dom

Results 301 - 325 of 696Sort Results By: Published Date | Title | Company Name

A Guide to REST and API Design

Published By: CA Technologies EMEA     Published Date: May 23, 2018
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. It may seem curious to refer to psychology in a work on REST and API Design, but it works to illustrate two distinctive points: (1) that all design decisions, regardless of whether they pertain to software or architecture, should be made within the context of functional, behavioral, and social requirements—not random trends; (2) when you only know how to do one thing well, everything tends to look identical. To get started, let’s take a look at REST in some detail by downloading this whitepaper today.
Tags : 
    
CA Technologies EMEA

Utilizzo dell'analisi delle minacce per proteggere l'accesso con privilegi e prevenire le violazioni

Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protezione degli accessi privilegiati e la prevenzione delle violazioni restano preoccupazioni urgenti per le aziende di tutte le dimensioni. Gli autori di attacchi utilizzano una gamma sempre più ampia di metodi sempre più sofisticati per infiltrarsi in sistemi vulnerabili. E anche se le notizie di violazioni esterne spesso dominano le cronache, le aziende devono essere in grado di difendersi anche dalle minacce interne. In effetti, dato l'impiego oggi diffuso di outsourcing e partnership per supportare le funzioni aziendali chiave, il numero degli utenti che dispongono di accesso con privilegi ai sistemi di business critici è aumentato. In aggiunta, è essenziale per gli amministratori di sistema di oggi comprendere in che modo i sistemi vengono utilizzati, da chi e in quali condizioni. Purtroppo, le soluzioni di sicurezza standard non sono in grado di proteggere l'accesso interno/privilegiato in modo efficace e presentano gravi carenze, che mettono a rischio l'azienda.
Tags : 
    
CA Technologies EMEA

VMware Horizon Advantages Over Citrix

Published By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
vmware, vmware horizon, mobile, cloud
    
VMware

Dresner Wisdom of Crowds Report

Published By: Looker EMEA     Published Date: Sep 27, 2017
Want to know how Business Intelligence products vary in categories such as scalability, reliability, technical support, value for price paid, integrity, and whether the vendor is recommended? Read this report to get: • A side-by-side comparison of 28 BI tools • Ratings across 33 metrics for each vendor • Real customer feedback on performance
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Looker EMEA

Top trends for online reputation management in 2018

Published By: Reputation.com     Published Date: Jun 29, 2018
The past year ushered in some big changes for Online Reputation Management (ORM) — and the practice has become indispensable for any location-based enterprise. In 2017, review sources proliferated, consumers became more savvy about the validity of online reviews, and the position of Chief Experience Officer started to gain traction among locationbased organizations. ORM and SEO became increasingly intertwined as Google refined its search algorithms with a strong emphasis on reviews and star ratings. This year, expect to see these four trends move to the forefront: 1) Google will extend its dominance in online review volume and consumer exposure, eclipsing all other specialty sites. 2) SEO will be reinvented as user-generated reviews weigh more heavily in search rankings. 3) The voice of the customer will no longer be siloed across disconnected categories. 4) Consumer feedback from reviews and social media will drive operational improvements.
Tags : 
    
Reputation.com

The Business Case for Humor in B-to-B: Serious Research on Comical Advertising

Published By: gyro     Published Date: Feb 01, 2019
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
advertising, humor, qualitative research, quantitative research, b2b advertising
    
gyro

Domo for IT

Published By: Domo APAC     Published Date: Mar 04, 2019
Data strategy built for enterprise, designed for people. View Domo’s privacy policy
Tags : 
    
Domo APAC

Cisco's Digital Marketing Transformation.

Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC

Future-Ready IT Infrastructure with Freedom from Past Designs

Published By: DataCore     Published Date: Apr 23, 2019
In our developing digital economy, IT is a strategic asset. By effectively leveraging data, businesses become more operationally efficient, create more differentiated customer experiences, and develop new products and business models. However, unlocking those benefits requires a higher degree of execution by IT. Simply keeping pace with demand is no longer good enough; IT needs to help drive the business’s digital pursuits. The increased pressure on IT has amplified complexity, as well—66% of IT decision makers surveyed by ESG say IT is more complex than it was just two years ago.1 Demands being placed on IT are scaling relentlessly, and the tools IT teams use are in a constant state of evolution. Integrating and optimizing those new infrastructure technologies while managing existing investments is a perpetual burden. IT organizations, therefore, have two choices: either increase their personnel and budgets enough to survive the evolution with just traditional tools, or redirect those
Tags : 
software defined storage, hyperconverged, storage consolidation, storage management, data migration, storage migration
    
