corporations

Results 51 - 75 of 87Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : 
reliability, uptime, performance, management, service-level agreement, sla, compliance, linux
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Attaining sustainable growth through corporate social responsibility," you'll see how corporations can differentiate their brands and reputations by helping to maintain society's wellbeing. Plus, you'll learn how corporate social responsibility can generate significant returns.
Tags : 
social responsibility, ibm, csr, suppliers, customers, integrate, information strategy, transparency
    
IBM
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications
    
Stratus Technologies
Published By: LANDesk     Published Date: Mar 23, 2009
Peters' and Waterman's well-known book 'In Search of Excellence', a study of some of the most well-managed companies in the United States at that time, was one of the best-known business books of the 1980s. In the book, the authors identified eight common themes which they argued were responsible for the success of the included corporations. These attributes included hands-on management, centralized values accompanied by entrepreneurial productivity, and focusing on the core business (sticking to the knitting).
Tags : 
itsm, it service management, it management, business management, avocent, landesk, survey, cio
    
LANDesk
Published By: TeamQuest     Published Date: Sep 06, 2012
Learn the 5 Habits of Highly Successful Capacity Planners from a guy who knows. Best Practices Manager Ron Potter has worked in the performance management and capacity management arena for 20 years in medium and large corporations.
Tags : 
capacity planning, infrastructure, business applications, performance management, team quest
    
TeamQuest
Published By: ADP     Published Date: Oct 14, 2014
In July and August 2014, the ADP Research Institute®, a specialized group within ADP®, conducted an online survey of more than 750 owners and executives at companies with 50-999 employees. The Midsized Business Owners Study is now in its third year. Midsize businesses often struggle between operating like a smaller business but having to abide by the same regulations as larger corporations. Download this case study to learn how midsize business are dealing with their three greatest concerns right now: healthcare benefit costs, the Affordable Care Act, and the level of government regulations.
Tags : 
adp, midsize business, healthcare benefit costs, affordable care act, government regulations, adp research institute, midsized business owners study
    
ADP
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Published By: WhichVoIP     Published Date: Apr 19, 2011
Large multi-million dollar corporations may have the capital and the expertise to install, run and maintain an in-house VoIP service. Small to large business may be better off with a hosted solution. This whitepaper explains both the differences and the advantages of each type of service.
Tags : 
whichvoip, buyers guide, hosted pbx, on-premise ip-pbx, voip
    
WhichVoIP
Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
Public institutions—particularly government and higher education—need cost-efficient, flexible computing and storage solutions just as much if not more than corporations do. The time for virtualization is now.
Tags : 
virtualization, network, storage, cloud computing, it infrastructure
    
HP and Intel® Xeon® processors
Published By: Box     Published Date: Nov 09, 2014
Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.
Tags : 
box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage
    
Box
Published By: SAP     Published Date: Jun 27, 2009
As corporations become more dependent on their ERP systems, they struggle to strike the right balance between regularly updating the software and minimizing cost and disruption to the business. This Report offers advice on how to develop and communicate a practical upgrade strategy and then build an effective process for maintaining your ERP asset.
Tags : 
sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, enterprise
    
SAP
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: Double-Take Software     Published Date: Jun 26, 2009
Just because your business is small, doesn't mean your data isn't just as critical as your Fortune 500 competitors. Like major corporations, small and midsize businesses are increasingly reliant on the critical data stored on their servers.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
Double-Take Software
Published By: Vision Solutions     Published Date: Jun 26, 2009
Just because your business is small, doesn't mean your data isn't just as critical as your Fortune 500 competitors. Like major corporations, small and midsize businesses are increasingly reliant on the critical data stored on their servers.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability, vision
    
Vision Solutions
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: IBM     Published Date: Jan 05, 2015
As the number of connected devices grows from billions to hundreds of billions, and as governments and corporations race to take control of devices and data, we need to save the Internet of Things (IoT). Successfully scaling the IoT means executives must rethink the technology strategy.
Tags : 
it strategy, modern computing, iot, cost of computing
    
IBM
Published By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : 
ibm, spreadsheets, ventana research, switch, spreadsheets
    
IBM
Published By: eTouch     Published Date: Aug 04, 2009
The native speakers of the islands of Hawaii probably had no notion of the inadequacy of the Word and Email duopoly to corporate communications when they coined the term Wiki - literally meaning fast. However, Wikis have grown into just that -- a fast and efficient way of fostering knowledge sharing across corporations worldwide; combining elements of Word, email, RSS, plugins and other relevant technologies.
Tags : 
roi, wiki, etouch, rss, plugins, word, email, blog
    
eTouch
Published By: IBM     Published Date: Apr 06, 2015
With a data explosion upon us that shows no slowing in sight, information governance is no longer an option for corporations. IBM StoredIQ is an important first step toward getting data under control, lowering storage costs and mitigating risk.
Tags : 
information governance, ibm storediq, risk, storage, data management
    
IBM
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: