personal data

Results 201 - 225 of 299Sort Results By: Published Date | Title | Company Name
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber
    
Mentor Graphics
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
If you’re like most developers, you spend about two-thirds of your time building and the rest of your time learning. Sometimes your research is proactive, based on personal interest or a desire to maintain your skills, but more likely it’s out of necessity—learning what you need to tackle your next big project. Not long ago, new projects assumed an on-premises or hosted approach, forcing you to spend considerable time on essential requirements like scalability, availability, and security. Today, you still must deliver on those essentials, but the apps you’re building need to do a lot more: support millions of users, span the globe, make sense of petabytes of data, and delight users in new ways. Cloud services not only deliver “built-in” scalability and availability, but also provide an unprecedented range of prebuilt functionality for driving innovation into your apps—ready to evaluate for your next project, without your having to worry about physical infrastructure and the related ove
Tags : 
    
Microsoft
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn about the five gaps that could be costing you time, customers, and profit in this digital e-book. Discover how to close those gaps and transform your people, process, and technology to better serve your customer. You’ll also learn how to: Create a unified view and deliver personalized experiences to your customers across all touchpoints and channels. Provide actionable insights to your sales and marketing team so they can work together more effectively. Bring intelligence to your data and connect it with content and processes, so you can make better, faster decisions. Transform your business by connecting sales and marketing with a shared set of successful business practices.
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Published By: Mimecast     Published Date: Jan 11, 2017
Organizations that work with the personal data of European Union residents need to overhaul business processes to avoid the risks of violating the General Data Protection Regulation, which takes effect in May 2018. Penalties for non-compliance could cost your organization upwards of €20 million or 4% of total annual worldwide revenue, whichever is higher. Mimecast provides numerous ways to help simplify GDPR compliance. Learn how Mimecast Targeted Threat Protection helps ward against impersonation attacks, weaponized attachments, and malicious URLs – offering a comprehensive front-line defense for the personal data entrusted to you when it is attacked via the email vector.
Tags : 
mimecast, security, gdpr compliance, gspr risk management
    
Mimecast
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. That’s driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Mindfire     Published Date: May 07, 2010
In this report, results from well over 650 real-life cross-media marketing campaigns across 27 vertical markets are analyzed and compared to industry benchmarks for response rates of static direct mail campaigns, to provide a solid base of actual performance data and information.
Tags : 
mindfire, response rates, personalized cross-media, marketing campaign, personalization, personalized urls, purls, performance data
    
Mindfire
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Oct 29, 2018
For every mobile user, staying productive requires secure access to critical apps such as email, contacts, and calendar. These personal information management (PIM) apps are some of the most commonly used apps in the enterprise, so IT must ensure that users can seamlessly and securely access them on any device, including Android and iOS. The ultimate goal is to prevent data loss while preserving the native app experience users expect.
Tags : 
    
MobileIron
Published By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 16, 2018
“Today’s shoppers expect more than a transactional relationship with retailers; they want a seamless and personalized journey that reflects the context of how they shop across devices and channels. The key to success lies in connecting in-store software with online systems so retailers can provide an uninterrupted experience wherever customers shop.” - Ross Mason, Founder of MuleSoft Driving digital transformation in retail requires connectivity across an ever-increasing number of applications, data and devices. Because of this, connectivity has emerged as a bottleneck that slows the development of new applications and the adoption of new technologies to meet customer demands. In response, leading retail and CPG companies have adopted API-led connectivity, which eliminates this connectivity bottleneck and enables a 2-5x faster IT project delivery across the value chain. Download this eBook to learn: How leading retailers like Buffalo Wild Wings, TAL Apparel and PetSmart are leverag
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
“Today’s shoppers expect more than a transactional relationship with retailers; they want a seamless and personalized journey that reflects the context of how they shop across devices and channels. The key to success lies in connecting in-store software with online systems so retailers can provide an uninterrupted experience wherever customers shop.” - Ross Mason, Founder of MuleSoft Driving digital transformation in retail requires connectivity across an ever-increasing number of applications, data and devices. Because of this, connectivity has emerged as a bottleneck that slows the development of new applications and the adoption of new technologies to meet customer demands. In response, leading retail and CPG companies have adopted API-led connectivity, which eliminates this connectivity bottleneck and enables a 2-5x faster IT project delivery across the value chain. Download this eBook to learn: How leading retailers like Buffalo Wild Wings, TAL Apparel and PetSmart are leverag
Tags : 
    
MuleSoft
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neustar     Published Date: Aug 20, 2012
Viewers will learn how to utilize customer data combined with next generation marketing analytics to create granular consumer segmentation that can be put to action in real-time on their Websites.
Tags : 
web analytics, site optimization, segmentation, customize messaging, custom offers, marketing strategy, personalized website, custom landing page
    
Neustar
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Oracle     Published Date: Feb 28, 2018
Le divisioni IT hanno utilizzato IaaS per liberare il personale da compiti ripetitivi quali la manutenzione dell’hardware e l’aggiornamento del software. Ma non sempre sono stati sfruttati i possibili vantaggi correlati al processo di adozione. Quasi un quarto delle aziende (il 22%) sostiene che se dovesse ripetere l’implementazione di IaaS, utilizzerebbe strumenti per la migrazione automatica. Oracle Ravello, ad esempio, permette alle aziende di trasferire automaticamente i carichi di lavoro dai data center esistenti alle piattaforme cloud senza costose o rischiose modifiche.
Tags : 
sfruttare, vantaggio, competitivo, sviluppare, innovazione
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.