it standard

Results 401 - 425 of 705Sort Results By: Published Date | Title | Company Name

PDF in the Office Environment

Published By: Nuance     Published Date: Oct 01, 2009
Since Adobe debuted the PDF file format in the early 1990s, it has become the defacto standard for electronic documents in many markets. While engineers, publishers, and printers push the format to its technical limits with rich media and 3-D content, the general office worker comprises the PDF-using majority.
Tags : 
nuance, pdf, office environment, rich media, adobe, conversion, microsoft exchange, content delivery, content integration, content management system, document management, information management, records management, secure content management
    
Nuance

PDF in the Office Environment

Published By: Nuance     Published Date: Oct 01, 2009
Since Adobe debuted the PDF file format in the early 1990s, it has become the defacto standard for electronic documents in many markets.
Tags : 
nuance, pdf, office environment, rich media, adobe, conversion, microsoft exchange, content integration, content management system, document management, information management, records management, secure content management
    
Nuance

Podcast: Security Software At The Source is Good for Quality

Published By: IBM Software     Published Date: Aug 04, 2010
Learn how to you ensure that security standards are met as part of your quality measures.
Tags : 
ibm ouncelab, podcast, security software, secure software delivery, security, application security, internet security, security management, web service security
    
IBM Software

Deliver A Consistent and Secure User Workspace with ScriptLogic Desktop Authority - Try It Free!!

Published By: ScriptLogic     Published Date: Mar 30, 2012
Desktop Authority delivers a consistent and secure user workspace while standardizing desktops and reducing costs.
Tags : 
networking, enterprise applications, windows, windows server
    
ScriptLogic

IBM PureFlex Systems running Red Hat Enterprise Solutions

Published By: IBM Corporation     Published Date: May 22, 2012
The IBM PureFlex System -a completely integrated hardware and software solution - optimized with Red Hat Enterprise Linux can improve business responsiveness, making it easier to take advantage of the power of open standards while driving efficiency.
Tags : 
ibm pureflex system, red hat, red hat enterprise virtualization, red hat® enterprise linux, kernel-based virtual machine, kvm, business technology
    
IBM Corporation

VMware View Optimization Guide for Windows 7

Published By: VMware     Published Date: Sep 12, 2011
This document provides guidelines for configuring a standard Windows 7 image to be used within a VMware View environment, providing administrators with the information necessary to create a standard image of Windows 7 leveraging the Microsoft Deployment Toolkit or by utilizing a script-based approach to optimize a traditionally installed Windows 7 virtual machine.
Tags : 
vmware, windows 7, microsoft, deployment toolkit, desktop infrastructure, scalability, optimization guide, target virtual machine, installation method, operating systems customization, network attached storage, storage area networks, storage management, windows, data quality, project management, desktop management
    
VMware

Address Your Transportation Fleet's Processes, Lifecycle, and Rising Costs

Published By: IBM     Published Date: Apr 18, 2012
This white paper describes the ability of IBM Maximo Asset Management solutions to efficiently and effectively manage processes and costs across the life cycle of an organization's vehicular fleet by standardizing processes, managing complexity, and aligning resources with demands.Dynamic transportation fleets require integrated asset management
Tags : 
ibm, manufacturing, asset management, transportation, fleets, product, technology
    
IBM

Coca-Cola Hellenic: SAP Software and Services Drive Business Transformation

Published By: SAP     Published Date: Jul 19, 2012
Mergers present opportunities for a complete transformation of the combined business organization. A blend of two smaller bottling companies, Coca-Cola Hellenic Bottling Company S.A. is one of the world's largest bottlers and distributors of Coca-Cola products. It standardized on the SAP® ERP application to better coordinate with its partner and supplier, the Coca-Cola Company, which also standardized on SAP software. Coca Cola Hellenic used SAP technology for other challenges, including transformation of its customer service processes.
Tags : 
sap, software, services, business, transformation, business intelligence, business management, web services, business technology, research
    
SAP

Top Five Ways to Prevent Re-Hospitalizations

Published By: Polycom     Published Date: Apr 30, 2013
One of the simplest, most effective ways to bring healthcare to the community level is through video collaboration. When video technology is enabled through a standards-based, scalable platform, community members can all join a multipoint video call to collaborate and work together with professionals and even with groups of similarly afflicted, empathetic peers to address health issues. Patients benefit from more regular evaluations and better access to specialty support. They participate in live or recorded education sessions—regardless of location or ability to travel. And with today’s move to ubiquitous video, you cannot only do one-to-one video sessions, but groups can meet over video to share ideas and best practices.
Tags : 
healthcare, re-hospitalization, video collaboration, collaboration, video conferencing, video platform, telepresence, application performance management, best practices, business intelligence, business management, productivity
    
