smi

Results 76 - 100 of 178Sort Results By: Published Date | Title | Company Name
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: Monotype     Published Date: Jan 10, 2017
Without overstating the situation, it's safe to say there has been a seismic shift in the way brands and customers interact, and with it, an equally profound change in how brands must communicate, market, and relate to their customers. In this eBook, you’ll learn about three areas of particular importance—continuity, customers, and compliance—where type can help deliver on the experience today's consumers expect.
Tags : 
digital design, monotype, design, creative, web fonts, internet marketing, branding, user experience, marketing best practices, marketing, emerging marketing, mobile ads, brand identity, brand health, consistency, continuity, customers, compliance, fonts, branding best practices
    
Monotype
Published By: Cloud Sherpas     Published Date: Sep 10, 2015
The Retail Operations team at Dick Smith moved to Google Apps with help from Cloud Sherpas just over a year ago to improve the communication and coordination between our 3,000 or so staff in 376 stores across Australia and New Zealand. Since then, we’ve seen some pretty dramatic improvements and efficiencies in the way we get information out to our staff, thanks to Google Drive and Google Sites.
Tags : 
google drive, moving to google, going google, cloud sherpas
    
Cloud Sherpas
Published By: MicroStrategy     Published Date: Mar 16, 2011
This paper will discuss the security capabilities of MicroStrategy Mobile on Apple's mobile devices.
Tags : 
microstrategy, mobile business intelligence, bi application, security, data access, apple mobile device, data transmission, data storage, data protection
    
MicroStrategy
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
Published By: SAP     Published Date: Mar 22, 2016
Experts say the demand for electricity, natural gas, and water will double or triple as billions of people join the digital economy, and the use of energy and water will grow while vehicles and mass transit go electric. One thing is clear – the digital economy needs clean, dependable, and affordable electricity. This should be a great outlook for power generators, distributors, and retailers, but decarbonization, deregulation, and decentralization are disrupting the century-old utilities hierarchy. A “Digital Energy Network” is emerging that reflects new structures of power generation, transmission, distribution, and retail. It will foster new business models and processes and transform work in a competitive and collaborative digital economy.
Tags : 
digital utilities, sap, digital world, natural resources
    
SAP
Published By: Oracle     Published Date: Apr 16, 2018
La tecnología de base de datos está evolucionando rápidamente, en particular en tres áreas: tecnología de memoria, análisis de big data y cloud. Paralelamente, la función del DBA sigue evolucionando. Conoce más sobre cómo algunos de estos cambios reflejam las tendencias que llevan mucho tiempo y siguen sin disminuir.
Tags : 
cuales, principales, evoluciones, base, datos
    
Oracle
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
    
Ciena
Published By: Infosys     Published Date: May 21, 2018
Our client is a Finnish consulting and engineering company that deals with some of the world's toughest industries. Since 1958, the company has handled the power transmission system for the Swedish National Grid, revamped Salzburg railway station, and has been involved in 90 percent of the world's largest pulp mill designs. The nature of our client's work places unique demands on their IT infrastructure. Many of their projects require them to set up temporary offices in remote locations to deliver their engineering expertise, making seamless connectivity a critical business requirement. Large files, such as complex pipeline drawings, are passed between team members in different locations. Any outage that causes a delay in projects leads to potential financial penalties and damage to reputation.
Tags : 
landscape, company, industry
    
Infosys
Published By: Shell     Published Date: Aug 15, 2018
Globally, the demand for power is increasing, driven by a growing population, mass urbanisation, and rapid industrialisation of nations like China and India. The consequence for those in the business of power generation, transmission and distribution is a need to achieve greater productivity and reliability, in a challenging climate of stricter environmental targets, severe penalties for supply interruptions, tighter budgets and tougher operating conditions.
Tags : 
power, urbanisation, industrialisation, power generation, equipment reliability, turbines, transformers, stationary engines
    
Shell
Published By: SAS     Published Date: Apr 14, 2016
Como resultado de un mayor acceso a datos útiles, las compañías están usando con mayor frecuencia métodos analíticos sofisticados. Eso significa que a menudo hay una brecha entre la capacidad de una organización de producir resultados analíticos y su capacidad de aplicarlos efectivamente a su negocio.
Tags : 
    
