cement

Results 51 - 75 of 534Sort Results By: Published Date | Title | Company Name

Are you positive audiences are making favorable associations with your brand?

Published By: Oath     Published Date: Oct 31, 2017
Consumers are better than ever at differentiating between low-quality and premium content. For marketers, this means the placement of their ads is critically important. Brands can’t afford to risk appearing alongside questionable content, not with 75% of consumers holding brands accountable for their ad environments. When brands are shown adjacent to Oath’s trustworthy, premium content, they experience 5x greater favorability - a striking example of the power of positive associations and the importance of knowing your digital neighbors.
Tags : 
digital advertising, online advertising, ad placement, quality content, quality video content, online news, online video, offensive content
    
Oath

Are you ready for the GDPR? One year out

Published By: CA Technologies     Published Date: Sep 13, 2017
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
Tags : 
    
CA Technologies

Assuring Application Performance at Scale

Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization, mobility, storage virtualization, application delivery
    
VMTurbo

Astaro Outperforms Cisco as an Integrated Security Solution at Devine Millimet

Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet
    
Astaro

Automated Document Marking & Printing for Paper-Based and PDF Workflows

Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software

Automation Can Help Cement Plants Save $4+ Million Per Year

Published By: Schneider Electric     Published Date: Nov 21, 2017
When effectively applied in a cement plant, automation and control technologies can significantly reduce energy expenses, while helping to increase production and reduce waste.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric

Avago Technologies Case Study

Published By: Box     Published Date: Jun 11, 2014
Midsize semiconductor manufacturer saves $0.5MM in infrastructure expenses by switching from servers to Box. They use Box company-wide: R&D, sales, M&A, legal, and more. Technology industry, manufacturing industry, midsize company, midmarket, NA, server replacement, Sales LOB, R&D LOB, M&A, Legal LOB, Box Content API, cost savings.
Tags : 
box, avago, technology, server replacement, lob, r&d, m&a, legal
    
Box

Bandwidth Utilization Improvements: Microsoft Dynamics® CRM 4.0

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft has made significant enhancements to the architecture of Microsoft Dynamics® CRM 4.0 to improve network performance. Test results demonstrate network bandwidth utilization improvements of up to 94%. Improvements were evaluated in the number of round trips, bytes sent, and bytes received. Because the bandwidth utilization associated with a page can change after the first time the page is loaded, both initial (cold) and subsequent (warm) page loads were tested.
Tags : 
microsoft, microsoft crm, microsoft dynamics, bandwidth management, network architecture, network performance, network performance management
    
Microsoft Dynamics

Becoming a data-driven organization: The what, why and how

Published By: SAS     Published Date: May 24, 2018
Ongoing digitization has created vast streams of data, forcing businesses to become more data-driven than ever before. While the benefits of being a data-driven organization are clear (improved performance, more profitability, stronger innovations), there are still some technical and business challenges to overcome. Thanks to technological advancements in data analytics, companies in all types of industries can become data-driven. Read this e-book to discover what it means to be a data-driven organization and to learn the basic do’s and don’ts of how to get there.
Tags : 
    
SAS

Beginner's Guide to SSL Certificates

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Security Options

Published By: Symantec     Published Date: Apr 09, 2012
In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. Find out more about SSL - in this complimentary white paper!
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
    
Nevis Networks

Beyond the General Data Protection Regulation (GDPR)

Published By: McAfee EMEA     Published Date: Mar 14, 2018
As every business decision-maker should now know, the E.U. General Data Protection Regulation (GDPR) enforcement date is coming. The GDPR will be enforced starting May 2018 and will apply to those collecting, storing or using the personal data of the residents of the European Union’s 28 member states. The Regulation changes requirements around protecting the personally identifiable information of over 500 million people, and occupies the minds of anyone around the world concerned with data protection. To better understand data decision-making, McAfee® commissioned Vanson Bourne to survey the views of 800 senior business professionals across eight countries around the world from a range of industry sectors.
Tags : 
    
McAfee EMEA

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail
    
IBM

Bon-Ton Stores: Maximizing Peak Capacity; Minimizing Stack Costs

Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM

Box Puts IT Where It Belongs: In the Driver's Seat - Get the Box IT Strategy Kit FREE Today!!

Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
Box

Building a Flexible SAN Foundation for Private Cloud Deployments

Published By: Dell Storage     Published Date: Oct 17, 2011
Private cloud computing advances the delivery of efficient, agile IT infrastructure allowing enterprises to plan incremental enhancements to existing infrastructure, and the right SAN.
Tags : 
technology, dell, san foundation, cloud deployment, data center, data management, application integration, analytical applications
    
Dell Storage

Building a Flexible SAN Foundation for Private Cloud Deployments

Published By: Dell Storage     Published Date: Nov 02, 2011
Private cloud computing advances the delivery of efficient, agile IT infrastructure allowing enterprises to plan incremental enhancements to existing infrastructure, and the right SAN.
Tags : 
technology, dell, san foundation, cloud deployment, data center, data management, application integration, analytical applications
    
Dell Storage

Building a Flexible SAN Foundation for Private Cloud Deployments

Published By: Dell Storage     Published Date: Nov 08, 2011
Private cloud computing advances the delivery of efficient infrastructure allowing enterprises to plan incremental enhancements to existing infrastructure, and the right SAN.
Tags : 
technology, dell, san foundation, cloud deployment, data center, data management, application integration, business intelligence
    
Dell Storage

Building the Channel Agnostic Customer Service Platform

Published By: Genpact     Published Date: Jul 30, 2012
Smart phones and technology advancements have revolutionized the way people behave, interact, consume and live.
Tags : 
customer service, future ready, crm, self-serve, customer experience management, project management
    
Genpact

Building the mobile enterprise: integrated, secure and productive - A checklist for putting mobile f

Published By: IBM     Published Date: Oct 10, 2013
Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your mobility initiatives.
Tags : 
mobile enterprise, secure and productive, mobile checklist, securing mobiles, build mobile enterprise, planning mobilities, mobility initiatives, mobile capabilities
    
IBM

Business "Black Belt" Mastering the Basics

Published By: Washco Consulting     Published Date: Aug 19, 2010
This article describes the five basic principles through which you can begin your journey to becoming a "black belt" in business.
Tags : 
achieving success, career advancement tips, business success, success in business, skills for success
    
Washco Consulting

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware
    
Cisco

Buyer’s Guide to Modern Web-Scale Backup & Recovery

Published By: Cohesity     Published Date: Apr 24, 2018
As organizational needs change and workloads become increasingly distributed, a key realization is emerging: traditional approaches to backup and recovery may no longer be sufficient for many organizations. These companies may have discovered that their existing tools are not keeping pace with other advancements in their computing environments, such as scale-out storage systems and hyperconverged systems, which seek to reduce data center complexity and help manage surging storage costs.
Tags : 
    
Cohesity

CA ARCserve Backup, CA XOsoft Replication, CA XOsoft High Availability - Disaster Recovery Features

Published By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : 
ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.