cement

Results 101 - 125 of 534Sort Results By: Published Date | Title | Company Name

Comment protéger efficacement mon entreprise hybride contre les violations de données et les menaces

Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies

Comment protéger efficacement mon entreprise hybride contre les violations de données?

Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA

Comment sélectionner le bon système de gestion du contenu

Published By: Adobe     Published Date: Jul 10, 2019
Qu’il s’agisse de centraliser vos silos de contenu ou de permettre à votre équipe marketing de créer et publier plus efficacement du contenu pour vos différents points de contact, vous devez impérativement vous doter du bon système de gestion de contenu (CMS). Toutes les entreprises n’ont pas la même capacité à augmenter la vélocité du contenu, ni la même connaissance des caractéristiques et fonctionnalités d’une bonne solution CMS.
Tags : 
    
Adobe

Comparison of VHDL, Verilog and SystemVerilog

Published By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : 
comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera, analog communications, digital signal processing, electronic design automation, system on a chip, electronic test and measurement, embedded design, boards & modules, embedded systems and networking, electromechanical & mechanical, optoelectonics & displays, packaging and interconnects, passive & discrete components
    
Mentor Graphics

Compliance Update 2015

Published By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : 
labor practices, hr practices, compliance, compliance update
    
Workforce Software

Conjoining Social, Mobile, ECM, and Process Automation

Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, application integration, business analytics, content management system, business technology
    
Interactive Intelligence

Connected Intelligent Assets

Published By: TIBCO Software     Published Date: Aug 20, 2019
The oil field is being dynamically transformed through the connective power of the Internet, the advancements in remote connected sensors, and the possibilities of machine learning and artificial intelligence (AI). As the quest for hydrocarbons and alternative energy sources extends into deeper and harsher environments, operators, service companies, and asset owners are leveraging technology advancements to ensure their employees are safer, their fields are more productive, and their capital assets are operating at peak efficiency.
Tags : 
machine learning, predictive analytics, hydrocarbons, oil&gas, cybersecurity, asset efficiency, safety
    
TIBCO Software

Conseils pour gérer efficacement un centre de contact hautement volatil

Published By: LogMeIn     Published Date: Nov 08, 2016
Gérer efficacement les fluctuations de volume dans un centre de contact exige un mélange délicat de préparation, d’engagement en temps réel et d’évaluation rapide.
Tags : 
customer experience, customer relationships, customer interaction service, customer relationship management
    
LogMeIn

Considerations for the Next Phase of Hyperconverged Infrastructure

Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco

Consumer Response to Travel Site Performance

Published By: Akamai     Published Date: Jun 14, 2010
Looking back to the first iterations of travel Web sites, we can appreciate just how far technology has come. As advancements like high-speed connections began to replace the now archaic dial-up experience, consumers adjusted their expectations and demands of the companies they patronized. To gain a deeper understanding of the status of travelers' current online expectations, Akamai commissioned PhoCusWright to conduct a study examining key elements of the online consumer experience.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment, customer interaction service, customer satisfaction, customer service, ebusiness, sales automation, customer experience management
    
Akamai

Contain Costs and Increase Operational Efficiency

Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management, enterprise applications, data management
    
Red Hat

Containing the Storm: How Superior Performance Management Multiples VDI Value

Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : 
performance management, information technology, cloud and systems virtualization, application performance management
    
Xangati

Content Sharing 2.0: The Road Ahead

Published By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, storage, virtualization, cloud computing
    
Box

Cooperative Control Wireless LAN Architecture

Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, networking, wireless, local area networking, wlan
    
Aerohive

Corruption Around the Globe: A Landscape that Continues to Change

Published By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : 
skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives
    