DataCore

Whitepaper: Eight Good Reasons to Bring Finance and Human Capital Management Together

Published By: Workday UK     Published Date: Apr 25, 2019
Most businesses treat finance and Human Capital Management (HCM) as different domains, but this separation creates a lot of problems. Combining finance and HCM into one system makes it easier to see the whole picture, make changes, and plan for growth. Read the whitepaper to see eight detailed reasons why bringing finance and HCM together is the better way to go.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK

8 bonnes raisons d'unifier Gestion Financière et Gestion des Ressources Humaines

Published By: Workday France     Published Date: Aug 03, 2018
Tous les grands partenariats connaissent des hauts et des bas. Lennon et McCartney, ou Laurel et Hardy ont eux aussi connu des divergences de vues. Travailler ensemble implique de partager les mêmes objectifs, mais cela ne signifie pas toujours une harmonie totale et une reconnaissance des qualités et de la contribution de l'autre. Cette observation peut également s'appliquer aux fonctions financières et RH de toute entreprise : ce sont deux composantes clés de l'organisation mais historiquement deux domaines opérationnels très différents.
Tags : 
    
Workday France

Do you need an integrated solution that simplifies FATCA and CRS compliance reporting?

Published By: FICO - APAC     Published Date: Sep 19, 2017
The world is swiftly moving towards global tax transparency, new pillars to set the standards dominate reporting and compliance procedures. However, in this transition, businesses might be struggling with complying with new and changing reporting standards, and the efficiencies achieved as a result of the change. But thankfully there is this one simple solution available that nails the complexities of two reporting standards – FATCA and CRS.
Tags : 
identification process, standard, unified verification, case management, reports, fico, tonebeller, fatca, crs
    
FICO - APAC

Développer des microservices pour plus de vitesse et d’agilité

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La vitesse et l’agilité comptent. Les entreprises sont tous les jours concurrencées par de jeunes start-up numériques qui réussissent à répondre aux nouvelles demandes du marché avant les sociétés bien établies. Malgré des équipes informatiques talentueuses et plusieurs années d’avance dans les domaines de l’architecture et du développement, les approches traditionnelles de développement centrées sur des applications monolithiques ne permettent pas toujours de relever facilement ces défis. Il est tout simplement impossible de mettre rapidement sur le marché des applications qui doivent être maintenues, modifiées et mises à l’échelle sous la forme d’une entité unique par une équipe nombreuse et fortement interdépendante.
Tags : 
    
CA Technologies EMEA

Build a Better Cloud Guide

Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc

Key Ways to Optimize your Email Campaign ROI

Published By: Return Path     Published Date: Jan 29, 2013
Email marketing is always changing. Download the “Email Intelligence Report” to tap into the latest data trends and analytics to optimize your email campaigns and ROI.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends, email marketing best practices, mobile best practices
    
Return Path

Email Marketing Hot Topics: Things You Should Know About Mobile Email

Published By: Return Path     Published Date: Jan 31, 2013
Email marketing isn’t simple anymore. The “Email Best Practices for Mobile” podcast provides best practices and tips for marketers designing email content for both mobile and desktop viewing.
Tags : 
email reader trends, viewing email trends, best practices for mobile, viewing email mobile, viewing email ipad, viewing email desktop, viewing email webmail, email marketing trends, email marketing best practices, mobile best practices
    
Return Path

Endpoint Security - Data Protection for IT, Freedom for Laptop Users

Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop, security management, security policies, data protection, database security, vulnerability management
    
Absolute Software

Entrust Private SSL Certificates: Enabling Continued Use of Non-Registered Domain Names

Published By: Entrust Datacard     Published Date: May 15, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard

Guidance on Non-FQDNs: The Deprecation of Internal Server Names and Reserved IP Addresses

Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
Entrust Datacard

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

Entrust Private SSL Certificates: Enabling Continued Use of Non-Registered Domain Names

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015.
Tags : 
ssl certifications, fqdn, non-registered names
    
Entrust Datacard

Guidance on Non-FQDNs: The Deprecation of Internal Server Names and Reserved IP Addresses

Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions, ev multi-domain, security
    
Entrust Datacard

Six Steps to SSL Certificate Management

Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory, secure content management
    
Entrust Datacard

SANS - Keys to the Kingdom: Monitoring Privileged User Actions for Security and Compliance

Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security, privileged users, damage, infrastructure, backup and recovery, access control, application security, auditing, authentication, disaster recovery, email security, encryption, high availability
    
LogRhythm
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.