updates

Results 1 - 25 of 152Sort Results By: Published Date | Title | Company Name
Published By: BeyondTrust     Published Date: Jul 29, 2019
An Analysis of Microsoft Security Updates in 2018
Tags : 
    
BeyondTrust
Published By: Tricentis     Published Date: Aug 19, 2019
The way that we develop and deliver software has changed dramatically in the past 5 yearsbut the metrics we use to measure quality remain largely the same. Despite seismic shifts in business expectations, development methodologies, system architectures, and team structures, most organizations still rely on quality metrics that were designed for a much different era. Every other aspect of application delivery has been scrutinized and optimized as we transform our processes for DevOps. Why not put quality metrics under the microscope as well? Are metrics like number of automated tests, test case coverage, and pass/fail rate important in the context of DevOps, where the goal is immediate insight into whether a given release candidate has an acceptable level of risk? What other metrics can help us ensure that the steady stream of updates dont undermine the very user experience that were working so hard to enhance? To provide the DevOps community an objective perspective on what quality
Tags : 
    
Tricentis
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. Thats not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
    
BlackBerry Cylance
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last years study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This years research updates those findings and explores the benefits associated with privacy investment. Ciscos Data Privacy Benchmark Study utilizes data from Ciscos Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Sep 26, 2017
3rd party overview of 3PAR StoreServ technology updates.
Tags : 
    
Hewlett Packard Enterprise
Published By: Epicor     Published Date: Sep 20, 2017
More than ever, businesses are considering a cloud solution for their enterprise resource planning (ERP) deployment over an on-premises system. Cloud technology appeals to these companies because updates and fixes occur automatically with little or no effort from internal IT staff, and because cloud-based solutions provide access to real-time data from anywhere. Employees want tools that make it easier for them to complete everyday tasks and make informed decisions that help the business grow. Aberdeens research report, Top Performers Know Its Time to Migrate to Cloud ERP: Heres Why and How, uncovers the reasons successful companies are choosing cloud over on-premises ERP models. Download this SmartBite for a quick look at the reports highlights.
Tags : 
    
Epicor
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco 2016 Midyear Cybersecurity Reportwhich presents research, insights, and perspectives from Cisco Security Researchupdates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
    
Cisco
Published By: Infosys     Published Date: May 30, 2018
Testing is often a major pain point for enterprises when taking new products to market, and can make or break customer loyalty. Testing speed impacts how fast the product can be rolled out to markets, with regular updates, while the quality of testing can determine the products success. So how can product testing be done better, faster, and in a more agile manner? A global CPG giant was looking to solve the same problem when it wanted to take its customer loyalty app to 18 countries. See how Infosys helped and the five key takeaways from the project.
Tags : 
brand, customer, loyalty, market, infosys
    
Infosys
Published By: B Channels     Published Date: Apr 27, 2018
The IoT World Forum regularly reviews and updates on IoT markets and solutions every year. In Dubai in 2015 there were 3 clear takeaways: Invest now, gain solution skills, build an ecosystem.
Tags : 
    
B Channels
Published By: Eaton     Published Date: Jul 09, 2018
Code updates happen for one main reason: safety improvement. NEC (National Electrical Code) Article 408.3 helps take electrical safety for service entrance panels to a new level. The code, updated in 2017, includes provisions to provide shock protection via panelboard barriers. The barriers protect from energized conductors on the line terminals of the main overcurrent protection device (OCPD) in a panelboard. When the main circuit breaker in a panel is turned off, line side terminals and conductors remain energized from upstream via the utility or another panelboard. With these barriers in place and the main OCPD turned off, installers are better protected when pulling wires into the panelboard. Today, all panelboards are shipped with shock-protective barriers. However, barriers are new to installation procedures, so contractors may not recognize them and accidentally throw them outeasily and often.
Tags : 
    
Eaton
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPIs approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on noisy content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Dell     Published Date: Feb 23, 2017
Windows 10 brings significant changes for all users to the way the OS will be serviced and updated by Microsoft. End-user computing managers dealing with planning and implementing updates will need to revisit their processes to match the new update cadence. Download this Gartner report to learn more.
Tags : 
    
Dell
Published By: Zebra     Published Date: Oct 12, 2011
Using Zebra printers, The Bargain! Shop (TB!S), was able to reduce their price marketing costs between 25% and 40% as well as increase work efficiency. Read this case study to find out more about TB!S and what Zebra can do for you and your business today!
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions
    
Zebra
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
A company's products needed constant updates due to changing business rules and regulations, as well as new functionality. However, tasks such as regression testing took too long and consumed too many resources. Collaborative helped to dramatically speed up the process through automation and process analysis, leading to increased customer satisfaction.
Tags : 
collaborative consulting, testing performance, testing process, case study, financial services, performance boost, technological advantage, trade details
    
Collaborative Consulting
Published By: Dell     Published Date: May 07, 2015
Your migration is also an opportunity for a data center do-over that could include virtualization optimization, cloud adoption, Active Directory cleanup, and server and storage updates. After all, the preparation and process for implementing these advances in IT capability are exactly the same as for an OS migration.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Digital experiences on mobile connections suffer from performance issues, and impatient users compound the challenges that slower, intermittent mobile connections raise. Firms need to build a new discrete delivery tier to improve users perception of mobile performance and drive conversion and engagement. By dynamically adjusting to context, this new delivery tier can adaptively send the right assets, optimize the sequence, and modulate streaming rich media. this report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace. this is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
mobile performance, technology, digital experience, media
    
Akamai Technologies
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure thats easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution todaywhether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 17, 2017
This report highlights a unique approach to enabling IT to succeed in the digital agea fully engineered converged infrastructure with richly supported capabilities for management, updates and configuration, security, and overall resilience. In particular, this report targets Dell EMCs distinctive leadership in converged/hyper-converged infrastructure, while highlighting the many compelling benefits achieved in two real-world deployments: an enterprise and a global service provider.
Tags : 
it transformation, digital transformation, converged infrastructure, hyper-converged infrastructure, deployments
    
Dell EMC
Published By: Venafi     Published Date: Aug 07, 2015
Public key infrastructure (PKI) is the foundation of todays enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security, anti spam, anti spyware
    
Venafi
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you arewhich elevates the trustworthiness of your entire site. Heres how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you arewhich elevates the trustworthiness of your entire site. Heres how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you arewhich elevates the trustworthiness of your entire site. Heres how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you arewhich elevates the trustworthiness of your entire site. Heres how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: Venafi     Published Date: Mar 26, 2015
Public key infrastructure (PKI) is the foundation of todays enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation. This leads to errors and missed system updates that result in policy violations and costly business interruptions. You can solve these issues with a PKI refresh that delivers automated key and certificate security and management.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organizations interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: Manage the rapid growth in certificates Gain visibility into where keys and certificates are located Secure your certificates against cyberattacks Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.