autho

Results 226 - 250 of 380Sort Results By: Published Date | Title | Company Name

O’Reilly Report - 6 Tips to Optimize Your Cloud and Your Infrastructure

Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn

Explore how enterprises benefit from going Google, including reducing costs & increasing innovation.

    
Cloud Sherpas

Discover how top enterprises are preparing for tomorrow’s digital workplace today with Google Apps.

Published By: Cloud Sherpas     Published Date: Aug 13, 2015
In the Top 5 Reasons Why Enterprises Are Going Google, Cloud Sherpas explores why leading organizations like these have prepared for the digital workplace of tomorrow by moving their email and collaboration platforms to Google Apps for Work, such as: Eliminating the need to manage hardware or software Embracing a mobile, BYOD culture Reducing IT costs and infrastructure
Tags : 
google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development, google apps resellers, google cloud solutions, cloud enterprise solutions, google apps setup, google apps partners, google reseller, google apps authorized reseller, google apps for work, google drive for work, google chrome for work, google apps reseller, it management
    
Cloud Sherpas

Starting the workforce analytics journey: The first 100 days

Published By: IBM     Published Date: Mar 28, 2016
Five years ago in a Harvard Business Review article on how companies leveraged HR analytics for competitive advantage, my co-authors and I found only a small handful of companies to interview. Today, life is very different. Interest in analytics and storytelling through data in HR is booming. But, HR as a whole is still learning how to set up an effective analytics function. That is why I welcome this report. The first 100 days of any effort is critical to success. Analytics is no different. Lead authors of this report and the people they have interviewed have sat in analytics roles in HR. They’ve learned a lot about what works and what doesn’t. Here’s an opportunity to learn from those who have already undertaken this particular journey. They know that to succeed in analytics one needs to: • Focus on business priorities • Leverage your analytics through storytelling • Use analytics to help inform decision making, not as a substitute • Understand that perfect data isn’t required for a
Tags : 
ibm, workforce analytics, ibm smarter workforce institute, human resource technology
    
IBM

GRC Strategies - Finding the Right Balance of Business and IT

Published By: SAP     Published Date: Nov 23, 2009
Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.
Tags : 
sap, governance, risk, compliance, grc, risk management, vulnerability management
    
SAP

Internet Security THREAT REPORT 2013

Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft, online threats, data security, business security, web attacks, network security, backup and recovery, anti spam, anti spyware, anti virus, email security, firewalls, hacker detection
    
Symantec

Choosing a Cloud Hosting Provider with Confidence

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : 
verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access, authentication, encryption, disaster recovery, ssl
    
VeriSign, Inc.

Supported Java Specification Requests (JSRs)

Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : 
blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry

The CIO's Guide to Mobile Security

Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software
    
BlackBerry

Show Me the Money! How Life in the ITIL Fast Lane Can Deliver Success

Published By: Numara Software     Published Date: Dec 09, 2009
In this white paper, authored by Numara Software and Pink Elephant, we examine the critical role of having effective processes in driving down service costs. In particular, the paper demonstrates the importance of process and automation in helping IT executives stretch their IT budget further.
Tags : 
numara, itil, pink elephant, automation, consulting, slas, sla, project management, service management
    
Numara Software

Encryption Keeps Data on the Right Side of the Law Benefits of Encryption for Legal Services

Published By: WinMagic Inc.     Published Date: Aug 12, 2013
Many law firms have begun to look to data encryption to safeguard their communications and corporate assets from unauthorized access. Learn the benefits of Encryption technology through this eBook.
Tags : 
data encryption, legal service
    
WinMagic Inc.

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

Published By: Iovation     Published Date: Sep 25, 2009
Online casinos generated $22.6 billion in global revenues in 2008, up from $17.6 in 2006. While the online gambling industry grows, so does organized fraud. Cyber criminals are working hard to uncover and sell people's personal information and share techniques on how to defraud online gambling sites. The online gambling industry stands to lose hundreds of millions of dollars annually to fraud exposure if effective anti-fraud strategies aren't put in place.
Tags : 
cyber criminals, online gambling industry, legitimate players, fraudulent deposits, chargebacks, cheating, collusion and money laundering, buy, iovation reputationmanager, device fingerprinting, low false positives, pattern matching, fraud prevention strategies, device print, web device print, pattern matching and risk assessment, device id, device reputation authority, application security, authentication
    
