Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

system

Results 51 - 75 of 6603Sort Results By: Published Date | Title | Company Name
Published By: Veeam '18     Published Date: Oct 28, 2019
Financial institutions are one of the most regulated by the mega-regulator. Issues of backing up information systems, including data backup and restoration of activities in case of failures and emergencies, are one of the most important for credit and non-credit financial organizations, as well as subjects of the national payment system, the activities of which are regulated and controlled by the Bank of Russia.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 28, 2019
Support for Microsoft Windows Server 2008 R2 will be discontinued soon, and organizations need to prepare for the transition from the old system to new platforms, such as Microsoft Windows Server 2019. This article details how to work with Veeam ® DataLabs and provides information on using Veeam with Microsoft Azure. After reading this article, you will learn about the popular way to use Veeam DataLab. It will help to eliminate obsolete operating systems and to feel confident in the transition to new versions. The main topics of the article: Veeam DataLab working principles; principles of transition to the new version of Windows Server; testing updates.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 28, 2019
The damage caused by ransomware is widely discussed in the media. But this is far from the only danger that threatens the availability of your data. In this webinar, you will learn about the basic concepts of IT system availability and how Veeam® can help you implement these concepts in your company. The following issues will be highlighted: backup rule "3-2-1"; why snapshots are not a backup; how to prevent implicit data corruption.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 28, 2019
Financial institutions are one of the most regulated by the mega-regulator. Issues of backing up information systems, including data backup and restoration of activities in case of failures and emergencies, are one of the most important for credit and non-credit financial organizations, as well as subjects of the national payment system, the activities of which are regulated and controlled by the Bank of Russia.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 28, 2019
Support for Microsoft Windows Server 2008 R2 will be discontinued soon, and organizations need to prepare for the transition from the old system to new platforms, such as Microsoft Windows Server 2019. This article details how to work with Veeam ® DataLabs and provides information on using Veeam with Microsoft Azure. After reading this article, you will learn about the popular way to use Veeam DataLab. It will help to eliminate obsolete operating systems and to feel confident in the transition to new versions. The main topics of the article: Veeam DataLab working principles; principles of transition to the new version of Windows Server; testing updates.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Oct 28, 2019
The damage caused by ransomware is widely discussed in the media. But this is far from the only danger that threatens the availability of your data. In this webinar, you will learn about the basic concepts of IT system availability and how Veeam® can help you implement these concepts in your company. The following issues will be highlighted: backup rule "3-2-1"; why snapshots are not a backup; how to prevent implicit data corruption.
Tags : 
    
Veeam '18
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability of your file transfer operations in order to deliver exceptional customer experiences. You’ll learn why it’s critical to: • Make data visible where it is in the network • Reduce or eliminate ad hoc use of FTP • Build scalability into your file transfer system • Monitor data transfers from beginning to end
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
    
Group M_IBM Q4'19
Published By: Alert Logic     Published Date: Oct 25, 2019
Container adoption continues to grow as organizations look to transition from virtual machines to microservices-based architectures, known for their increased efficiency, portability, and scalability. But while containers afford an additional layer of security through their ability to isolate applications, a containerized environment is still susceptible to malicious attacks between containers or the within the shared resources of the underlying host. Download this eBook to learn how you can develop a stronger security strategy for your AWS container deployments, from start to finish. Key takeaways include: • Planning for maximum portability • Setting permissions for users and system resources • Creating an action plan based on log monitoring and IDS data
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: Oct 25, 2019
In today’s threat landscape, attackers use a wide range of sophisticated methods to infiltrate vulnerable systems. The key to minimizing the impact of an attack is to detect threats early, effectively and over a long period of time. In any threat detection effort, organizations must focus on visibility, assessment of risk, and potential impact to the business. Download 5 Top Recommendations for Effective Threat Detection to learn how to improve the effectiveness of your threat detection program in cloud and hybrid environments.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: Oct 25, 2019
As the variety and sophistication of exploits continues to grow, even large, mature Fortune 100 security teams feel unprotected. How well are your security systems and tools doing blocking threats from the most sophisticated cybercriminals? Download this resource to learn about a threat management approach designed to address today’s evolving cybersecurity threats, expanding compliance risks, and all-too-common resource constraints.
Tags : 
    
Alert Logic
Published By: ServiceNow     Published Date: Oct 23, 2019
IT faces the challenge of consolidating, maintaining, and understanding complex configuration data and often this data is found in many different repositories. But there’s a better way to solve these challenges. The configuration management database (CMDB) consolidates disparate IT management systems into a single system of action. This ipaper provides you with the fundamentals to help ensure your configuration data management project with CMDB is a success.
Tags : 
servicenow, it management, data management
    
