Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

evident

Results 26 - 40 of 40Sort Results By: Published Date | Title | Company Name
Published By: MoreVisibility     Published Date: Jan 18, 2010
The potential rise in usage and value of mobile search has been evident to Search Marketers for several years now, with the question always hanging in the balance - When will technology and usage reach its tipping point? The answer is fast becoming: Soon.
Tags : 
mobile search, more visibility, search marketers, b2b, b2c, applications, seo, google
    
MoreVisibility
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IDC strongly believes that the days of homogenous compute, in which a single architecture dominates all compute in the datacenter, are over. This truth has become increasingly evident as more and more businesses have started to launch artificial intelligence (AI) initiatives. Many of them are in an experimental stage with AI and a few have reached production readiness, but all of them are cycling unusually fast through infrastructure options to run their newly developed AI applications and services on.
Tags : 
    
Group M_IBM Q2'19
Published By: Symantec     Published Date: Nov 30, 2015
El año pasado, un 7% de los españoles1 realizaron sus compras navideñas por Internet, así que es evidente que los vendedores tienen que poner a punto la maquinaria del comercio electrónico. Entre las compras en línea, la opción de reserva por Internet y recogida en tienda y las cartas a los Reyes, estas navidades se disparará el volumen de datos y de ventas. Así que tendrá que garantizar la seguridad de los clientes que visitan su sitio web si no quiere recibir carbón
Tags : 
    
Symantec
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq
    
NetIQ Corporation
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Viewpointe     Published Date: Apr 15, 2008
As check electronification progresses, image exchange capability is becoming a business imperative for financial institutions of all sizes to remain competitive. It is evident that this is the direction in which the industry is moving.
Tags : 
viewpointe, lotus, lotus pr, finance, financial institution, banking, bank, check
    
Viewpointe
Published By: Hallam     Published Date: Feb 28, 2011
The benefits of an effective International SEO campaign are self evident: Increasing visibility in the search engines results in more traffic to your website, which leads to more qualified visitors making enquiries or sales o
Tags : 
seo, international seo, search engine optimisation, global seo, internet marketing
    
Hallam
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. They are atomic. Experts use them like building blocks to derive everything else that is worth knowing in the problem domain. In this paper, I propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
Tags : 
palo alto, network defenders, security practitioners, security
    
Palo Alto Networks
Published By: HP Inc.     Published Date: Dec 21, 2018
Durante mucho tiempo, las estaciones de trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.
Published By: Cisco EMEA     Published Date: May 15, 2018
E se i responsabili della sicurezza potessero prevedere il futuro? Se sapessero che un attacco è imminente, potrebbero bloccarlo o almeno mitigarne l’impatto e si adopererebbero per mettere in sicurezza le risorse che più necessitano protezione. In effetti gli addetti alla sicurezza sono in grado di vedere cosa si profila all’orizzonte: gli indizi sono molti (ed evidenti).
Tags : 
    
Cisco EMEA
Published By: Pros, Inc     Published Date: Apr 24, 2019
The world of selling is evolving, and the advent of digital platforms has changed the way in which buyers interact with sellers. Sales teams are struggling to sell in this fast and competitive environment and this is evident by the fact that the number of sales people that hit their quota has dropped over time. As a sales leader, it’s time to rethink your sales strategy. In this webinar, we’ll discuss sales strategies and practical insights you can implement to develop sales teams which can outperform in any dynamic market environment. We’ll walk through sales enablement practices and coaching tactics which will help to optimize your sales methodologies. We’ll also discuss sales tools with great ROI which can help increase your sales productivity and accelerate your sales velocity. During this segment, we’ll specifically focus on quote-to-cash technologies and discuss the rising importance of AI-based pricing optimization to streamline and accelerate your sales process.
Tags : 
    
Pros, Inc
Previous    1 2     Next   
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.