Polycom

Wireless Voice in the Office Environment

Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation, wireless, authentication
    
Plantronics

Information Security Threat Landscape: Recent Trends and 2015 Outlook

Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security, networking, security, it management
    
Cyveillance

The Information Governance Maturity Model: A Foundation for Responding to Litigation

Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices, business intelligence
    
ARMA

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, security
    
Intel Security

Don't Let Trusted Vendors Become Cyber-Breach Enablers

Published By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security, enterprise applications
    
BitSight Technologies

PCI DSS 3.0 Compliance: How Trend Micro Cloud and Data Center Security Solutions Can Help

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro

Moments of Truth: Four Companies and the Insights that Transformed Them

Published By: Microsoft Office 365     Published Date: Dec 11, 2017
The cloud isn’t just for large companies with thousand of employees. In fact, some of the richest and most thrilling transformations can be seen in the mom and pop stores, the virtual start-ups. In most cases, it starts with that “moment of truth”-- a realization that something can be done better. The “Moments of Truth” e-Book details four businesses that had an insight, and turned to the cloud for answers. You’ll read about: A Nashville fried chicken company is changing lives through the power of smart technology and transformative employment A virtual social media management business is truly living “the future of work” A content-focused startup is setting a whole new standard for podcasts A digital products studio is building a real community for its employees
Tags : 
    
Microsoft Office 365

Video: DocuSign in Insurance – Insist on It

Published By: DocuSign     Published Date: Jul 25, 2016
This short video profiles the use of DocuSign in Insurance with a special focus on our customer’s customer. See first hand how DocuSign improves customer experience, maximizes ROI, and ensures compliance as the global standard for Digital Transaction Management in Insurance
Tags : 
    
DocuSign

Security, Compliance, & the Cloud

Published By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
    
AWS

Protect Customer Privacy While Enriching Data Analytics

Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
    
AWS

Cross Channel Advertising

Published By: Adobe     Published Date: Sep 28, 2016
As the digital landscape evolves, marketing channels become more complex. That means that personalizing advertising campaigns across every channel is becoming even more crucial. Read Cross Channel Advertising with AMO to learn how managing advertising campaigns programmatically lets you deliver unique customer experiences while giving you the control and insight you need. Download our report to learn more about: • Search marketing standards across the US and UK in 2015 • The recent shift of consumer transactions on mobile devices • The next big trend in ad spend
Tags : 
adobe, cross channel, cross channel advertising, advertising, marketing, marketing channels, digital
    
Adobe

The Rise of Machine Learning in Cybersecurity: How this critical capability can help prevent attacks

Published By: CrowdStrike     Published Date: Nov 28, 2018
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? This white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn: • How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware • Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML • How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-gene
Tags : 
    
CrowdStrike

The Five Essential Elements of Next-Generation Endpoint Protection

Published By: CrowdStrike     Published Date: Nov 28, 2018
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next-generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? This white paper, “The Five Essential Elements of Next-Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: • Details on the five essential capabilities that define true next-generation EPP and why they are so important • A matrix that evaluates and compares the potential impact of different solutions • A list of top questions to ask
Tags : 
    
CrowdStrike

Stratavia’s Data Center Automation Value Proposition

Published By: Stratavia     Published Date: May 21, 2008
This white paper provides an overview of current challenges in the modern data center, the impact those challenges have on the business, and Stratavia’s approach to solving those problems.
Tags : 
data center automation, stratavia, automation, dca, rba, run book automation, operational maturity, operational efficiency, process automation, data center standardization, decision automation, database automation, server provisioning, process automation, networking, distributed computing, infrastructure, internetworking hardware, local area networking, network management
    
Stratavia

5 Steps Every CIO Should Follow to Increase Operational Maturity through IT Automation

Published By: Stratavia     Published Date: Nov 20, 2007
This whitepaper is directed to technology executives and team members who are looking to increase the efficiency and operational maturity of their IT operations. It will discuss in detail the following five steps, each required to fully realize the potential of your technology investments.
Tags : 
automation, virtualization, data center, data center automation, data center optimization, database automation, database management, oracle, sybase, sql server, db2, itil, cobit, basel, standard operating procedure, server provisioning, stratavia, data management, network provisioning, compliance
    
Stratavia
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.