practical use

Results 1 - 25 of 47Sort Results By: Published Date | Title | Company Name

Microsoft Exchange Server: To Outsource Or Not To Outsource

Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it
    
123Together

Cyber Security Checklist Part 2

Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

Email Server Essentials

Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration, email security
    
Alt-N Technologies

The Big Book of MoT: Making the Most of the Monetization of Things

Published By: Aria Systems     Published Date: May 03, 2016
The Big Book of MoT is designed to give our readers easy access to practical and useful information about monetizing the IoT. We separated the fluff from the good stuff, by going beyond what’s strictly relevant to the IoT’s capacity for monetization, with the inclusion of perspectives that also look at the IoT from other angles. Yes, the Internet of Things is complicated. But getting it right is will be imperative. We hope you enjoy The Big Book of MoT and that it provides you with information that helps you grow your business for years to come.
Tags : 
    
Aria Systems

Apply Artificial Intelligence to Information Security Problems

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The information security world is rich with information. From reviewing logs to analyzing malware, information is everywhere and in vast quantities, more than the workforce can cover. Artificial intelligence (AI) is a field of study that is adept at applying intelligence to vast amounts of data and deriving meaningful results. In this book, we will cover machine learning techniques in practical situations to improve your ability to thrive in a data driven world. With clustering, we will explore grouping items and identifying anomalies. With classification, we’ll cover how to train a model to distinguish between classes of inputs. In probability, we’ll answer the question “What are the odds?” and make use of the results. With deep learning, we’ll dive into the powerful biology inspired realms of AI that power some of the most effective methods in machine learning today. Learn more about AI in this eBook.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance

Fast Path to IT Data Analytics

Published By: BMC Software     Published Date: Jul 22, 2015
Watch this on-demand webinar to see how BMC TrueSight IT Data Analytics speeds the time to understand and resolve issues as well as other practical use cases.
Tags : 
data analytics, bmc truesight it data analytics, practical use, manual log analysis, monitoring, log data
    
BMC Software

Collaboration for Today's Workforce: 3 Ways Any Team Can Work Better with Box

Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box

How to Save $750 Per Year on Your Web Conferencing

Published By: Business.com     Published Date: Jan 16, 2013
One of the newest and most practical uses of corporate technology is web conferencing, which allows people from multiple locations to meet and/or collaborate at the same time. With this being a rising necessity, Learn how to save on web conferencing.
Tags : 
resource nation, web conferencing, saving on web conferencing, collaboration, knowledge management, enterprise applications, business technology
    
Business.com

Identity and Access Management (IAM) Across Cloud and On-premise Environments

Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies

Identity and Access Management (IAM) Across Cloud and On-premise Environments

Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies

Identity and Access Management (IAM) Across Cloud and On-premise Environments

Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies

Eight Tips for Mastering Migration

Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite

The Art of the Follow-Up: 3 Ways to Engage Clients

Published By: Cisco     Published Date: Nov 30, 2016
Every sales professional has experienced the frustration of the follow-up to a meeting — the unanswered voice messages, wasted emails, or the “not interested” replies. Traditional follow-up techniques often fail because they don’t feel personal enough to the customer. Meanwhile, reaching out to prospects in-person isn’t always practical because on-site meeting invites may be costly or inefficient.
Tags : 
    
Cisco

Cloud Evaluation Guide

Published By: Cisco Systems     Published Date: Jun 27, 2013
This practical guide can help you choose the best cloud solution for your company. If you are considering alternatives to an on-premises communications system, you need to thoroughly understand the issues and options. Since anyone with a server and an Internet connection can become a cloud vendor, how do you know what to ask, or who to believe? This guide gives you a three-step process, or evaluation guide, you can use to cut through the hype and make an informed decision.
Tags : 
cloud solution, integrated solution, application, network, on-premises communication system, technology, networking, knowledge management
    
Cisco Systems

Visual Communication: Core Design Principles for Displaying Quantitative Information

