Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

explicit

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: DellEMC and Intel     Published Date: Sep 26, 2017
Innovators are adopting an all flash/flash first stance for their primary storage and workloads, while almost a quarter of Laggards don’t even have an explicit flash strategy. Read this white paper from Intel® about unlocking innovations that Shape Society. Learn more about Dell EMC enterprise solutions in collaboration with Intel®.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel
Published By: Google     Published Date: Sep 27, 2017
Download the whitepaper for a look under the hood of Google’s infrastructure security, and explicit detail on the process we go through to build and maintain GCP regions. Download the report and find out more now.
Tags : 
cloud, data, infrastructure, lifecycle
    
Google
Published By: Juniper Networks     Published Date: Oct 02, 2018
Without specific and explicit design decisions about not only the network architecture but also network operations,enterprises risk drifting toward a future of many clouds, each with their own operational nuances. Those who are not mindful about managing new additions increase the complexity of their network with each variation. This white paper discusses how to approach the design of the network and operations in the move from cloud to multicloud. The focus is on meeting the business needs of today and tomorrow, battling complexity, preserving the possibilities for options, and supporting IT’s role as the steward of technology decisions for the business.
Tags : 
    
Juniper Networks
Published By: Progress     Published Date: Jan 22, 2019
While A/B testing has been around for years, many marketers haven’t tapped into the full potential of experimentation. Controlled experimentation removes assumptions and guesswork by truly measuring the impact of explicit changes. This empowers brands to conduct true data-driven marketing that is tailored specifically to their target audience.
Tags : 
    
Progress
Published By: SDL Web Content Management Solutions     Published Date: Sep 01, 2010
Recent evolution in the mobile applications market now offers enterprises new opportunities for reaching customers in ways never before possible. In the past 18 months, a number of independent market forces have converged to enable goods-and-services providers to market to specific customers, at specific times, at specific locations. Importantly, such targeted messaging draws on a richer-than-ever set of consumer information, including not only detailed demographics from implicit (inferred) and explicit (user-provided) profiles, but also real-time, location-based data.
Tags : 
sdl, web content management, magic quadrant, wcm, content, web, mobile marketing, strategy, analytics
    
SDL Web Content Management Solutions
Published By: Oracle Corporation     Published Date: May 11, 2012
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision, analytics, functional, flow, manage, customers, enterprise applications
    
Oracle Corporation
Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM
Published By: iCims     Published Date: Sep 04, 2013
Contingent workers are those who do not have an implicit or explicit contract for ongoing employment. According to the Bureau of Labor Statistics, contingent labor accounts for over 26% of the US labor force and expects continual growth beyond 2020. Contingent workers provide a variety of benefits to an organization: Easily add headcount to projects that need temporary assistance, have many workers with specific skills at your disposal.
Tags : 
best practices for hiring, onboarding, contigent workforce, icims, talent platform, capture talent, build relationships with candidates, human resource technology
    
iCims
Published By: Oracle Corporation     Published Date: Mar 03, 2011
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
customer attention, decision management, performance goals., real time management, oracle
    
Oracle Corporation
Published By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : 
abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: ITI     Published Date: Aug 21, 2009
The dynamic interaction between these parts is simulated using ABAQUS/Explicit. With the model, it is possible to predict the kinematics of the impact mechanism, including torque spike characteristics and driving speed. Key characteristics of the model have been validated by tests.
Tags : 
abaqus, explicit, impact driver, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
To support a business technology agenda, infrastructure and operations (I&O) professionals must factor critical aspects of their own environments into their decisions and understand how these requirements affect implicit and explicit weighting as they evaluate hyperconverged infrastructure (HCI) offerings. This report covers the major variations in workloads and data services that can make an impact on your selection and outlines a methodology for evaluating the true cost of these solutions.
Tags : 
    
Hewlett Packard Enterprise
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.