education

Results 276 - 300 of 368Sort Results By: Published Date | Title | Company Name

Real Results Report: Health Services Organizations Comply with HIPAA Using WebEx

Published By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : 
online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings
    
WebEx Communications

Real Results Report: The True Opportunity of Online Learning

Published By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : 
e-training, etraining, e-learning, elearning, employee education, education, training, collaboration
    
WebEx Communications

Protecting Student and Institutional Privacy Data Encryption for Education

Published By: WinMagic Inc.     Published Date: Apr 23, 2013
In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn about some common “data encryption myths” and the risks they pose.
Tags : 
protecting, student, institutional, privacy, data, encryption, education
    
WinMagic Inc.

Tape's Evolving Data Storage Role

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Tape's evolving data storage role - Balancing Performance, Availability, Capacity, Energy for long-term data protection and retention
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet

Quantum Adds LTO-5 to Scalar Tape Libraries

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Need a Long-Term Archive Solution? Quantum Adds LTO-5 to Scalar Tape Libraries. Find our more in this whitepaper!
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet

Solutions for Encrypting Data on Tape: Considerations and Best Practices

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet

The ROI of Tape Consolidation

Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This white paper shows how upgrading to LTO-5 technology and consolidating storage onto fewer tapes enables organizations to achieve a 5yr ROI and a 17-month payback period.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet

This year, recession-proof yourself.

Published By: Cal Lutheran University     Published Date: Feb 06, 2013
Whether you are considering a career change, advancement, or even personal development, our programs will prepare you for today — and whatever comes after. It's time to take the next step.
Tags : 
education
    
Cal Lutheran University

Providing Reliable, Manageable Power for VoIP Network Wiring Closets

Published By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : 
voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip
    
Tripp Lite

When On- the-Job Training Is a Recipe for Disaster

Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec

Educational Video: 10 Secrets for Taming the ITSM Beast

Published By: Samanage     Published Date: Aug 13, 2014
Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.
Tags : 
samanage, randy michaels, itsm, it service management, knowledge toolworks, service driven organization, itsm framework, it management
    
Samanage

Beaumont Hospitals, Inc. Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems
    
SyberWorks

Mobile Device Management for Education

Published By: IBM MaaS360     Published Date: Apr 15, 2015
Get the latest mobile devices and apps in the handsof learners and educators quickly and securely with mobile device and app management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360

Mobile Device Management for Education

Published By: IBM MaaS360     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : 
mobile device management, education, educators, students, app management, smartphone, tablet, classroom
    
IBM MaaS360

Mobile Device Management for Education

Published By: IBM MaaS360     Published Date: Oct 08, 2015
Get the latest mobile devices and apps in the hands-off learners and educators quickly and securely with mobile device and app management.
Tags : 
ibm, mobile, device management, education, app management, file sharing, networking, wireless
    
IBM MaaS360

Stepping up the Battle Against Advanced Threats WP

Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, knowledge management, enterprise applications, employee performance
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen, business analytics, business intelligence, business management
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report

Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco

Mobile Learning with BlackBerry Smartphones

Published By: BlackBerry     Published Date: Dec 22, 2009
University of Waterloo conducted a six-week pilot project with several of its students in the Project Leadership Program, a distance learning program. Their goal was to see if mobile learning using BlackBerry smartphones would enhance their educational experience.
Tags : 
blackberry, mobile applications, waterloo, cio, pim, voip, smartphones, it communication
    
BlackBerry

Better Access to Relevant Technical Information with Digital Libraries Drives Faster Implementation

Published By: Safari Books Online     Published Date: Feb 12, 2009
This white paper explores how this 'always on' eLearning resource can facilitate technology professionals' ability to increase productivity, pursue professional certifications, and improve collaborations and communication.
Tags : 
safari books online, digital libraries, elearning resources, professional certifications, e-reference evangelists, education, it management, knowledge management
    
Safari Books Online

Major University Uses InMage to Protect Exchange

Published By: InMage     Published Date: Feb 24, 2009
Utah State University is nationally and internationally recognized for its intellectual and technological leadership in land, water, space and life enhancement. Providing education for more than 23,000 undergraduate and graduate students, Utah State relies on technology to support its innovative initiatives including campus-wide wireless networking, a recent partnership with Google, and a unified email system.
Tags : 
inmage, data recovery, disaster recovery, business continuity, dr scout, security, email security, data protection
    
InMage

Driving Successful HR Leadership: Talent Management’s Role in Core Business Strategy

Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions
    
Oracle

Ligonier Case Study

Published By: Cisco     Published Date: Apr 10, 2015
The Ligonier Valley School District is home to approximately 1700 students. Spread across more than 230 square miles, Ligonier Valley is one of the largest geographical school districts in Pennsylvania. The district’s students are housed in four buildings: Laurel Valley Elementary (K-5), RK Mellon Elementary (K-5), Ligonier Middle School (6-8), and Ligonier High School (9-12). Ligonier Valley High School installed Cisco wireless network to provide foundation for 21st century teaching and learning.
Tags : 
cisco, education, it maintenance, wireless access, mobile device, it solutions, wireless hardware, wireless infrastructure
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.