hot site

Results 1 - 16 of 16Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : hyperflex, systems, data platform, storage efficiency, business, cisco
     Cisco EMEA
By: Jallen     Published Date: Nov 20, 2014
How can you help your hotel achieve its potential? Search engines are built for one reason - to show the people who use them the content they want to see. They are not there for businesses to show off their websites. They look for pages which aren’t just relevant, but which engage with people and are active with their users. This is where you come in.
Tags : 
     Jallen
By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices, business technology
     Cleversafe
By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
     CA Technologies
By: Sojern     Published Date: Oct 26, 2017
The Sojern Traveler Platform offers hotels of all sizes access to over 350 million traveler profiles that allow you to precisely target prospects at all stages of the marketing funnel. You can also manage campaigns across multiple channels and devices, maintain brand awareness, increase purchase consideration, and turn site visitors into hotel room bookers.
Tags : hotel digital marketing, hotel advertising, boutique hotels, independent hotels, hotel website, travel marketing, search engine marketing hotels, revpar, direct bookings
     Sojern
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : email marketing, triggered emails, audience segmentation, email capture
     Bluecore
By: Motorola Solutions     Published Date: Apr 24, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site. A Unified Team Communications solution from Motorola Solutions is what’s NEXT for your hotel to make this all possible. This guide was created to help you experience how each and every staff member on and across your properties can work smarter, safer, and deliver a top-notch guest experience when equipped with intelligence driven communications solutions.
Tags : 
     Motorola Solutions
By: Motorola Solutions     Published Date: Apr 26, 2019
What does it look like when all members of your hotel staff can communicate and coordinate seamlessly from any location, device or network? The time is NOW to imagine a world where devices, networks, and locations don’t matter. A world where hotel staff from transportation to security, maintenance, operations, housekeeping, and beyond can communicate effortlessly and instantly, both on and off site.
Tags : 
     Motorola Solutions
By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
     SafeData, LLC
By: VIDEOHUB     Published Date: Mar 14, 2012
When you sign up and complete $2500 worth of advertising on Videohub Marketplace, we add $500 to your account, which you can use immediately in crease your reach or save for a future campaign.
Tags : acudeo, adwords, beet tv, bright cove, buy video ad, dealer marketing, google ad, hotel marketing, iab, jw player, local business marketing, local tv, local video marketing, long tail tv, online video ad, ova, pre roll, real estate marketing, restaurant marketing, spot tv
     VIDEOHUB
By: IBM     Published Date: Mar 28, 2008
Managing different international hotel brands is far from simple. Each brand needs to develop and preserve its own identity in order to drive differentiation and minimize inter-brand competition. In the modern hospitality sector, Web sites provide an important first point of contact for potential customers, so it is particularly important for each brand to have its own individual look and feel on the Web.
Tags : 
     IBM
By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
     Secure Computing
By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
     Secure Computing
By: Curalate     Published Date: May 03, 2016
A case study on: Case Study - Urban Outfitters Instagram is a social channel being used more than ever, but executives are asking: "Where is the ROI?" In this Urban Outfitters case study, learn how you can tie UGC to commerce by connecting photos to your product pages. Discover how you can: - Collect thousands of images about your brand that Instagrammers are already sharing - Turn website browsers into buyers by linking user images to product pages - Drive exceptional click-through rates from user generated content (Urban Outfitters saw 15% CTR) Read the Urban Outfitters Case Study to see how to put these changes in action for you brand!
Tags : curalate, case study, lilly pulitzer
     Curalate
By: Curalate     Published Date: May 03, 2016
Instagram is a social channel being used more than ever, but executives are asking: "Where is the ROI?" In this Urban Outfitters case study, learn how you can tie UGC to commerce by connecting photos to your product pages. Discover how you can: - Collect thousands of images about your brand that Instagrammers are already sharing - Turn website browsers into buyers by linking user images to product pages - Drive exceptional click-through rates from user generated content (Urban Outfitters saw 15% CTR) Read the Urban Outfitters Case Study to see how to put these changes in action for you brand!
Tags : curalate, urban outfitters. igc, user generated content, instagram shoppable, social media, browsers into buyers, networking, business technology
     Curalate
By: Nginx     Published Date: Feb 05, 2015
Application performance has become a hot topic in recent years—but our need for it is, quite honestly, nothing new. Your websites and applications can thrive, or face severe costs, depending on how well you deliver content to your users, and web architecture has had to evolve to deliver to your users. Download this new ebook to learn more about modern applications architecture, including how application delivery has evolved, why the modern application has increased performance expectations and demands and why NGINX and NGINX Plus are the solutions your DevOps team has been waiting for.
Tags : modern application architecture, web architecture, application delivery, performance expectations, devops team, enterprise applications
     Nginx
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com