post

Results 101 - 125 of 465Sort Results By: Published Date | Title | Company Name
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus
    
Internet Security Systems
Published By: Kinaxis     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation, best practices, marketing automation
    
Kinaxis
Published By: Socialbakers     Published Date: Jul 22, 2015
In this report, we delve into the way Dairy brands reach Fans and prospects on social media, examining what kinds of posts they make and seeing what Fans respond to most, to help your brand optimize your content for maximum engagement.
Tags : 
social media, social media engagement, engagement, brands, content strategies, deliver content, contact management, content delivery
    
Socialbakers
Published By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : 
heat, data center, heat monitoring, hardware, datacenter, mission critical, monitoring, network management
    
HP
Published By: SAP     Published Date: Mar 24, 2011
As you prepare to embark on an ERP implementation or to upgrade an existing system, you have a lot to juggle and plan. You know the horror stories of "go-lives" going bad but you aren't sure how to avoid the pitfalls. This white paper discusses at length how Utopia's formal data migration methodology reduces the risks of large systems deployments by using a tried-and-tested framework for the entire migration process, from source data analysis through post-go-live support.
Tags : 
data migration management, source data analysis, data integrity, erp implementation, enterprise resource planning, business intelligence, configuration management, database development
    
SAP
Published By: SocialFlow     Published Date: Jan 08, 2015
This webinar will break down the findings from SocialFlows recent study, Data Drives Social Performance: The Benchmark Study on Organic Publishing to Social Networks that spans 1.6 million posts that generated 1.5 billion engagements.
Tags : 
social content publishing, social networks, social media content distribution, customer engagement
    
SocialFlow
Published By: Data Stax     Published Date: Apr 27, 2012
This paper examines key data management challenges facing modern businesses and explains how DataStax Enterprise provides the first post-relational database solution to handle real-time, analytic, and search data without using RDBMS solutions.
Tags : 
datastax, data stax, data management, database management, database, enterprise, search data, rdbms
    
Data Stax
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, its getting harder to gauge your organizations DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether youre an enterprise, e-commerce business, local organization, or government offceits merely a matter of time before youre going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: Workday     Published Date: Feb 01, 2019
In todays IT landscape, many organizations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: What real SaaS is and is not How to distinguish between real SaaS vendors and imposters. The question of SaaS security. Potential cost savings your company could gain from SaaS solutions If your company is ready to make the switch to SaaS From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday Italy     Published Date: Sep 19, 2018
In todays IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: What real SaaS is and is not. How to distinguish between real SaaS vendors and imposters. The question of SaaS security. Potential cost savings your company could gain from SaaS solutions. If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 19, 2018
In todays IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: What real SaaS is and is not. How to distinguish between real SaaS vendors and imposters. The question of SaaS security. Potential cost savings your company could gain from SaaS solutions. If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Spain
Published By: Intermec     Published Date: Sep 07, 2011
Learn how to streamline pick-up and delivery operations in the Post & Parcel Industry.
Tags : 
intermec, streamlining, delivery companies, parcel industry, verdex, verification, data extraction, customer satisfaction
    
Intermec
Published By: Cranfield University     Published Date: Jan 28, 2015
This article provides information on the need that organisations should undertake a post-investment review and the keys to guarantee an effective post-investment review.
Tags : 
the need for post-investment review, undertake post-investment review, productivity
    
Cranfield University
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development
    
Dell
Published By: ASME     Published Date: Oct 03, 2019
Considering metal 3D printing for your next project? Our comprehensive guide covers everything you need to know to build quality, production-grade parts, including how to select the right material, design for the technology, and enhance parts with post-processes like machining and heat treatment. Download your copy today!
Tags : 
    
ASME
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selecticas roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selecticas case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
    