Published By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : 
visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation
    
Cognos

Cyber Intrusion Services Casebook 2018

Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike

Model Management: A Framework to Build a Model-Driven Business

Published By: Domino Data Lab     Published Date: May 23, 2019
This paper introduces the practice of Model Management, an organizational capability to develop and deliver models that create a competitive advantage. Today, the best-run companies run their business on models, and those that don’t face existential threat. The paper explains why companies that fail to run on models are falling for the Model Myth—the assumption that models can be managed like software or data. Models are different and need a new organizational capability: Model Management. What’s inside: Defining a model Why models matter for businesses Why companies fall for the Model Myth A framework for Model Management Practical steps to get started The paper is intended for anyone in a data science organization, or anyone who hopes to use data science as a key source of competitive advantage for their business.
Tags : 
    
Domino Data Lab

The Gorilla Guide to Hybrid Edge Computing

Published By: Flexential     Published Date: Jul 17, 2019
INSIDE THE GUIDE: • Your ticket to edge computing confidence and mastery • Introduction to the concept of Hybrid Edge Computing • Practical use cases for understanding how edge computing is being rolled out today • Top tips for being successful at the edge
Tags : 
    
Flexential

Customer Loyalty: How to Earn It, How to Keep it.

Published By: GoToAssist     Published Date: Oct 05, 2011
It is imperative in today's economy to not only gain customers but to keep them. Without the right set of tools and measurements, however, this can be a daunting task. Watch this on-demand webinar with Jill Griffin, author of Customer Loyalty, as she delves into practical tools you can use to measurably improve the satisfaction and brand attachment of high-value customers.
Tags : 
citrix, webinar, customer loyalty, technology, tools, improve satisfaction, best practices, business analytics
    
GoToAssist

CIO’s Guide to Digital Transformation: Why Data Holds the Key to Success

Published By: Hitachi Vantara     Published Date: Mar 21, 2018
Digital transformation is top of mind for CIOs and business leaders for clear and practical reasons. It offers an opportunity to create new revenue streams and meet changing customer demands, as well as a way to address the rise of digital insurgents trying to hijack core markets. What’s needed is a common resource that both IT and business managers intrinsically value, one that can guide decisions about new business initiatives and related technology investments. That rallying point is enterprise data. Because incumbents possess richer reserves of business information, they wield a competitive advantage that even the most disruptive insurgents can’t claim. The key is for established companies to unlock the full potential of this important resource to fuel business transformation and help to maintain their leadership positions in volatile and quickly evolving markets.
Tags : 
    
Hitachi Vantara

ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application

Published By: IBM     Published Date: Aug 10, 2009
Practically every CIO office is focused on quickly exploiting opportunities to drive value for the business. Decisions about seamlessly integrated and personalized portal infrastructures with high operational efficiencies are top of mind. Through agile and unique online experiences, portals bring together applications, information sources and people – in the contexts of role and associated business processes – on the Web and across the value chain. Additionally, they increase talent effectiveness and productivity while lowering costs, and they drive value chain agility and customer advocacy.
Tags : 
ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application integration
    
IBM

Developing more effective mobile enterprise programs

Published By: IBM     Published Date: Oct 10, 2013
This paper outlines practical “how-to” guidance to strategize and implement more effective mobile enterprise programs and details the robust capabilities that mobile enterprise partners can bring to the development and support of your corporate owned device or BYOD mobile enterprise programs. It focuses on mobile enterprise programs for employees, as opposed to customers.
Tags : 
effective mobile enterprise, enterprise programs, mobile enterprise, guidance to strategize, guidance to implement, implement efficiently, effective implementation, corporate device
    
IBM

Six keys to effective reputational and IT risk management

Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding
    
IBM

Real-time Agility: Core Principles and Practices for Embedded-Software Teams

Published By: IBM     Published Date: Oct 10, 2014
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development.
Tags : 
ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies
    
IBM
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.