Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

post it

Results 51 - 75 of 252Sort Results By: Published Date | Title | Company Name
Published By: Alert Logic     Published Date: May 23, 2019
Organizations continue to adopt cloud computing at a rapid pace to benefit from increased efficiency, better scalability, and faster deployments. As more workloads are shifting to the cloud, cybersecurity professionals remain concerned about security of data, systems, and services in the cloud. To cope with new security challenges, security teams are forced to reassess their security posture and strategies as traditional security tools are often not suited for the challenges of dynamic, virtual and distributed cloud environments. This technology challenge is only exacerbated by the dramatic shortage of skilled cybersecurity professionals.
Tags : 
    
Alert Logic
Published By: RES Software     Published Date: Apr 08, 2013
Afin de répondre aux demandes de nouvelles fonctionnalités, d’économies et d’amélioration de la qualité (d’intégrité et de performance, par exemple), les infrastructures des postes de travail sont en constante évolution. Aujourd’hui, de tels changements ont une incidence quasi systématique sur les conditions d’utilisation des postes. Ce livre blanc décrit les concepts de transformation des postes et comment la technologie de transformation des postes de travail peut aider les entreprises à réussir leur transition vers des espaces de travail utilisateur administrés sans préjudice pour la productivité de l’utilisateur.
Tags : 
    
RES Software
Published By: Payscale, Inc     Published Date: Apr 04, 2018
What someone is paid has an enormous impact on his or her life, and can carry all kinds of implicit meanings. It can be the difference between Angela in marketing having the funds to allow her kids to join a second sport, and having to tell them not this year. It can be John the product manager having the vacation days to finally take that international trip, or having to postpone it for another day. It can mean Ashton feeling valued by her employer, or feeling like she should look elsewhere.
Tags : 
    
Payscale, Inc
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
    
Skillsoft
Published By: IBM     Published Date: Jun 07, 2016
In a multi-database world, startups and enterprises are embracing a wide variety of tools to build sophisticated and scalable applications. IBM Compose Enterprise delivers a fully managed cloud data platform so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, database, ibm compose enterprise, networking
    
IBM
Published By: IBM     Published Date: Jan 18, 2017
IBM Compose Enterprise delivers a fully managed cloud data platform on the public cloud of your choice - including IBM SoftLayer or Amazon Web Services (AWS) - so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, aps data, database, cloud db toolkit, enterprise applications
    
IBM
Published By: CDW     Published Date: Nov 13, 2012
From the beginning, CDW's security assessment team has specialized in providing truly comprehensive security assessments.
Tags : 
cdw, security assesment, boilerplate, security posture, avenues of attack, security exploits
    
CDW
Published By: T Systems     Published Date: Oct 05, 2018
Fortunately, the wait is over. Here at T-Systems, we have created a whitepaper that contains Gartner’s 2018 Strategic Roadmap for Networking report which provides you with a wealth of information and guidance. Not only does it offer impartial advice from a technological perspective but it also interweaves the equally important, but often neglected viewpoints from a skills, processes and cultural stance. We feel confident that you’ll agree that armed with this whitepaper and Gartner’s report which successfully combine highly relevant insights with precision accuracy - you will be able to lay a solid foundation for your own networking pathway. Being able to correctly identify where your current networking solutions are presently and compare these with what you need to develop these into; to realize your goal - is one area of many, where we feel Gartner’s report excels. So whether it is their gap analysis, identification of key trends, signposting of the pitfalls that even the most con
Tags : 
    
T Systems
Published By: Data Stax     Published Date: Apr 27, 2012
This paper examines key data management challenges facing modern businesses and explains how DataStax Enterprise provides the first post-relational database solution to handle real-time, analytic, and search data without using RDBMS solutions.
Tags : 
datastax, data stax, data management, database management, database, enterprise, search data, rdbms, post-relational, enterprise applications
    