Determine (Selectica)
Published By: Genesys     Published Date: Feb 08, 2019
Warum gerade mittelstndische Unternehmen ein cloudbasiertes Contact-Center whlen sollten Die Kundenerwartungen steigen stndig. Inzwischen mchten Kunden jederzeit und von jedem Ort mit Unternehmen kommunizieren. Einige bevorzugen Chat, andere sind in sozialen Medien aktiv und erwarten prompte Antworten auf ihre Posts. Und wiederum andere mchten alles von ihren Mobilgerten aus erledigen. Sie erwarten zudem einen Service, der sowohl konventionelle als auch neue Kanle untersttzt.
Tags : 
    
Genesys
Published By: AWS     Published Date: Oct 07, 2019
DigiCert implemented Imperva to protect their hybrid environment. They were already using Impervas WAF on-premises to defend against Layer 7 attacks, known threats, and zero-day attacks to rapidly identify the threats that required investigation. By expanding their usage of Imperva, DigiCert was able to extend protection to AWS and maintain their security posture both during and after migration. Impervas sophisticated threat detection technology draws upon vast experience in the WAF market. As traffic passes through their network, advanced client classification technology (together with crowdsourcing and IP reputation data) automatically analyzes it to identify and block web application attacks. These include SQL injection, cross-site scripting, illegal resource access, comment spam, site scraping, malicious bots, and other top threats. Granular filters and controls reduce false positives and prevent access from unwanted visitors, while IP address shielding hides the web servers IP
Tags : 
    
AWS
Published By: IBM     Published Date: Oct 18, 2016
The worldwide growth rate of digital data is staggering. If you're a CIO or a data center administrator, data growth statistics aren't just big numbers, they are a big problem -- for your company. Email messages, social media and blog posts, text and instant messages, photos, video and audio, machine-generated data, and transactional detail are on track to overwhelm your storage capacity. Read this paper for practical advice and smarter solutions for managing the information in your organization and getting back to a position of mastery over your data. Get this valuable resource now.
Tags : 
ibm, analytics, big data, information governance, ecm, information lifecycle governance, knowledge management, enterprise applications
    
IBM
Published By: Xirrus     Published Date: May 04, 2007
Get a technical foundation for deploying a high performance Wi-Fi network. Learn the details of how they work/compete, where they complement and where they're most effective.
Tags : 
wifi, wireless, 802.11, xirrus, wi fi, wimax, mobile computing, mobile data systems
    
Xirrus
Published By: RSM US     Published Date: Feb 08, 2019
The Center For Literacy (CFL) is a Philadelphia, Pennsylvania based nonprofit organization that disrupts cyde of poverty by providing basic math, reading and English language skills to nearly 1,5000 adults,so they can succeed in the workplace in post secondary education.
Tags : 
    
RSM US
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: IBM     Published Date: Oct 09, 2009
In down economies, many organizations make short-term decisions like cutting costs and postponing projects. But the real opportunity lies in optimizing costs. This eBook describes how applying the IBM Smart SOATM approach can drive down operational costs through connectivity and reuse, while enhancing flexibility and productivity.
Tags : 
service oriented architecture, ibm, operational costs, productivity, business process management, bpm, smart soa, cost cutting strategies
    
IBM
Published By: Workday Spain     Published Date: Sep 20, 2018
En el actual entorno de TI, muchas organizaciones han adoptado un enfoque "cloud-first" en sus sistemas. Pero, con tantos proveedores ofreciendo soluciones SaaS, cmo saber cul le permitir disfrutar de las verdaderas ventajas del SaaS? Qu caractersticas de una solucin SaaS se deben tener en cuenta, y cul es su repercusin real en los negocios de hoy en da? En este documento tcnico gratuito descubrir: Qu es el verdadero SaaS y qu no. Cmo distinguir entre verdaderos proveedores de SaaS y los impostores. La cuestin de la seguridad del SaaS. Ahorro que pueden aportar las soluciones SaaS para su empresa. Si su empresa est preparada para cambiar al SaaS. Este documento ayudar tanto a profesionales de TI como a cualquiera que simplemente quiera conocer las nociones bsicas del SaaS.
Tags : 
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.