Iovation

Motivating Geeks: How to Motivate Technical Staff without Breaking the Bank

Published By: GoToAssist     Published Date: Oct 05, 2011
When budgets are tight, it's more important than ever to get the best performance from the people who deliver, support and deploy technology. But over the past decade, managers have fallen into the trap of believing that motivation requires ever larger bags of money. Watch this on-demand webinar with Paul Glen, author of Leading Geeks, as he discusses the most effective and surprisingly inexpensive ways to motivate geeks. Getting the best from your people requires clearly understanding what really drives them.
Tags : 
citrix, technology, webinar, on-demand, technical, employees, employee performance, productivity, project management, workforce management software, employee performance management
    
GoToAssist

Customer Loyalty: How to Earn It, How to Keep it.

Published By: GoToAssist     Published Date: Oct 05, 2011
It is imperative in today's economy to not only gain customers but to keep them. Without the right set of tools and measurements, however, this can be a daunting task. Watch this on-demand webinar with Jill Griffin, author of Customer Loyalty, as she delves into practical tools you can use to measurably improve the satisfaction and brand attachment of high-value customers.
Tags : 
citrix, webinar, customer loyalty, technology, tools, improve satisfaction, best practices, business analytics, customer interaction service, customer relationship management, customer satisfaction, customer service
    
GoToAssist

The Definitive Guide To Sales and Use Tax

Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara

The Definitive Guide: Infrastructure for Desktop Virtualization

Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo and Intel®

Smart Changes, Big ROI

Published By: IBM     Published Date: Jul 30, 2014
Read this analyst white paper to identify key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Tags : 
ibm, business analytics, finance, automation, record to report, rtr, rtr process, disclosure management
    
IBM

Manage Identities & Access for Continuous compliance & reduced risk

Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam, data management, business technology
    
IBM

The New Mobile App Capabilities of IBM Digital Experience Portfolio

Published By: IBM     Published Date: Sep 15, 2016
This webcast session will discuss and demonstrate a new set of mobile capabilities within the IBM Digital Experience portfolio. These exciting new capabilities enable the line of business to work hand in hand with mobile app developers to deliver personal, adaptive, and relevant content to hybrid or native mobile applications. Come see how a new content authoring experience brings workflow, segmentation, and mobile notifications together to help drive the right mobile app experience for your users.
Tags : 
ibm, commerce, mobile, apps, mobile app, ibm digital experience portfolio, networking, wireless, enterprise applications, business technology
    
IBM

Why Good Apps Are Not Good Enough

Published By: IBM     Published Date: Oct 12, 2016
IBM commissioned Forrester Consulting to evaluate what consumers want from a mobile app (and its authoring brand) and focused on the following questions: - What elevates a good, serviceable, and even profitable app into the realm of great? - And if a mobile app achieves greatness, what is the impact?
Tags : 
ibm, commerce, digital experience, digital, applications, apps, mobile app, wireless, knowledge management, enterprise applications, business technology
    
IBM

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

Threat Hunting for Dummies

Published By: IBM     Published Date: May 04, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
IBM

Why You Should Look at Cloud for Storing Back-up, Archive and Content Repository Data

Published By: IBM     Published Date: Nov 30, 2017
Analyst firm, Enterprise Strategy Group (ESG), makes the case for storing backup, archive and content repository data in the cloud. Learn how IBM Cloud Object Storage addresses these use cases and helps companies lower costs, provide higher availability and protect against unauthorized access to their data. Complete the form to download the analyst paper
Tags : 
ibm cloud, archival solutions, ibm, it services, storage, production storage, data management
    
IBM

Defining Your Audience: A Step-by-Step Guide to Creating Buyer Personas

Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions

Countering Misconceptions about Data Encryption

Published By: Utimaco     Published Date: Aug 18, 2008
Despite the advances in encryption techniques and vastly improved computer capabilities, however, many of the fallacies and outdated understanding about encryption persist. Sometimes these myths are even being perpetuated in popular technology publications where some authors and editorial staff fail to do their research thoroughly.
Tags : 
data protection, data security, database security, protecting data, utimaco, security
    
Utimaco
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.