SAS
Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance
    
NetIQ
Published By: NetIQ     Published Date: Dec 23, 2010
The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.
Tags : 
netiq, security, hipaa compliance, protected data
    
NetIQ
Published By: Payscale, Inc     Published Date: Jun 15, 2018
A total rewards program is made up of several elements — WorldatWork lists them as compensation, benefits, worklife effectiveness, recognition, performance management and talent development — so it’s no wonder that putting together successful packages is a complicated, sometimes stressful, endeavor. There’s so much to consider and evaluate, and if you’re like most of your HR and compensation colleagues, you have a lot of questions. Well hey — that’s what this ebook is here for. Rusty Lindquist, VP of Thought Leadership at BambooHR; Dave Smith, Chief Product Officer at PayScale and Jill Christensen, Founder of Jill Christensen Intl., recently hosted a panel discussion in which they offered insights and tips on the biggest, most frequent concerns around total rewards. What follows is a distillation of their very helpful advice on the most common
Tags : 
    
Payscale, Inc
Published By: Windstream     Published Date: Apr 03, 2014
Misconceptions about unified communications (UC) may lead IT to dismiss it. Find out how UC can solve productivity woes for your mobile workforce.
Tags : 
windstream, convergence, mobility, unified communications, mobile enterprise
    
Windstream
Published By: Polycom     Published Date: Jul 24, 2014
Consumers anoint—and abandon—providers with breathtaking speed, causing seismic shifts in the market. This new era of consumers is also increasingly difficult to define, no longer neatly fitting into traditional marketing segments. With the rise of emerging markets and micro-segments, manufacturing is confronting the challenge of mass customization. The question is not if or when but how: Customers are demanding variety, and manufacturing companies must deliver. What’s key to making this work? Big data visibility, flexible processes, and an agile ecosystem that can move swiftly to serve an increasingly fragmenting, but exceptionally demanding consumer base.
Tags : 
polycom, digital, connectivity, manufacturing, marketing, customization
    
Polycom
Published By: XO Communications     Published Date: Apr 13, 2015
Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.
Tags : 
    
XO Communications
Published By: Interactive Intelligence     Published Date: Dec 02, 2010
How a contact center deploys and manages eServices - non-voice interaction channels such as email, chat, SMS and social media - is the key to offering electronic services that attract modern tech-savvy customers. Learn about eServices best practices from Sheila McGee-Smith, founder of McGee-Smith Analytics, and Tim Passios, Director of Solutions Marketing at Interactive Intelligence, and how three diverse companies successfully utilize eServices to their advantage.
Tags : 
interactive intelligence, sms, media channel, short message service, wireless, mobile communications, gsm, social media
    
Interactive Intelligence
Published By: CareerBuilder     Published Date: Apr 24, 2019
AKAs can be any alternative name or date of birth used by or associated with the candidate in the past. Conducting the search on AKA names can help ensure that you do not miss records that were logged under another name, for example a maiden name or an abbreviated version of a first name. When someone is arrested, if they do not have an ID on them they’ll be booked under whatever name they give to the police. Richard could be Rick, Elizabeth could be Beth, and John Joseph Smith-Johnson could be Joe Smith. These additional names are called alias names. When we look for records, we only have the name and date of birth to go on. Today, very often the individuals arrested provide an alternate name. If you are ONLY using the current legal name, or have search limitations such as LAST NAME ONLY, you might be missing records.
Tags : 
    
CareerBuilder
Published By: Cisco     Published Date: Jan 13, 2016
“Back in the day” a smile and a handshake were the weapons of choice for sales people aiming to kill their quotas. Today, these tricks and tools of the trade have evolved, and modern sales people are collaborating with each other and connecting with their buyers more effectively as a result. In this knowledge brief, you’ll learn how they’re doing it…
Tags : 
    
Cisco
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing
    
Secure Computing
Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft, credit cards, payment card, consumer protection, information management, regulations, regulatory compliance, netforensics
    
netForensics
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.