Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

esi

Results 326 - 350 of 3182Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 30, 2015
Responsive web design is an integral part of customer engagement in our multi-device world. But the additional costs and resources can be hard to justify for budget holders demanding proof of ROI.
Tags : 
adobe, application development, delivery, roi, digital investments, responsive web design
    
Adobe
Published By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : 
anaplan, architecture, security, controls, geographically, regional, global
    
Anaplan
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Entelo     Published Date: Sep 06, 2017
Today’s most successful organizations are thoughtfully assembled by highly empowered talent teams. These talents teams – driven by data, designed for engagement, and led by a breed of globally diverse leaders – are not the same talent teams of years past. They hold a place at the executive table and are critical to accomplishing key company business objectives. They represent the new generation of talent acquisition.
Tags : 
    
Entelo
Published By: IBM     Published Date: Sep 27, 2013
While more and more enterprises are using analytics to guide their decision-making processes, most midsize businesses continue to rely on old-fashioned decision-making techniques like trial and error. The reason for this is simple: advanced analytics solutions can be very complex and expensive to implement, leading midmarket businesses to assume that the benefits of analytics are beyond their reach. IBM has created a new analytics solution that is designed specifically with the needs of midmarket businesses in mind. The solution, IBM Analytic Answers, gives midmarket businesses the opportunity to take advantage of a sophisticated analytics platform, backed by IBM expertise, while also staying within their budgets.
Tags : 
frost & sullivan, ibm, ibm analytics, ibm analytic answers, business analytics, midsize business, analytics solution, advanced analytics
    
IBM
Published By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : 
foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
    
NAVEX Global
Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Sep 05, 2014
As enterprises have embraced IT trends like cloud computing and virtualization, their operational needs have evolved to make application performance more important than ever before. But operating applications at peak performance is challenging in the cloud. That's why many enterprise IT departments now have Applications Operations groups tasked with ensuring that applications run efficiently across these complex IT stacks. But, most tools designed to address these application performance management (APM) issues were never designed for this dynamic environment. To achieve smooth delivery of applications at all times, Applications Operations groups need APM solutions that can give them insight and analytics to manage their apps. This SlashGuide gives IT managers a scorecard to identify APM solutions that will deliver more efficient application performance.
Tags : 
apm, applications, operations, enterprise, stacks, dynamic
    
Riverbed
Published By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : 
microstategy, apple, dashboards, ipad
    
MicroStrategy
Published By: Cytiva, Inc.     Published Date: Aug 30, 2010
This document is designed to give you a high level overview of the kind of information security practices you should expect from any applicant tracking vendor you evaluate or use.
Tags : 
data protection, security, applicant tracking, cytiva
    
Cytiva, Inc.
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : 
oracle, bea, weblogic applications, weblogic deployments, optimized architecture, networking, platforms, network architecture
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 has designed and painstakingly tested a comprehensive Application Ready Network infrastructure for PeopleSoft Enterprise applications, ensuring your organization achieves maximum ROI with the minimum amount of work. F5 provides all of the tools to help organizations optimize, secure, and deliver PeopleSoft Enterprise applications across the LAN and WAN.
Tags : 
application ready network guide, application server, maximum availability architecture, internet-enabled enterprise software, application delivery networking, peoplesoft enterprise applications, peoplesoft, networking
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
F5's Application Ready Solution Templates are designed to ensure that the savings realized through consolidation are protected by reducing the time, effort, and application-specific knowledge required of administrators to optimally deploy applications that are secure, fast, and available through the use of BIG-IP devices.
Tags : 
application, solution, template, design, device, administrator, knowledge, ease
    
F5 Networks Inc
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, enterprise applications, data center
    
VMTurbo
Published By: Dell Storage     Published Date: Apr 17, 2012
Fluid Data solutions are designed to optimize your storage by putting the right data in the right place at the right time for the right cost. Read now to learn more.
Tags : 
storage, nas, object storage, tco, dell, long term archive, strategy, cost of ownership
    
Dell Storage
Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency
    
Siemens
Published By: Siemens     Published Date: Jun 02, 2016
Researchers of occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns.
Tags : 
siemens, arc defense, fault-resistant, medium voltage
    
Siemens
Published By: Datastax     Published Date: Apr 04, 2017
An an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet the company's business goals. Read this comprehensive guide to learn how all the key areas of database design, creation, security, object management, backup/recovery, monitoring and tuning, data migrations, and more - are carried out in a NoSQL database.
Tags : 
architect, guide, nosql, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Intel     Published Date: Jan 06, 2014
This paper describes a step-by-step approach to designing such a system and presents an iterative methodology that applies at both the component level and the system level.
Tags : 
intel, hpc, high performance computing, storage, high performance storage, storage management, architecture, infrastructure
    
Intel
Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.
Tags : 
wan, connectivity, wide area network, data, sd-wan, infrastructure, network architecture, network management
    
Silver Peak
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper introduces the requirements for an XML infrastructure that is designed to ensure the opportunities and benefits of SOAs and Web Services can be realized.
Tags : 
soa, web services, xml, infrastructure, service oriented architecture, service-oriented architecture, xml infrastructure, reactivity
    
Reactivity
Published By: NetApp     Published Date: Sep 25, 2017
Evaluate the four key design choices you need to consider when choosing your all-flash storage architecture. This report compares the design choices made by NetApp SolidFire and EMC XtremIO so you're better equipped to decide which product is best for your next-generation data center.
Tags : 
    
NetApp
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.