Skillsoft

Creare microservizi per aumentare rapidità e agility

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Vorresti creare innovazione, accelerare la release delle applicazioni e approfittare di nuove opportunità: ma le applicazioni e le infrastrutture legacy ti ostacolano. Passa ad un'architettura moderna scomponendo applicazioni monolitiche in microservizi agile, creati, gestiti e ridimensionati in modo indipendente. Il tuo business potrà muoversi più velocemente e gli sviluppatori apprezzeranno la semplicità di accesso alle API, che consentirà loro di concentrarsi sulla customer experience.
Tags : 
ca technologies, innovazione, microservices, microservizi, api, customer experience
    
CA Technologies EMEA

Creare microservizi per aumentare rapidità e agility

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
L'importanza di rapidità e agility. Oggi tutti i business subiscono l'effetto dirompente di upstart digitali, che individuano nuovi modi per soddisfare nuovi requisiti di mercato battendo sul tempo aziende più affermate. Pur potendo contare su team IT di talento e anni di vantaggio nel contesto dell'architettura e dello sviluppo, rimane difficile rispondere a queste sfide utilizzando modelli tradizionali di sviluppo, centrati su applicazioni software monolitiche. È semplicemente impossibile arrivare sul mercato in modo rapido quando le applicazioni devono essere mantenute, modificate e ridimensionate come un'unica entità da team di grandi dimensioni, fortemente interdipendenti.
Tags : 
    
CA Technologies EMEA

Creating a Coaching Culture

Published By: THagen     Published Date: Feb 23, 2011
Transform your managers into coaches if you want to see your employees enhance their performance.
Tags : 
coaching, sales coaching, training reinforcement
    
THagen

Creating Business Value Through Location-Based Intelligence

Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement, gps, mobile data systems, mobile workers, business intelligence
    
SAP

Creating value beyond the deal M&A report: private equity

Published By: PWC EMEA     Published Date: Nov 14, 2019
To help our clients unlock long-term value from the deals they are doing, we surveyed 100 private equity (PE) partners, globally, to uncover their experiences of value creation through M&A. Cutting costs just won’t cut it in PE Our Creating value beyond the deal: private equity report found that more value can be driven by revenue enhancement, rather than just cost-cutting. Only 45% of the 100 private equity partners we interviewed say they realise deal value through revenue enhancement. Cost cutting is no longer enough; dealmakers need to look at how to optimise revenue, even if this is often challenging to achieve. We found that PE houses are typically more focused on driving cost benefits, leaving scope to enhance benefits to the topline. Realising revenue benefits plays a key role in deals, with 75% of the most successful deals achieving topline growth. Mastering the journey of creating value in deals has never been so important and this report will detail how dealmakers can
Tags : 
    
PWC EMEA

Customizing Local Retail Marketing While Retaining National Branding

Published By: Madden Communications     Published Date: Sep 28, 2017
In order for brand promotion activated at retail by POP materials to succeed, it must drive sales. However, retail activation materials aligning with and supporting your national brand are just as important. Many marketers fail at this due to a lack of reliability, effectiveness and value. In this white paper you’ll learn about: • Reinforcement of your brand • Faster speed-to-market • Improved quality & consistency • Cost savings Increasing efficiency
Tags : 
    
Madden Communications

Cut Datacenter Costs Like AWS

Published By: VMTurbo     Published Date: Mar 25, 2015
Managing the Economics of Your Virtualized Data Center The average datacenter is 50% more costly than Amazon Web Services. As cloud economics threaten the long-term viability of on premise data centers, the survival of IT organizations rests solely in the ability to maximize the operational and financial returns of their existing infrastructure. You will survive, and this brand new whitepaper will help you to follow these 4 best practices: - Maximize the efficiency of your virtual data center. - Optimize workload placement within your clusters. - Reclaim unused server capacity. - And show your boss that this saves money.
Tags : 
datacenter costs, virtualized data center, amazon web services, cloud economics, server capacity, it management, knowledge management, enterprise applications, data center
    
VMTurbo

Cybersecurity as a Growth Advantage

Published By: Cisco     Published Date: Sep 08, 2016
This white paper takes you through the age of digital advancement.
Tags : 
    
Cisco

Cylance 2017 Threat Report

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance

Databases at Risk

Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
    
IBM Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.