Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web based

Results 251 - 275 of 324Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs, health records
    
Trend Micro, Inc.
Published By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work, network security, remote access, remote network management
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp, s/mime, policy-based encryption, archiving, virus scanning
    
Webroot UK
Published By: Tsavo Agency     Published Date: Oct 29, 2009
Businesses managers and website owners today need to have some basic Search Engine Optimization (SEO) knowledge whether they work with an internal SEO team or hire an SEO agency to get top Search Engines rankings. Based on years experience optimizing websites for search engines, we have put together a list of the most problematic and common on page SEO issues. Find out if your site is suffering from any of these on page SEO issues.
Tags : 
tsavo, traffic, conversions, seo, search marketing, keywords, rich content, optimizing, cms, traffic
    
Tsavo Agency
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
    
IBM ILOG.
Published By: IBM     Published Date: Oct 22, 2009
Meet LotusLive and B275. See how LotusLive can help your business.
Tags : 
lotuslive, ibm, project meeting, web-based mail
    
IBM
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will provide an overview of a very effective technology called Continuous Data Protection (CDP) also called continuous backup or real-time backup. CDP offers a valuable disk-based technology that enables a business to recover data to any point-in-time quickly and easily.
Tags : 
continuous data protection, cdp, mainline information systems, real-time backup, recover data, data protection, replication, cdp & ha
    
Mainline Information Systems
Published By: White Horse     Published Date: Oct 07, 2009
Learn how to tap powerful real-time brand conversations taking place in social media by investing in the proper tool to aggregate and share the data across your organization. Download this Webinar for a standards-based benchmarking review of the top social media monitoring tools and practical knowledge that will equip you to make a business case for the single best social media investment.
Tags : 
brand marketing, brand research, social media monitoring, crisis management, social marketing, brand management
    
White Horse
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
This webcast presents the IBM® Rational® HarmonyT for Systems Engineering process for the model-based systems development.
Tags : 
model-based systems engineering, ibm, ibm rational harmonyt, model-based systems development, uml and sysml languages, requirements analysis, design synthesis, interface definition
    
IBM
Published By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : 
human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
    
Data Guard Systems
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Web-based software automation is an essential part in managing business processes in today's cellular/wireless retail environment. An effective solution must have the ability to manage all of a company's operations simultaneously with virtually no interaction by an administrator. This document addresses key points that cellular retailers, wholesalers, and master agents need to know.
Tags : 
cellular retailer, business process management, bpm, software automation, data guard, data guard systems
    
Data Guard Systems
Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok
    
Okiok
Published By: Safe Software     Published Date: Aug 21, 2009
Implementing a web-based spatial data distribution can be a challenge, but many organizations are doing it successfully and reaping the benefits.
Tags : 
spatial, collaboration, distribute data, data management, safe, safe software
    
Safe Software
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde, cem, customer experience management, blogs, wikis, user profiles, tagging, feeds, mobile services, lotus, wireless, enterprise applications
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
Practically every CIO office is focused on quickly exploiting opportunities to drive value for the business. Decisions about seamlessly integrated and personalized portal infrastructures with high operational efficiencies are top of mind. Through agile and unique online experiences, portals bring together applications, information sources and people – in the contexts of role and associated business processes – on the Web and across the value chain. Additionally, they increase talent effectiveness and productivity while lowering costs, and they drive value chain agility and customer advocacy.
Tags : 
ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application integration, websphere portal express, soa, linux, wsrp, rest, tco, ajax, system p5, platforms
    
IBM
Published By: Cornerstone OnDemand     Published Date: Aug 01, 2009
Insurance is a highly regulated industry that maintains strict licensing requirements. All Aon employees must be trained on certication and licensing requirements as mandated by government, industry associations and Aon's internal corporate governance. Download now to find out why they chose Cornerstone OnDemand.
Tags : 
cornerstone, aon, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Published By: Numara Software     Published Date: Jul 09, 2009
With Numara FootPrints for Customer Service, an award-winning, 100% web-based customer service management solution, you can deliver breakthrough service to customers throughout the world faster, and enhance the quality of your web-based service desk, with less effort than today, and at a low total cost of ownership. Learn more today!
Tags : 
numara, footprints, service excellence, customer experience, hosting service, call center, it service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing, accounts receivable
    
Numara Software
Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak
Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: ConcertTech     Published Date: Jun 03, 2009
As the third in our series, this paper continues the effort of providing information that enables you to evaluate a deployment company and its Technology Rollout System intelligently so that you can realize the most cost-effective and time-efficient project deployment.
Tags : 
rollout, global technology, deployment, concert technology, project facilitator, project manager, internal resources, job functions, delivery team, program, delivery team, web-based software, applications, warehouse, unified resource, dedicated resource, hybrid, enterprise applications
    
ConcertTech
Published By: Innotas     Published Date: May 12, 2009
Today's business challenges are both epic and unprecedented, which, if not met by quick and decisive actions, can result in catastrophic consequences. Taking control of IT is one of the best ways to take control of your business.
Tags : 
issue management, issues management, it governance, pmo, ppm, professional services automation, program management, program management office, program portfolio management, project arena, project management office, project portfolio management, projectarena, resource management, resource utilization, time and expense, time card, time management, time sheet, time tracking
    
Innotas
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.