Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rules

Results 176 - 200 of 277Sort Results By: Published Date | Title | Company Name
Published By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : 
mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
    
Mentor Graphics
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules, shared device reputation
    
Iovation
Published By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : 
webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords, analysis, traffic
    
Webmarketing123
Published By: Oracle Corporation     Published Date: Mar 03, 2011
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : 
customer attention, decision management, performance goals., real time management, oracle
    
Oracle Corporation
Published By: IBM     Published Date: Nov 09, 2011
Learn how Unica provides a MAP with a high level of customizable business rules and processes!
Tags : 
marketing, map, marketing automation, sirius assesments, unica
    
IBM
Published By: HP     Published Date: Jan 19, 2012
Our networks are under great strain today - more data, video, audio, new applications, mobility, virtualization and so much more. In this program, leading experts from Gartner and HP address your most pressing questions and concerns, including what challenges are weighing most on the public sector?
Tags : 
technology, networking, puiblic sector organizations, solutions
    
HP
Published By: Port25 Solutions     Published Date: Mar 09, 2012
One advanced new feature is the ability to extend to allow setting priorities to each recipient in the email queue. We call this feature Queue Prioriztion. It now has the ability in PowerMTAT to set the priority of a recipient of set of recipients.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management
    
Port25 Solutions
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: Litmos     Published Date: Apr 23, 2015
Download this list of the 10 Rules of Retail Sales training to learn how to optimize employee performance and improve your customers' experience.
Tags : 
retail sales training, merchandising campaigns, customer satisfaction, merchandise displays, mobile devices, litmos
    
Litmos
Published By: Citrix Online     Published Date: Aug 31, 2010
In this brief white paper we will describe the economic "reset" that is changing the rules for creating value.
Tags : 
citrix online marketing, distributed workforce, mobile work
    
Citrix Online
Published By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : 
tripwire, hipaa, security, provision, network, health, company, system, internal, security, risk, examination, federal, regulation, lawyer, data, control, administration, compliance, healthcare
    
Tripwire
Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual
    
Dell
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Bring Your Own Device has changed the rules for corporate security on smartphones and tablets. Companies need to find the right balance in securing devices and data without sacrificing the intuitive native experience that has made business move from typing to swiping.
Tags : 
ibm, fiberlink, maas360, mobile, data security, mobile device management, networking, security, wireless
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jun 30, 2016
Learn how to protect corporate data when users use personal devices for work
Tags : 
ibm, bring your own device, byod, mobile, security
    
IBM MaaS360
Published By: IBM     Published Date: Apr 09, 2015
Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.
Tags : 
ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security
    
IBM
Published By: IBM     Published Date: May 25, 2016
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization by helping to: - Enable faster and more agile change so your business can react more quickly to opportunities and threats - Automatically capture knowledge so it can be reused to make better business decisions - Manage compliance better by providing a clear record of the rules that govern business operations - Make operational decisions more predictable and repeatable while also allowing you to model, measure, collaborate on and refine these decisions as your business needs change - Improve customer service with more consistent and accurate rules-based decisions, as well as by personalizing the user experience
Tags : 
ibm, odm, operational decision management, odm, middleware, connect, enterprise applications
    
IBM
Published By: IBM     Published Date: Sep 21, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : 
ibm, healthcare, implementation, hippa, rules
    
IBM
Published By: IBM     Published Date: Nov 04, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : 
ibm, commerce, b2b, b2b integration, hipaa, hipaa rules, request for interpretation, hipaa implementation guides, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance, enterprise applications
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
ODM is the evolution of business rules management. It provides a complete, easy-to-use system for automating day-today operational decisions and allows businesspeople and IT to collaborate on business rules by using an interface and a language that are comfortable and intuitive for both. ODM not only allows you to automate your business rules, but also it enables you to apply insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. It ensures that you’re making the right decisions at the right time, when it can make a difference. What can this mean for your business? Adopting operational decision management can: • Improve customer centricity (acquisition and retention) by engaging individuals at the right time with the right offers
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.