design

Results 1576 - 1600 of 1990Sort Results By: Published Date | Title | Company Name

The 2015 Guide to WAN Architecture and Design

Published By: Cisco     Published Date: Nov 18, 2015
This e-book describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book presents a summary of the key components of some of the emerging approaches to WAN architecture and design amd concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan, networking, security
    
Cisco

Campus Wireless LAN

Published By: Cisco     Published Date: Dec 24, 2015
Technology Design Guide
Tags : 
cisco, campus, wireless, lan, technology guide, security, enterprise applications, business technology
    
Cisco

CloudFlare advanced DDoS protection

Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, business technology, cloud computing
    
CloudFlare

How to Design an Effective Program to Protect Your Organization Against Social Engineering

Published By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : 
rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks, intrusion detection, intrusion prevention, phishing, security policies, risk management, data protection
    
Rapid7

The Growing Demand for Rich Media

Published By: IBM     Published Date: Jun 11, 2014
Read this paper to learn how to automate rich media workflows from collaborating with creative agencies and designers to automating the distribution of digital assets.
Tags : 
ibm, internet marketing, website development, rich media, digital media, online video marketing, customer engagement, digital experience, asset optimization
    
IBM

5 Steps to Firewall Planning and Design

Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network, email security, firewalls, data protection
    
Juniper Networks

Secure By Design

Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian, security, infrastructure, risk management, linux
    
Guardian Digital

Data Collection Strategies for Lifecycle Messaging

Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet

Free Trial Download: Acronis Backup & Recovery 10 Server for Windows

Published By: Acronis Inc.     Published Date: Jul 14, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Tags : 
acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial, security, backup and recovery, microsoft exchange, windows, windows server
    
Acronis Inc.

ESC Boston 2009 Expo - largest community of designers, technologists, business leaders, and supplier

Published By: TechInsights     Published Date: Sep 01, 2009
Join us at ESC Boston, September 21-24 at the Hynes Convention Center, in Boston, MA. Expo registration is FREE, and advanced registration pricing is still available for conference packages.
Tags : 
embedded systems, conference, boston, esc boston, build your own embedded system, atom, windows embedded, classes, tutorials, wired, wireless, programmable logic, system integration, debugging, verification, dsp, multimedia programming, design team management, security, multi-core
    
TechInsights

State of Human Capital Management in Government Report

Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
Together with our partner Cornerstone, HCMG has benchmarked the last five years of progress in human capital management for government. This research is designed to aid leaders across Federal, Defense, State, and Local sectors in benchmarking their own performance and in developing America’s present and future leaders.
Tags : 
capital, management, government, cornerstone
    
Cornerstone OnDemand

Stress Testing: A View from the Trenches

Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing, security, it management, knowledge management, enterprise applications, platforms, data management
    
SAS

TDWI Best Practices: Data Lakes, Purposes, Practices, Patterns and Platforms (customized reports)

Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS

Ten Things to Consider Before You Invest in Video Conferencing

Published By: LifeSize, a division of Logitech     Published Date: Feb 20, 2014
This document is designed to help you understand the things you should consider before making an investment in video conferencing. It will help you think of how video conferencing could affect your business processes, why compatibility matters, the steps you should take to ensure its adoption and more.
Tags : 
lifesize, video conferencing, communication, hd video functionality, telecom
    
LifeSize, a division of Logitech

EMC Backup Game Day eBook

Published By: EMC Corporation     Published Date: Oct 16, 2013
Organizations that transform backup environments report significant business benefits. In fact, they directly link backup transformation to faster product development cycles, accelerated global expansion efforts, improvements in customer profiling, and more. But how do you go about making changes to your backup environment that will improve your business? You’ve got to have a game plan. This eBook is designed to help you understand the impact of backup transformation, what the key steps are that all organizations should consider before and during the journey, and why EMC is uniquely qualified to guide you.
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, storage
    
EMC Corporation

4 Data Center Trends of the Future

Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability, flex capacity, high density, eco availability, dcim, energy efficiency, power supply, infrastructure, power and cooling
    
Emerson Network Power

Top 12 Best Practices for Virtualizing Active Directory Domain Controllers

Published By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : 
veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields, vmware, vexpert, virtualizing, active directory, infrastructure, storage virtualization, application integration, application performance management, business integration, business management, productivity, data center design and management
    
Veeam

No Longer a Necessary Evil: How Modern CRM Empowers Sales

Published By: SugarCRM     Published Date: Apr 08, 2014
CRM has long been seen as a must-have sales tool. However, much of the value of traditional CRM accrues to managers, not the reps that use them daily. Learn how CRM designed for the individual benefits the entire sales organization from increased data quality to more predictable revenue pipelines.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, customer relationship management
    
SugarCRM

Social Media Pocket Guide

Published By: Spredfast, Inc.     Published Date: Sep 10, 2014
Designed for experienced social marketers as well as for those taking on new social roles, the Social Media Pocket Guide is a quick reference to help you stay ahead of the curve.
Tags : 
spredfast, social media, social marketing, brand awareness, social conversions, real time trends
    
Spredfast, Inc.

Essential Resources for Designing and Delivering Effective Online Training

Published By: AccelSocial - Citrix     Published Date: Jul 22, 2012
This new white paper explores three essential resources that will help you to optimize your training program.
Tags : 
training, human resources, citrix, online training
    
AccelSocial - Citrix

7 Reasons to Consider Responsive Design for Your Company's Next Generation Website

Published By: Bridgeline Digital     Published Date: Sep 26, 2013
Is your website ready for the mobile revolution? If you haven’t already, marketers everywhere should be considering how to revamp their digital marketing strategy to cope with the mobile takeover.
Tags : 
website design, responsive design
    
Bridgeline Digital

3 Phases to Executing a Successful Email Campaign

Published By: Bridgeline Digital     Published Date: Oct 28, 2013
This eBook is for designers that are tired of creating the same bland emails, the content marketers who find themselves at a loss while coming up with the right words in their subject line, and, most of all, for the frustrated marketing teams that are sick of wondering why their campaigns fail to produce desired results.
Tags : 
email marketing, email marketing campaign, email marketing strategies, content marketing, maximizing customer engagement, email design, autoresponders, automated emails
    
Bridgeline Digital

Secure By Design with Citrix

Published By: Citrix     Published Date: Dec 16, 2013
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
citrix, xenapp, xendesktop, mission critical applications, productivity, remote access, application integration, employee performance, desktop management
    
Citrix

Remote access to enterprise PCs

Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop, wireless infrastructure, collaboration, productivity, desktop management, infrastructure
    
Citrix

Top 10 Job Shop Vendors Revealed

Published By: Business Software     Published Date: May 28, 2013
Job shops often specialize in a particular metal fabrication, or a specialization around certain types of products, like fasteners or machined bar stock. They provide unique services for larger manufacturing operations such as working with unique materials, incredibly tight tolerances, the ability to generate quickly manufactured prototypes, design and CAD assistance, reverse engineering, quick-turn parts, in-house tooling, amongst other services. Some typical job shop operations include: • Machine Builders • Tool and Mold Shops • Plastic Processors • Stamping Houses • Contract Cutters and Engravers • Vehicle and Boat Converters • Niche Product Manufacturers • Furniture, Cabinet, and Display Makers
Tags : 
top 10 job shop vendors, metal fabrication, fasteners, machine builders, stamping houses, business software
    
Business Software
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.