ev ss

Results 251 - 275 of 10680Sort Results By: Published Date | Title | Company Name

Manage Secure Shell Access with Time-Bound Certificates

Published By: AWS     Published Date: Nov 04, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
    
AWS

Microsoft Exchange Server 2007: Migration Made Easy

Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it
    
123Together

Journaling and High Availability - Understanding IBM i Data Protection

Published By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : 
vision, high availability, ibm, idata protection, journaling, as/400, database development, data integration
    
Vision Solutions

High Availability for IBM I: A Technical Review of Software and Hardware-Based Solutions

Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm, disaster recovery, policy based management
    
Vision Solutions

Achieving Rapid AIX Data Recovery for Credit Union Core Processing Applications

Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union, as/400, data protection
    
Vision Solutions

The Last (And Arguably Most Important) Mile of Machine Learning: Operationalizing Analytical Models

Published By: SAS     Published Date: Nov 08, 2019
As organizations continue to adopt predictive analytics, many are struggling to make it stick. Challenges include skills, executive and organizational support, and data infrastructure issues. Many organizations have not considered how to practically put analytics to work, given the organizational, technology, process, and deployment issues they face. Addressing these issues involves a combination of traditional and new technologies and practices. Some practical considerations highlighted in this report include: Model Development, Infrastructure and Operational Process.
Tags : 
    
SAS

FileReflex: Making Life Simpler for Remote and Mobile Workers

Published By: Karya Technologies     Published Date: Nov 25, 2011
Access corporate desktop data at ease, even during commute. Remote access to desktop documents anytime, anywhere. Mobilize your enterprise file server
Tags : 
    
Karya Technologies

5 Tips To Lose Weight Without Going On A Crazy Fad Diet!

Published By: fitness pro world     Published Date: Dec 06, 2012
he rampant fad diets that seem to be here, there, and everywhere, can definitely help you to lose weight instantly, but the question is, how long can that weight loss be sustained, and what will it end up doing to your body.
Tags : 
    
fitness pro world

eCommerce Email Acquisition: How to Leverage Your Site to Grow Your List Description

Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce
    
Ability Commerce

Cooperative Marketing Best Practices

Published By: Pitney Bowes     Published Date: Dec 11, 2008
This White Paper, sponsored by Pitney Bowes Marketing Solutions, a leading provider of web-based co-op marketing tools, examines the trends and challenges faced by companies looking to achieve more business growth from their trade marketing efforts.
Tags : 
pitney bowes, co-op marketing tools, trade marketing, program controls, marketing funds management, market development funds, business development funds
    
Pitney Bowes

EDI Made Easy: The Order Management Success Story of Accord Healthcare

Published By: Esker     Published Date: Jan 08, 2019
As a leading generic products pharmaceutical company, how Accord Healthcare manages the 5,000 customer orders it receives each month matters … a lot. This 10-page eBook takes you through Accord’s journey from the complexities of a manual environment to the streamlined and automated process it enjoys today, including impressive results such as: • 190 hours of time saved each month for CSR teams • Increased touchless rate of EDI orders by 7.6% in 2 months • 100% visibility over EDI orders as PDFs in SAP ... and many more! See what elevating EDI to the business level looks like (it looks good). Download Now.
Tags : 
    
Esker

The AI Advantage

Published By: Esker     Published Date: Jan 08, 2019
There’s no denying it: The age of AI, or what’s often referred to as the “Fourth Industrial Revolution,” is already here and, in many ways, just getting warmed up. Businesses eager to create a competitive advantage are recognizing that the future is in the intersection of humans and machine intelligence. That’s why we created this guidebook. It’s sort of like AI for Dummies … but for intelligent business leaders like yourself. The ones who just want to better understand what AI is, its implications, and the benefits it brings to essential business processes. So kick back, relax and enjoy. In just 15ish minutes, you’ll know more about AI than your competitors and your business will be better for it.
Tags : 
    
Esker

Aligning People, Process & Technology

Published By: Esker     Published Date: Jan 08, 2019
Customer service is, was and always will be a top priority for companies. But today’s digital age has given rise to a new kind of customer with far different expectations — making customer service more complex than ever. Here’s the good news: By aligning People, Process & Technology (PPT), you can not only meet these new expectations, but exceed them by providing a more personalized and proactive customer experience. In this ePaper, you’ll learn how order processing automation helps you: • Create a more engaged, empowered staff • Eliminate low-value tasks like data entry • Provide 100% visibility into every order processed
Tags : 
    
Esker

Overcoming Portal Fatigue: An Introduction to Robotic Process Automation

Published By: Esker     Published Date: Jun 14, 2019
Customer and supplier portals are one of the many fruits borne from the age of digital transformation. However, the level of accommodations that portals provide to customers and suppliers has spawned a whole new set of challenges that didn’t exist less than a decade ago. Chief among these is something referred to as “portal fatigue.” Many AR departments and CSR teams are painfully familiar with the term, as it’s often their job to either retrieve orders from a customer portal or submit invoices directly into customers’ AP systems. On paper, these tasks don’t seem all that odious. But when you consider the amounts of different portals being used, and the fact that not every user is trained on each portal, it’s easy to see why portal fatigue is a very real and concerning problem for today’s businesses.
Tags : 
    