ServiceNow
Published By: HERE Technologies     Published Date: Oct 23, 2019
Vehicles aren’t making full use of map data – yet, these maps can help keep cars safe in a number of ways – even as they fulfill their primary role of efficiently getting vehicles from A to B. VSI Labs recently performed a series of real-world tests to integrate HERE HD Live Map into a variety of ADAS applications. The objective was to increase the safety of ADAS by improving the functional performance of the vehicle. In this whitepaper, discover how HERE HD Live Map: • Enabled map-enhanced adaptive cruise control (ACC), which had an advantage over regular ACC systems in areas like highway exits and school zones • Enabled map-based lane keeping that operated properly in many complicated situations where computer vision-only systems constantly failed • Enabled successful map-based lane changing in cases like lane merging, faded markings and inclement weather, where a computer vision-based system had difficulties detecting lanes • Helped to increased driver comfort during a 2,000+ mile
Tags : 
    
HERE Technologies
Published By: Workday     Published Date: Oct 22, 2019
Six Steps to Smarter Accounting.Smarter accounting is just six easy steps away. This Getting the Basics Right Guide offers actionable ways for midsize organizations to spend less time reconciling financial data from disparate systems and more time making strategic, data-driven decisions.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 22, 2019
More and more organizations of all sizes are realizing the benefits of cloud ERP. Read the whitepaper to learn more about making the switch from on-premise systems and choosing the right technology partner.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 22, 2019
Bringing HR and Payroll together in a single system can not only help you streamline your hire-to-pay process but also boost efficiency and agility across the organization. Read now to learn how one source for all your people data can help HR and Payroll become stronger partners to the business.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 22, 2019
Data Driven One system for HR can help you boost employee engagement, analyze data more easily, and monitor and ensure diversity. How does it work? It’s all in the data. Read this report to learn today’s HR trends and how you can use data to improve every aspect of the employee experience.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 22, 2019
Explore the hidden costs of workforce management inherent in maintaining cumbersome manual solutions, like spreadsheets, and cobbling together HR point solutions. Discover the real value of investing in a single powerful HCM system as part of your organization’s long-term growth strategy.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 22, 2019
Looking for an agile and scalable HCM system that can help lead your organization today and into the future? Get analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of the report.
Tags : 
    
Workday
Published By: ASME     Published Date: Oct 22, 2019
Historically, businesses and organizations have been using 3D printing in one centralized lab such as a rapid prototyping (RP) shop or manufacturing lab. As 3D printing has become more affordable and easier to use, office-friendly 3D printers are now appearing within arm’s reach of designers and engineers. Distributed 3D printing – or point-of-use 3D printing – refers to placing (or distributing) 3D printing systems and post-processing equipment throughout the organization in the spaces where designers and engineers are doing most of their work. Having 3D printers close at hand allows for real-time design testing, adjusting and iteration that’s often desired in the early stages of the design cycle. This e-Book explores: When to use distributed 3D printing 4 questions to consider How to choose a 3D printer
Tags : 
    
ASME
Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
Are you blindly relying on manually-entered data from your systems and waiting for the recovery audit to claw back duplicates and overspend? Now with AI, you can discover rather than recover. Review every invoice and expense for risk before you pay without delaying supplier payments or employee reimbursements.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
Airbus is a leading aerospace and defense company that uses AppZen to audit every dollar of spend. Hear why Airbus finance leaders Richard Masci, Head of Financial System Services for Airbus Americas, and Waqas Aman, Financial Systems & Compliance Manager for Airbus Americas, depend on AppZen.
Tags : 
    
AppZen
Published By: NICE inContact     Published Date: Oct 21, 2019
NICE inContact has been recognized as a Leader in the new Gartner report:Magic Quadrant for Contact Center as a Service, North Americafor the fifth consecutive year. NICE inContact achieved the highest and furthest overall position for its ability to execute and completeness of vision. There has never been a better time to modernize to a cloud contact center. Make a smart buying decision with new, independent analysis of leading cloud contact center providers, including NICE inContact.The 2019 Gartner Magic Quadrant Report for CCaaS includes a rigorous, independent evaluation of all the leading cloud providers to help you select the right tech partner for your contact center. Download your complimentary copy of the report that includes: • Gartner’s independent evaluation of the Contact Center as a Service market • Why NICE inContact continues to be named a Leader • Vendor strengths and cautions to aid in your buying process NICE inContact has been recognized as a Visionary with the furthest overall placement for Completeness of Vision in 2019 Gartner Magic Quadrant for Contact Center as a Service, Western Europe. The Gartner report states, “A single contact center application supporting all channels offers better support for familiar tools applied across all interaction-handling scenarios, and the ability to leverage a cloud application ecosystem to build out more customer-centric capabilities.”
Tags : 
    
NICE inContact
Published By: Jamf     Published Date: Oct 18, 2019
As Apple device numbers rise in business and education environments around the globe, it’s imperative that technology investments are maximized so that organizations can leverage iPad to its full potential. iPadOS is a new operating system that is poised to help IT teams better manage the influx of new devices.
Tags : 
    
Jamf
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.