des

Results 7926 - 7950 of 8326Sort Results By: Published Date | Title | Company Name

Making a Business Case for Customer Data Management in Marketing

Published By: Dun & Bradstreet     Published Date: Feb 03, 2016
Better customer data management increases marketing ROI.” Easy to say, but not so easy to prove. This whitepaper provides everything you need to build a business case for customer data management, including: What organizational data maturity is and how it benefits the business Actual performance outcomes of data-mature organizations Data maturity’s quantifiable impact on targeting, nurturing and close
Tags : 
    
Dun & Bradstreet

Next Gen Computing: How the PC has evolved to help your organization become future-ready

Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10, windows, service management, desktop management
    
Dell

How does your payroll software compare to the 12 market leaders?

Published By: ADP     Published Date: May 04, 2018
To select the best payroll provider possible, who better to ask than your peers? With more than 400,000 reviews from real software users, the G2 Crowd business software review platform will help you confidently make the right choice. The G2 Crowd payroll report compares how providers rank in terms of customer satisfaction, specific features, industries, and more. To help you evaluate your payroll options, get this FREE copy of the G2 Crowd payroll report (a $599 value). This exclusive research includes: · Detailed profiles of 18 payroll providers · Ranking based on customer feedback · Assessment of implementation, integration, support, and ease of use · Actionable insights to help you decide
Tags : 
    
ADP

2014 Holiday Strategy Guide: How to Win Big with Retargeting this Holiday Season

Published By: AdRoll     Published Date: Oct 29, 2014
In this guide, we’ll help you set up the most successful retargeting campaigns during the critical holiday time of year.
Tags : 
retargeting campaigns, consumer behavior, desktop retargeting, mobile retargeting, roi, consumer targeting
    
AdRoll

Key Considerations When Evaluating Cloud-integrated Storage

Published By: Nasuni     Published Date: Nov 19, 2014
The increasing user-friendliness of cloud computing is making it more accessible to users as they better understand its capabilities and realize how easy and affordable it can be. As cloud infrastructure has started offering a wider range of storage functionality, IT professionals are finding that they can make use of the benefits it provides both operationally and financially. But achieving this optimum result is neither easy nor prevalent; awareness of the upside can sometimes blind prospective users to the potholes and blind curves on the road to cloud storage bliss. This paper assumes at least a general awareness of the methods and advantages of cloud storage, and perhaps even an acknowledgement that it is a natural infrastructure development, and is therefore designed to provide pragmatic advice to help with specific deployment choices.
Tags : 
cloud storage, cloud computing, cloud infrastructure, it infrastructure, it management, knowledge management, enterprise applications, data management
    
Nasuni

Ensuring Visibility into Microservices and Containers

Published By: AppDynamics     Published Date: Feb 08, 2018
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics

Emotion Takes Over in Tech

Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
    
Tyco Integrated Security

Whitepaper: The SD-WAN Provides the Fast Path to the Virtual Cloud Network

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Digital transformation has moved out of the early-adopter phase and into mainstream adoption. According to the ZK Research 2018 IT Priorities Study, 88% of businesses now have digital initiatives underway, up from 84% in 2017. The urgency of IT and business leaders is well warranted, as companies that master being digital will leapfrog the competition and be able to sustain a market-leading position. Those that lag in their digital initiatives will fall farther behind and will struggle to survive. The key to digital success is having an agile IT foundation that enables businesses to adapt to market transitions faster than the competition. However, there is no single technology called “digital transformation.” Rather, it is powered by the following four key enabling technologies:
Tags : 
    
VMware SD-WAN by VeloCloud

Taking advantage of reuse in Medical Devices

Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations, business analytics, business intelligence, product lifecycle management
    
IBM

3 Remarkable email Tools - Now for the first time all in one place - Edatasource.

Published By: eDataSource     Published Date: Apr 13, 2015
Looking to improve your email campaigns? Now you can with 3 remarkable email tools. Competitive Tracker - email data & creative on what your direct competitors are doing. Design Tracker, powered by Litmus - pre test the campaign before you hit send button. Inbox-tracker - know in real-time your inbox delivery. Learn more by downloading our quick overview white paper.
Tags : 
edatasource, email tools, email data, competitive tracker, design tracker, inbox-tracker
    
eDataSource

Why knowing what your email Subscriber Overlap with other brands Matters

Published By: eDataSource     Published Date: Jun 15, 2015
Among the many useful elements of eDataSource’s visibility into the email activity of 50,000 brands is what we can see of how each subscriber in an email marketer’s audience is being mailed by specific other brands. This view provides a picture of which other brands are competing against yours for attention in your audience’s inboxes.
Tags : 
    
eDataSource

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

Um Guia Prático de Introdução ao DevOps

Published By: CA Technologies     Published Date: Jun 04, 2015
Muito se fala sobre DevOps, uma metodologia que reúne função antes distintas de desenvolvimento de software (Dev), de produção e operações (Ops) em um processo comum, integrado e contínuo. DevOps quebra as barreiras entre o desenvolvimento, a produção e as operações. Utiliza pessoas, processos e tecnologia para estimular a colaboração e a inovação nos processos de desenvolvimento e liberação de software. O o desenvolvimento, a produção e as operações deveriam sempre fazer parte de um processo integrado, mas isso nem sempre é tão fácil como parece. Você pode se perder no que chamamos de “Dysfunction Junction”. Leia este eBooklet e conheça os obstáculos de DevOps, como evitá-los e os primeiros passos para chegar lá.
Tags : 
    
CA Technologies

DevOps Perspectives: Ideas, insight and direction from DevOps leaders

Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

Automatização da colocação de aplicativos em prática com implementação sem intervenção

Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies

The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)

Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security

Advanced Evasion Techniques for Dummies

Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security

The Next Big Thing in Data Center Security

Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
    
Intel Security

Data Exfiltration in Depth

Published By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : 
data exfiltration, data loss prevention, dlp, data management, research
    
Intel Security

Content Aware Protection for Your Most Sensitive Data

Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security

Think Like a Thief

Published By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : 
mcafee, intel, security, cyber, criminal, networking, data management
    
Intel Security

Les 5 Grandes Tendances qui Vont Marquer la Fonction RH en 2015

Published By: Lumesse     Published Date: Feb 13, 2015
This white paper from Lumesse reveals the 5 key predictions and workforce trends for the HR world ahead.
Tags : 
hr predictions, hr trends, recruitment methods, talent disruption, job 3.0, 2015 hr trends, virtualization
    
Lumesse

NetApp and the General Data Protection Regulation

Published By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

451 Research - A Deeper Dive into Hybrid Cloud Storage

Published By: NetApp     Published Date: Mar 05, 2018
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations ??for IT professionals responsible for cloud deployments?.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Start   Previous    311 312 313 314 315 316 317 318 319 320 321 322 323 324 325    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.