Esker

Driving Business Execution through Integrated Talent Management

Published By: SuccessFactors     Published Date: Jun 21, 2012
Discover how you can leverage talent management processes to drive business execution.
Tags : 
human resources, talent management, business execution
    
SuccessFactors

Advanced Product Design for Industry 4.0: Design Review

Published By: ASME     Published Date: Oct 22, 2019
In this four-part series, explore how product development is changing, its challenges, and the new technologies being developed to transform design workflows. You will discover the new visualization techniques that drive new levels of collaboration and enable critical product decisions to be made earlier in the design process. Download the latest reports in this series, and learn how to improve design reviews, enhance decision making, and optimize your product designs.
Tags : 
    
ASME

Nine Pitfalls of Relying on FTP to Move Large Media Files

Published By: Broadcast Beat Magazine     Published Date: Oct 21, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files. FTP can no longer keep up with the modern global media supply chain. Whether you are a top tier company or a small startup, being in the media business today requires next-generation acceleration software. Read this whitepaper to find out more.
Tags : 
    
Broadcast Beat Magazine

TCO Report: Tape vs. Object Storage

Published By: Broadcast Beat Magazine     Published Date: Oct 30, 2019
After examining the TCO of object storage vs. LTO tape, and seeing the benefits achieved in a real-world case study, it’s easy to understand why object storage is quickly becoming the standard for data storage, backup, archive, and recovery. It’s clear that when all costs associated with data storage are tracked, object storage beats tape storage hands down. And even with costs aside, on-premises object storage with Cloudian provides businesses with the flexibility they need to respond to changing technology environments, storage requirements, data monetization opportunities, and more.
Tags : 
    
Broadcast Beat Magazine

From Morning Announcements to Inspired Afternoons

Published By: Broadcast Beat Magazine     Published Date: Nov 11, 2019
So, it comes as little surprise that educators are taking advantage of this shift and beginning to incorporate video into the curriculum. You don’t need to be a video expert to see the possibilities it represents for education. Even if you don’t know your DVI from your HDMI, chances are you’re eager to engage and inspire your students in creative and productive ways. With the accessibility and affordability of video today, it no longer matters how experienced with A/V technology you are. Around the world, educators and academic institutions are using video to open new channels of communication, connect with their communities, and give students new and engaging ways to learn.
Tags : 
    
Broadcast Beat Magazine

Saint Joseph Abbey and Seminary College Puts Faith in Astaro

Published By: Astaro     Published Date: Jan 19, 2011
Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.
Tags : 
astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management
    
Astaro

7 Best Practices for Simplifying Data Center Cable Management

Published By: Data Center Frontier LLC     Published Date: Nov 11, 2019
Data center cable management is often considered a problem reserved for network engineering teams, but bad cable design can wreak havoc across your entire enterprise. “Spaghetti” cabinets and other symptoms of ill-considered cabling make it more difficult to complete equipment installations, troubleshooting, and maintenance. They can create an unsafe operating environment for your equipment by restricting airflow to racks, trapping dust, keeping cables warm, and making it impossible to understand at a glance how your devices are connected. Bad cable management practices can even hinder modern data center environments from adapting to new technologies like IoT and big data, provisioning IT resources on demand to support business innovation, and utilizing data center capacity to promote scalability, efficiency, and cost effectiveness.
Tags : 
    
Data Center Frontier LLC

Green Data Centers are Imperative for Enterprise Success

Published By: Data Center Frontier LLC     Published Date: Nov 11, 2019
From the world’s largest companies to smaller enterprises, sustainable practices and environmental stewardship are becoming core to enterprise business strategy. In fact, sustainability—once seen as a forward-thinking competitive advantage—has evolved into a necessity in the global economy.
Tags : 
    
Data Center Frontier LLC

Introducing 200G HDR InfiniBand Solutions

Published By: Inside HPC Media LLC     Published Date: Nov 11, 2019
In a world characterized by ever-increasing generation and consumption of digital information, the ability to analyze data to find insights in real time has become a competitive advantage. An advanced network must address how best to transfer growing amounts of data quickly and efficiently, and how to perform analysis on that data on-the-fly. The Co-Design technology transition has revolutionized the industry, clearly illustrating that the traditional CPU-centric data center architecture, wherein as many functions as possible are onloaded onto the CPU, is outdated. The transition to the new data-centric architecture requires that today’s networks must be fast and they must be efficient, which means they must offload as many functions as possible from the CPU to other places in the network, enabling the CPU to focus on its primary role of handling the compute.
Tags : 
    
Inside HPC Media LLC

Case Study: Seeking Alpha Accelerating Personalized Real-time Financial Market Information

Published By: Cotendo     Published Date: Sep 01, 2010
The company needed a different CDN and website acceleration solution to provide its users with the level of responsiveness to changing stock market conditions that they depend on - and that Seeking Alpha demanded of itself.
Tags : 
cotendo, case study, real-time financial market information, cdn, content delivery, collaboration, collaborative commerce, content integration
    
Cotendo

Free White Paper: Protecting Your Business from Data Breach Attacks

Published By: IdentityIntact for Business     Published Date: Oct 21, 2011
IdentityIntact for Business presents a comprehensive review of how your business can be better protected from data breach attacks by cyber thieves.
Tags : 
    
IdentityIntact for Business
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.