Data Stax
Published By: Workday     Published Date: Feb 01, 2019
In today’s IT landscape, many organizations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions • If your company is ready to make the switch to SaaS From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday Italy     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 19, 2018
In today’s IT landscape, many organisations have adopted a cloud-first approach to business systems. Yet with so many vendors offering SaaS solutions, how do you know which vendor will enable you to achieve the true benefits SaaS has to offer? What are the characteristics to look for when considering a SaaS solution, and what are the real impacts on modern businesses? In this complimentary whitepaper, you will learn: • What real SaaS is and is not. • How to distinguish between real SaaS vendors and imposters. • The question of SaaS security. • Potential cost savings your company could gain from SaaS solutions. • If your company is ready to make the switch to SaaS. From IT professionals to anyone just looking to get a basic understanding of SaaS, this paper helps make sense of it all.
Tags : 
    
Workday Spain
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
    
Determine (Selectica)
Published By: IBM     Published Date: Oct 18, 2016
The worldwide growth rate of digital data is staggering. If you're a CIO or a data center administrator, data growth statistics aren't just big numbers, they are a big problem -- for your company. Email messages, social media and blog posts, text and instant messages, photos, video and audio, machine-generated data, and transactional detail are on track to overwhelm your storage capacity. Read this paper for practical advice and smarter solutions for managing the information in your organization and getting back to a position of mastery over your data. Get this valuable resource now.
Tags : 
ibm, analytics, big data, information governance, ecm, information lifecycle governance, enterprise applications, data center
    
IBM
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: IBM     Published Date: Oct 09, 2009
In down economies, many organizations make short-term decisions like cutting costs and postponing projects. But the real opportunity lies in optimizing costs. This eBook describes how applying the IBM Smart SOATM approach can drive down operational costs through connectivity and reuse, while enhancing flexibility and productivity.
Tags : 
service oriented architecture, ibm, operational costs, productivity, business process management, bpm, smart soa, cost cutting strategies
    
IBM
Published By: Adobe     Published Date: Nov 02, 2018
Every day, demanding customers, unforeseen competition, and disruptive new technologies hammer home that we have entered the age of the customer, where established business operations no longer work. Yet, most marketing functions still rely on decades-old methods that undermine their ability to create post-digital brand experiences and help their firms become customer-focused. Smart CMOs recognize that it is time to pivot their marketing function around the customer, rather than transactions, sales, their brand, or day-to-day operations. In March 2018, Adobe commissioned Forrester Consulting to evaluate the link between email innovation and customer obsession. To explore this topic, Forrester conducted an online survey with 256 US consumers who use personal email and 260 marketing technology and strategy decision makers at US companies with 500 or more employees. We found that email marketing can provide a way to launch customer-obsessed marketing at organizations. In fact, companies t
Tags : 
    
Adobe
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: MarkLogic     Published Date: Mar 17, 2015
You’ve probably heard about NoSQL, and you may wonder what it is. NoSQL represents a fundamental change in the way people think about storing and accessing data, especially now that most of the information generated is unstructured or semi-structured data — something for which existing database systems such as Oracle, MySQL, SQLServer, and Postgres aren’t well suited. NoSQL means a release from the constraints imposed on database management systems by the relational database model. This free eBook, Enterprise NoSQL for Dummies, MarkLogic Special Edition, provides an overview of NoSQL. You’ll start to understand what it is, what it isn’t, when you should consider using a NoSQL database instead of a relational database management system and when you may want to use both. In addition, this book introduces enterprise NoSQL and shows how it differs from other NoSQL systems, as well as explains when NoSQL may not be the right solution for your data storage problem. You’ll also learn the NoSQ
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications
    
MarkLogic
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Work4™     Published Date: Feb 27, 2013
The essence of great recruiting is to fish where the fish are. As times change, the "recruiting waters" get overfished. This is what makes the profession so highly flexible. Over the course of a decade, the success of one technique creates the demand for the next.
Tags : 
facebook recruiting, facebook recruitment, social recruiting, employer branding, social media recruitment, recruiting on facebook, how to post a job on facebook, how to recruit on facebook, facebook job page, recruiting through social media, social media for recruiters, social recruiting strategies, facebook recruiting app, facebook recruiting application, facebook recruiting apps, facebook recruiting solution, facebook recruiting tool
    
Work4™
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
    
AWS - ROI DNA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.