’s on-the-go lifestyle of consumers across all ages who often are too busy to cook at home. That said, consumers expect their dining experience at a QSR to be comfortable with conveniences ranging from WiFi connectivity to ordering kiosks and dining area entertainment on large screens or even tableside tablets. They expect the information on menu boards to be accurate and up-to-date and their meal orders to be fulfilled quickly and accurately. Technology is a major enabler in meeting consumers’ expectations while simultaneously helping QSR locations increase operational efficiencies and quality of service.
Tags : 
restaurants, quick-serve restaurants, qsr, fast food, convenience food, restaurant technology, qsr technology, guest experience, pos, digital entertainment, wifi, television, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 06, 2019
Retail has been transformed by technology in multiple ways, from the way customers interact with retailers to how products are offered and acquired. Indeed, the entire shopping experience has been redefined and expanded to enable customers to purchase products anytime, anywhere, with any device, from any number of retailers. Consumers’ changing shopping behaviors and their reliance on technology enables retailers to reach a wider swath of potential buyers, moving well beyond the borders of their physical store locations to new geographies and populations. That said, retailers must understand how to use technology effectively to draw in customers and entice them to purchase, as well as help them improve their operations and enable new, innovative ways to keep customers coming back.
Tags : 
retail, shopping, retailers, wifi, retail technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative, digital first, cloud, sdn, software-defined-networking
    
Comcast Business
Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
    
COMDOM Software
Published By: Commscope     Published Date: Jun 24, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up. >
Tags : 
    
Commscope
Published By: Commscope     Published Date: Jun 25, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up.
Tags : 
    
Commscope
Published By: CompareBusinessProducts     Published Date: Dec 03, 2010
Creating Your Needs Analysis First. When buying networking equipment: routers, switches, firewalls, and network management solutions for your company or organization, it's essential to create a needs analysis first, so that you make the right decisions from multiple standpoints
Tags : 
comparebusinessproducts, enterprise networks, network management, firewall, scalability, infrastructure, security
    
CompareBusinessProducts
Published By: CradlePoint     Published Date: Sep 04, 2014
In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity, and not just through their mobile phones.
Tags : 
constant connectivity, dependable mobile connectivity, cradlepoint, mobile phones
    
CradlePoint
Published By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : 
security risks, crisis communications, security breaches, compromising customer data
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
Cradlepoint Helps Quick Serve Restaurant Achieve Network Success The combined solution of Cradlepoint AER2100 devices and Cradlepoint Enterprise Cloud Manager (ECM) enables Raising Cane’s to intelligently manage their converged wired and wireless connectivity, utilize advanced security applications like IPS/IDS - all while enabling PCI compliance. This allows Severns and his team to centrally configure, monitor, and manage the Raising Cane’s network with ease.
Tags : 
    
CradlePoint
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak
Published By: Cumulus Networks     Published Date: Dec 30, 2016
By the year 2018, it is expected that over 25% of enterprise customers will adopt web-scale networking to build modern data centers. This rapid adoption can be attributed to businesses' increasing dependence on their data centers, while at the same time facing reduced IT budgets and limited staff to address their growing business needs. Fill out the form to download a TCO report on how organizations have saved an average of 45% on CapEx and approximately 74% on OpEx by adopting web-scale networking solutions from Cumulus Networks. You’ll learn how Cumulus modeled a real-life TCO calculator on the actual production path their customers took to build an agile, scalable, and cost-efficient data center.
Tags : 
    
Cumulus Networks
Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention
    
Damballa
Published By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Published By: Datastax     Published Date: Apr 08, 2019
We live in the age of “multi”. Everything is becoming more complex, more “intelligent”, and more distributed. Hybrid cloud isn’t really the new frontier—some companies have been operating in a hybrid cloud environment for nearly a decade—the new frontier is learning HOW to take full advantage of hybrid cloud without creating data silos or busting the IT budget. Enterprises are, of course, always looking for ways to make their computer systems faster, more highly available, more fault tolerant, and simpler to scale. But in the age of “multi,” this is becoming harder and harder to do. Imagine running a social network with millions of U.S.-based users and millions of European users. You could host all your servers and data in the United States, but then all of your European users would have a slower experience using your application than their U.S.-based counterparts. You could host all your servers and data in Europe, but then the U.S.-based users would have a slower experience. An obvio
Tags : 
    
Datastax
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: Dell EMC     Published Date: Mar 18, 2016
Over the past few years, new IT infrastructure options for enterprise transactional applications have arisen thanks to numerous improvements in storage processing power and the robustness of networking protocols. SAN protocols are no longer the only option for IT storage administrations. VMware, Hyper-V, SQL, and even SAP and Oracle deployments have taken advantage of the benefits offered by NFS, and more recently SMB 3, network-attached storage (NAS) protocols. However, support for NAS protocols alone is not enough. EMC and Brocade understand that supporting enterprise applications requires delivering enterprise storage and networking capabilities to maximize resiliency and performance.
Tags : 
emc, vnx, connectrix, transactional nas, enterprise workloads, infrastructure
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Enterprises with remote or branch offices and small to midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here’s how it brings simplicity, versatility and efficiency to ROBO or SMB environments.
Tags : 
    
Dell EMC
Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches
    
Druva
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.