Productivity White Papers

Productivity is the relationship between production of an output and one, some, or all of the resource inputs used in accomplishing the assigned task. It is measured as a ratio of output per unit of input over time. It is a measure of efficiency and is usually considered as output per person-hour.
Results 1 - 25 of 866Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Aug 20, 2015

Every day, emails flood our inbox: tasks are left undone, messages go unanswered, and meetings overwhelm us. Why does work have to be such hard work? The truth is, it doesnít have to be.

Tags : mail, clarity, collaboration, innovation, network, business intelligence, data quality, productivity
    
By: NetApp     Published Date: Aug 14, 2015

How CIO's handle storage.

Tags : cloud, cloud computing, data, storage, strategy, storage management, productivity
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and itís definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
    
By: Vectra Networks     Published Date: Aug 03, 2015

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.

Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool
    
By: IBM     Published Date: Jul 31, 2015

Danger of the web.

Tags : application security, hacker detection, internet security, productivity
    
By: IBM     Published Date: Jul 31, 2015

Market trends and vendor evaluation criteria.

Tags : security, data, event management, infrastructure, network management, application integration, business intelligence, productivity
    
By: Cherwell Software     Published Date: Jul 14, 2015

Watch these informative videos to learn what parts of ITIL best suit your organization.

Tags : knowledge management, best practices, business integration, business management, itil, productivity
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Development and Testing with VMware Vcloud Air.

Tags : cloud, development, testing, data center, infrastructure, application integration, productivity, cloud computing
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Best of both worlds: Flexibility and Control

Tags : cloud, flexibility, control, application, application integration, productivity, cloud computing, infrastructure
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Cloud computing can maximize the value and balance

Tags : flexibility, cloud computing, applications, networks, analytical applications, business intelligence, productivity, infrastructure
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Forge Ahead with Hybrid Cloud Plans

Tags : applications, systems integration, cloud, development, application security, productivity, cloud computing, infrastructure
    
By: VMware, Inc.     Published Date: Jul 10, 2015

The hybrid cloud defined.

Tags : cloud, it delivery, management, applications, performance, analytical applications, business intelligence, productivity
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Evaluating hybrid cloud for workloads.

Tags : reliability, application, security, compliance, application, application security, high availability, application integration
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Meet your development and testing requirements.

Tags : cloud, capacity, applications, compatibility, development, application integration, business intelligence, productivity
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Get to hybrid cloud fast.

Tags : cloud, application, network, security, compliance, application integration, business intelligence, productivity
    
By: IBM     Published Date: Jul 09, 2015

Enabling companies to design, deploy, and update full stack environments.

Tags : software, sdes, efficient, capability, devops, environment, applications, database development
    
By: IBM     Published Date: Jul 09, 2015

Learn how organizations that leverage effective software development can help close the execution gap and gain competitive advantage.

Tags : software development, collaborative tools, cloud positions, devops, infrastructure, continuous delivery, emerging technology, application integration
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.