asp

Results 376 - 400 of 540Sort Results By: Published Date | Title | Company Name
Published By: Taleo     Published Date: Jan 25, 2012
Each area of payback overlaps as talent mobility is not a stand-alone practice. Internal talent redeployment connects with many aspects of overall talent management, especially talent acquisition and succession management. Understanding and quantifying the returns from talent mobility should be framed in that overall context.
Tags : 
taleo, human resources, talent management, employee management, talent development
    
Taleo
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : 
technology innovation, technology, technology for education, byod, education
    
Kaspersky Lab Australia and New Zealand
Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros, vmware, infrastructure, blue lane, bluelane
    
Blue Lane
Published By: Oracle     Published Date: Aug 01, 2018
I sistemi di backup tradizionali non sono in grado di rispondere alle esigenze delle organizzazioni moderne perché si concentrano sul backup e non sul ripristino. Trattano i database come file generici da copiare anziché carichi di lavoro transazionali con requisiti specifici di integrità dei dati, coerenza, prestazioni e disponibilità. Inoltre, i settori altamente regolati, come i servizi finanziari, sono soggetti a obblighi normativi sempre crescenti che richiedono una protezione rigorosa dalle violazioni dei dati, la perdita di dati, il malware, il ramsomware e altri rischi. Questi rischi richiedono un recupero dati fiduciario per eliminare l’esposizione della perdita di dati garantendone integrità e conformità. Questo libro spiega le sfide per la protezione dei moderni database e il recovery (Capitolo 1), gli aspetti importanti di una soluzione di protezione e del ripristino dei database (Capitolo 2), le soluzioni di protezione e recupero dei database di Oracle (Capitolo 3), e le r
Tags : 
    
Oracle
Published By: Pure Storage     Published Date: Jan 12, 2016
Pure Storage provides meaningful advantage—by radically simplifying every aspect of healthcare storage. Learn how by downloading the full data sheet.
Tags : 
healthcare, electronic health records, ehr, pure storage, healthcare storage, patient data
    
Pure Storage
Published By: Aspect Software     Published Date: Feb 07, 2014
Learn the importance of having all your contact options on one platform and see how having the contact center at the core of the customer experience will allow for customers to interact with your organization with minimal effort.
Tags : 
aspect software, contact center, customer experience, customer service, sms
    
Aspect Software
Published By: ServiceNow     Published Date: Jan 03, 2017
Learning ITIL is not easy. If memorizing ITIL terminology has made you either: Comatose Caffeine addicted Repeatedly Google the term “coping strategies” … Then clearly, you have not read our ITIL eBook series. This series will help you learn ITIL in a way that is actually (gasp!) fun. You’ll learn all about the five stages of ITIL and get: A deeper understanding of what ITIL is and why it’s so important to keep everything running at work Translations of ITIL terms (the digestible kind) to put you on the path to get ITIL certified Useful diagrams and processes to facilitate the smooth and efficient delivery of IT services What are you waiting for? Dive in!
Tags : 
    
ServiceNow
Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security, company security
    
Kaspersky
Published By: Pure Storage     Published Date: Jul 03, 2019
Advances in deep neural networks have ignited a new wave of algorithms and tools for data scientists to analyze and action data using artificial intelligence (AI). Financial services companies can greatly benefit from this leap forward in technology that enables unique insights into all aspects of the industry. With improved algorithms, larger data sets, and frameworks such as TensorFlow, data scientists now have the ability to tackle complex problems and find credible and profitable solutions.
Tags : 
    
Pure Storage
Published By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : 
firearms collection software, firearms inventory software, firearms management system, firearms tracking software
    
Epicor
Published By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : 
whitelisting, security, application control, cyber attacks, blacklist
    
Bit9
Published By: IBM     Published Date: Feb 04, 2014
As new technology and connected consumers redefine how business is done, IBM Smarter Commerce solutions help companies more effectively engage with customers across four critical aspects, which include the Buy, Market, Sell and Service components. This ebook outlines those areas and solutions for each.
Tags : 
ibm, smarter commerce, buy process, buy solutions, redefining marketing, connected consumers, market solutions, sales success, smarter consumers, service solutions, smarter market, value chain strategy, sell and service, complicating efforts, customer interaction
    
IBM
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
    
Google Chrome Enterprise
Published By: Oracle     Published Date: Mar 08, 2016
While retailers scramble to manage the impact of omnichannel on their operations, the way they communicate with customers, and the methods they use to promote their products and reward loyal shoppers, many have neglected to consider what will likely be the most profound change of all: the overall impact of omnichannel data transparency. Omnichannel is destined to transform every aspect of the retail industry, including the store—its design and layout, the inclusion of mobile pointof- sale and clienteling systems, the impact of transparent inventory and what that means for fulfillment, a single view of the customer and its implications for loyalty programs, and even the physical location of stores. Retailers must stay ahead of the omnichannel curve if they expect to remain competitive in the race for customers in a commerce anywhere world, and that contest begins at the brick-and-mortar store.
Tags : 
    
Oracle
Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security, data protection
    
Kaspersky
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
Abbiamo individuato tre diversi tipi di dipendenti che rappresentano la forza lavoro moderna. Ciascun tipo ha esigenze specifiche in termini di hardware. In un contesto in cui il lavoro da remoto sta diventando un aspetto quotidiano del business moderno, il rischio che dati critici vengano compromessi aumenta notevolmente. La perdita dei dati può essere paralizzante, determinando perdita di opportunità di business, danneggiamento della reputazione e anche sanzioni punitive. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
risparmia, tempo, denaro, dell
    
Dell PC Lifecycle
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Abbiamo individuato tre diversi tipi di dipendenti che rappresentano la forza lavoro moderna. Ciascun tipo ha esigenze specifiche in termini di hardware. In un contesto in cui il lavoro da remoto sta diventando un aspetto quotidiano del business moderno, il rischio che dati critici vengano compromessi aumenta notevolmente. La perdita dei dati può essere paralizzante, determinando perdita di opportunità di business, danneggiamento della reputazione e anche sanzioni punitive. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat
    
Waratek
Published By: ServiceNow     Published Date: Nov 22, 2013
This white paper explores how SaaS has fundamentally changed the economics for ITSM by reducing or removing maintenance, internal resource, and infrastructure costs.
Tags : 
servicenow, enterprise it, saas economics, itsm project, internal resource, infrastructure costs, service automation, software maintenance, application service provider, asp model, it infrastructure library, itil, servicenow saas
    
ServiceNow
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: HP Inc.     Published Date: Jul 03, 2019
The digital revolution has altered every aspect of modern life, and the way people work is no exception. Today’s workplace would be unrecognizable to the average worker of the past. In fact, the modern work environment has transformed substantially in the last 10 years alone, and the revolution in the way people work means IT faces more complexity than ever before. Employees are no longer viewing the traditional 9 to 5 day as the norm, with almost two thirds of workers valuing work-life balance over salary.1 As the popularity of flexible working rises across different sectors,2 what was once confined to an office can now be completed from home, from off-site locations, on the go and even from the other side of the world.
Tags : 
    
HP Inc.
Published By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC Lifecycle as a Service (PCaaS) will transform your company’s approach to IT infrastructure. We have identified three distinct employee personas representative of a modern workforce. Each persona has specific hardware needs. With remote work becoming an everyday aspect of modern business, the risks of critical data becoming compromised has increased dramatically. Loss of data can be crippling, resulting in loss of business, damaged reputation and even punitive fines. Intel Inside®. Intel i?lemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell-EUC (Dell/Intel Logo) Webinar
Published By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity
    
Lumension
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.