Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

car

Results 1 - 25 of 2564Sort Results By: Published Date | Title | Company Name
Published By: Juniper supplement     Published Date: Sep 22, 2015
Web services An examination of those organizations using web services successfully and find that they have chosen their networking infrastructure carefully and taken advice about future upgrade strategies. SDN and NFV We look at whether software defined networking (SDN) or network functions virtualization (NFV) will solve the problem of the sheer volume of new applications, and when they are likely to fulfil their promise. 9 Infographic Inside information from Juniper Networks on how to avoid that cyberattack and if you can’t – how to neutralize it. 10 Internet of Things How will you deal with the 1.6 zettabytes of data the Internet of Things is preparing to throw your way? Get your smart spectacles out and read how! 14 Colocation We take a look at why the rapid growth in cloud Services could very well be a big help for co-location – a sector which is still growing very nicely thank you.
Tags : 
data center design and management
    
Juniper supplement
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Zendesk     Published Date: Jan 04, 2019
“O cliente tem sempre a razão” é uma máxima que a Zendesk leva muito a sério. O que o cliente quer? O que ele precisa? Esse é o foco de todas as atividades da Zendesk. De pequenas empresas que desejam crescer rapidamente e estabelecer suas marcas a grandes empresas que querem manter a fidelidade dos seus clientes, a Zendesk capacita corporações para que elas atendam, sem interrupções e em tempo real, a grandes bases de clientes nos canais que elas desejam, e utilizem dados e análises nas suas interações com os consumidores. Nesse ebook, você verá como organizações como a NatureBox, a Uber e a Instacart usam o Zendesk de maneiras inovadoras para criar experiências do cliente otimizadas e simples. Você aprenderá sobre: ? O fornecimento de suporte omnichannel personalizado em larga escala ? A personalização e manutenção de operações de suporte com facilidade ? O gerenciamento de fluxos de trabalho de suporte avançados para maximizar a produtividade ? A descoberta de informações sobre os c
Tags : 
    
Zendesk
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: Intel     Published Date: Feb 28, 2019
Digital transformation and smart technologies are paving the way towards smarter healthcare. Medwel understands that the goal of smart hospital development stems from the needs of the patient. By tapping on ICT advancements in the healthcare environment, the common goal is to reduce medical errors and achieve a holistic approach centered on the patients’ needs. Read more about the new MEDS-P1001—a 10.1” medical grade touchscreen PC that boosts • Effective computing through low power consumption • Interoperable through dual OS for different applications in hospitals • Health insights based on smart interfaces of vital sign measuring devices • Expandable functions through peripheral devices such as cameras, RFID reader, WIFI, etc. • Refined and reliable design that is slim, lightweight, antibacterial, water and dust-proof
Tags : 
    
Intel
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Milwaukee School of Engineering Students Test New Elastomer Material
Tags : 
    
Stratasys EMEA
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking, enterprise applications
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : 
sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc, networking, enterprise applications
    
Sangoma
Published By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : 
fraud, fraud prevention, uk fraud, fraud detection, machine learning
    
TIBCO Software
Published By: Oracle     Published Date: Mar 13, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: Customer satisfaction has become a key KPI for innovation Having too many innovation projects is their biggest hurdle Establishing business case viability and go/no-go decisions are a key challenge Read the report now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 21, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay discuss the role of Marketing in business innovation. Discover what it means to innovate, some examples of successful innovation, and what they are actually doing to scale that growth. It’s time to find out how Marketing is shaping business culture through innovative technology. Watch the talk now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 21, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay get to the bottom of the role of Marketing in innovation, how to set your growth KPIs, and how to overcome the internal barriers innovators can face. Find out how Marketing is stepping into the lead through new technology, innovation and growth. Watch the talk now.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 13, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: • Customer satisfaction has become a key KPI for innovation • Having too many innovation projects is their biggest hurdle • Establishing business case viability and go/no-go decisions are a key challenge Read the report
Tags : 
    
Oracle
Published By: 3M     Published Date: Mar 19, 2019
3M acts as a partner in preparedness for all Healthcare and Emergency professionals. Download this guide to learn more.
Tags : 
    
3M
Published By: 3M     Published Date: Mar 19, 2019
The intent of this technical bulletin is to summarize and clarify the respiratory protection guidance from both USP and NIOSH for workers who handle hazardous drugs in the healthcare environment. Download now to learn more.
Tags : 
    
3M
Published By: Yokogawa Electric Corporation     Published Date: Feb 28, 2019
Fire and explosion are the biggest inherent hazards facing the chemicals industry. The combination of flammable raw fuel, open flames and the presence of gas components such as oxygen (O2) methane (CH4) and carbon monoxide (CO) can make chemical processing a hazardous activity, particularly in combustion. Not only is there a potential safety risk with burning combustible materials, but their by-products are often combustible too. Download our Safety for Process Asset eBook to Learn How modern technology helps maintenance and instrument engineers enhance safety How to control fire and see improved safety in every stage of operations How to overcome the main challenges that maintenance and instrument engineers face How Yokogawa’s TDLS analyzers provide a safe alternative to conventional analyzer technologies
Tags : 
    
Yokogawa Electric Corporation
Published By: Blue Prism     Published Date: Mar 15, 2019
If you're going to implement an automation tool, ensure that the tools and solutions you implement can carry your business through the rapidly changing marketplace. Desktop recording and attended automation program offer a quick return on investment but overtime, because the scripts they use so frequently become obsolete - the total cost of ownership (TCO) over the long run simply isn't sustainable.
Tags : 
    
Blue Prism
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation, network management, network performance management, network security, wide area networks
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring
    
CareerBuilder
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.