Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

domain

Results 176 - 200 of 278Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the world’s leading research organizations, and one of the world’s top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM
Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.
Tags : 
networking, big data, network monitoring, optimization, data center, monitoring
    
VSS Monitoring
Published By: Oracle     Published Date: Apr 28, 2014
Perfect order fulfillment requires companies to have seamless integration of all supply chain execution (SCE) including, logistics processes from manufacturing, transportation, warehouse, global trade to mobile and RFID. Recent research from Gartner reveals that most supply chain organizations continue to operate as functional silos – warehousing, transportation and manufacturing – with minimal, if any, process integration and synchronization between execution silos. The Gartner Research report provides key insights into how supply chain and IT leaders can transform logistics by breaking down functional silos, and designing business processes that span, optimize and synchronize across traditional functional domains.
Tags : 
oracle, logistics, value chain execution, silos
    
Oracle
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
The concept of artificial intelligence (AI) has been with us since the term was coined for the Dartmouth Summer Research Project on Artificial Intelligence in 1956. Today, while general AI strives for full cognitive abilities, there is a narrower scope—this better-defined AI is the domain of machine learning (ML) and other algorithm-driven solutions where cybersecurity has embraced AI. SANS recently conducted a survey of professionals working or active in cybersecurity, and involved with or interested in the use of AI for improving the security posture of their organization. Read their report to learn their survey findings, conclusions, and recommended considerations.
Tags : 
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS
Published By: Melbourne IT     Published Date: Jun 10, 2010
UCVHost has been providing web hosting services to their customers for more than 10 years. Treating their customers well and providing top-notch, reliable services is of utmost importance to UCVHost, so they needed to partner with an e-business and domain registration company that they could trust and that could provide the stable technology they demanded.
Tags : 
ucvhost, melbourne it, hosting, windows, linux, api, website hosting, design
    
Melbourne IT
Published By: ClickSquared     Published Date: Jul 07, 2009
Learn how by achieving a 360-degree view of customer interests, markets can achieve unprecedented levels of: *Personalization, *Timing, *Relevance, *Cost-efficiency, *Accountability
Tags : 
clicksquared, interactive relationship marketing, lifecycle, irm, web 2.0, granular personalization, analytical marketing models, database marketing
    
ClickSquared
Published By: Salesforce.com     Published Date: Apr 26, 2007
This paper summarizes the key ingredients for a successful on-demand implementation. Find out how you can benefit from the knowledge gained by the Salesforce.com Global Services organization, as outlined in the seven domains described in this paper.
Tags : 
salesforce, salesforce crm, crm, customer relationship management, mobile, saas, sales tools, best practices
    
Salesforce.com
Published By: Intel Corp.     Published Date: Aug 08, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
storeonce, extends, edison, group, b6200, storeonce, backup, system
    
Intel Corp.
Published By: Skillbridge Training     Published Date: Sep 20, 2013
What was once considered futuristic science fiction, Cyber warfare is now today’s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front.
Tags : 
    
Skillbridge Training
Published By: Dyn     Published Date: Jan 14, 2015
Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.
Tags : 
dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client
    
Dyn
Published By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : 
samanage, itsm, riverside, itsm solutions, vendors, it management, enterprise applications
    
Samanage
Published By: IBM     Published Date: Apr 18, 2017
Are you looking to add new data domains or solve new business problems? IBM InfoSphere MDM comprises a complete MDM suite with multi-domain MDM capabilities and built-in domain patterns. IBM offers several editions of InfoSphere MDM, each designed to integrate with your existing architectures and business processes. You can choose the platform that best meets your immediate and long-term needs.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
IBM
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom, servers
    
Astrocom
Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management, product development, productivity, qa quality assurance
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Mentor Graphics     Published Date: Apr 25, 2016
Over the years, two major approaches to SERDES simulation have emerged and gained popularity: time-domain (or bit-by-bit) and statistical. Both are used to build the eye diagram and bit-error ratio (BER), and each has its benefits and limitations.
Tags : 
mentor graphics, analysis flow, bit by bit, serdes, ber, gigabit networking, internetworking hardware
    
Mentor Graphics
Published By: Symantec     Published Date: Jan 04, 2012
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive informati
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid these attacks.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jan 04, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.