systems

Results 276 - 300 of 3923Sort Results By: Published Date | Title | Company Name

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve One-Up/One-Back Traceability in Food Processing

Published By: Plex Systems     Published Date: Feb 26, 2014
Plex is the easy way for a processor to ensure compliance, have complete quality assurance and traceability, and have a record of ingredients movements up and down the supply chain. Using Plex means a processor can always know the product genealogy in high detail.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity
    
Plex Systems

Achieving a Lean Government Workforce

Published By: Kronos     Published Date: Sep 24, 2018
When a government organization deploys lean workforce management practices, it affects their largest operational expense: the workforce. As the public sector moves to reinvent itself, workforce management systems and adopting lean labor practices are perhaps two of the most immediate and high-impact mechanisms. Lean practices help government organizations control labor costs and allow them to reallocate those savings into preserving critical programs, services, and jobs ... which is the very essence of the public sector mission.
Tags : 
    
Kronos

Achieving High Oracle

Published By: Dell Software     Published Date: Oct 03, 2013
In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
dell, cross platform, dba, business-critical systems, high performance, software, technology, oracle
    
Dell Software

Achieving High Oracle

Published By: Dell     Published Date: Nov 04, 2013
In an ever-changing world, DBAs are managing more complex, business-critical systems. The problem is the business isn’t slowing down, and budgets are getting smaller. Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
dell, dba, business-critical, service level, data management, network performance, oracle, database development
    
Dell

Achieving High Oracle Performance

Published By: Dell Software     Published Date: Feb 19, 2014
In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
oracle performance, dbas, database management, database performance, advanced performance, maximum service levels, software, database development
    
Dell Software

Achieving Manufacturing Leadership with HP Mission Critical Service

Published By: HP     Published Date: Jul 29, 2008
This case study highlights how one of the world's leading manufacturing companies employed a Mission Critical architecture to protect their most important systems. Learn how this customer achieved 99.99% availability of their systems for 4 straight years. As a result of adopting a high availability strategy, this HP customer saved 97 million Euros, by avoiding lost downtime.
Tags : 
mission critical, manufacturer, manufacturing, high availability, network architecture, enterprise resource planning
    
HP

Achieving Sustainable IT Compliance to 21 CFR Part 11

Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals
    
Ecora Software

Action Plan to Prepare for the New Lease Accounting Standard

Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Download this white paper to understand how these changes create a need for new processes and systems to achieve compliance and drive the need for new and broader skills within financial and real estate personnel.
Tags : 
ibm, smarter buildings, lease accounting, finance, financial accounting, business
    
IBM US Smarter Buildings

Action Plan to Prepare for the New Lease Accounting Standard

Published By: IBM     Published Date: Apr 24, 2012
Download this white paper to understand how these changes create a need for new processes and systems to achieve compliance and drive the need for new and broader skills within financial and real estate personnel.
Tags : 
ibm, manucaturing, facilities, lease, lease accounting, paperwork
    
IBM

Activate Cloud Storage to Improve Storage Environment

Published By: IBM     Published Date: Nov 04, 2014
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
cloud computing, it efficiency, cloud storage, data protection, it management, data management, virtualization
    
IBM

Activate Cloud Storage to Improve Storage Environment

Published By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics, it management, knowledge management, enterprise applications
    
IBM

Active Power CleanSource® UPS: High Efficiency UPS Systems for a Power Hungry World

Published By: Active Power     Published Date: Aug 30, 2011
Learn why energy efficiency for UPS equipment is so important, what can influence energy UPS efficiency and how it can directly impact energy costs.
Tags : 
backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems
    
Active Power

Adaption Extinction: The Digital Evolution of Billing Systems

Published By: BillingPlatform     Published Date: Apr 18, 2019
Digital transformation, typically associated with front-office changes like sales and marketing, has begun to revolutionize billing practices for forward-leaning enterprises. This infographic highlights the importance of evolving your billing for the digital economy. Discover the 4 survival tactics offered by cloud-based billing platforms.
Tags : 
    
BillingPlatform

Adding Zero-Day Offense to Vulnerability Management

Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys

Addressing complexity for automotive software and systems engineers

Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today's automotive engineers are faced with rising product complexity and the need to innovate their methods in order to remain competitive. This infographic will help to paint a picture of the impact of rising complexity on the auto industry and provide a roadmap for embracing digital transformation.
Tags : 
    
Group M_IBM Q3'19

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
    
Schneider Electric

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring
    
Schneider Electric

Addressing Future Automotive Needs with Model-Driven Systems Development

Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
    
IBM

Addressing Network Management Challenges with NETCONF

Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf, networking
    
Tail-f Systems

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
IBM MaaS360

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
IBM MaaS360

Addressing NIST and DOD Requirements for Mobile Device Management

Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security, networking, security
    
IBM MaaS360

Addressing NIST And DOD Requirements for Mobile Device Management (MDM)

Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.