smi

Results 1 - 25 of 178Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 10, 2019
Marketer konzentrieren sich mehr auf das obere Ende des Sales Funnel, während Vertriebsmitarbeiter am unteren Ende des Trichters Abschlüsse unter Dach und Fach bringen. Auf dem Weg durch den Sales Funnel werden die Interessenten auf den Verkauf durch das Vertriebs-Team vorbereitet, sodass eine bessere Interaktion mit ihnen möglich ist.
Tags : 
    
Adobe
Published By: Akamai Technologies     Published Date: May 08, 2017
The gaming industry continues to grow rapidly, and it is projected to grow another 30% in the next three years1 . Online gaming is driving this growth as the industry is making a seismic shift from disk to digital. This shift comes with an abundance of opportunities and challenges, as digital gaming makes it easier than ever to get games into the hands of more players, in more places, in less time. TechValidate Research surveyed 131 Akamai Technologies, Inc. customer accounts to find out more about how gaming companies are innovating the marketplace and the challenges they need to overcome in order to do so. The results show the importance of web security, that acquiring and retaining new users is the biggest business challenge companies are facing, and that mobile is taking over as the most popular gaming platform.
Tags : 
techvalidate, gaming industry, online gaming, akamai gaming, gaming growth
    
Akamai Technologies
Published By: Alert Logic     Published Date: Jun 12, 2014
Alert logic’s cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic’s solutions and the unique benefits offered.
Tags : 
pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac va por buen camino para convertirse en el modelo para la próxima generación de Wi-Fi. La velocidad de transmisión de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalámbricas LAN son amplificadas ya que el número de usuarios de móviles y dispositivos, así como el uso de aplicaciones continúan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no está seguro de qué es lo siguiente que debe hacer, descárguese esta guía en cinco pasos que le ayudará a prepararse y planificar una migración exitosa a WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As an equipment provider for worldwide, national and regional radio and television facilities, Transcom Corporation, headquartered in Huntingdon Valley, Pa., has been meeting the broadcasting capability needs of stations worldwide since 1978. Transcom specializes in distributing new TV transmitters, antenna, cable, Studio Transmitter Link (STL) and audio equipment that enable television and radio stations to transmit sound and video from the studio to the antenna.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution
    
AT&T
Published By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office – like mobile phones, wearables, tablets, and even desktop phones – and the need becomes even greater.
Tags : 
atlantic broadband, transmit, data, payroll, cloud, data
    
Atlantic Broadband Business
Published By: Automation Anywhere     Published Date: Feb 21, 2019
The Augmented Human Enterprise is an independent academic study into the reality and future of automation and AI technologies in the workplace. The future impact of automation and AI on businesses and the people working within them is under constant debate. Advocates hail a future utopia, detractors foresee our dystopian demise. But what's the reality today? A team of academics at Goldsmiths, University of London set out to investigate the real-life impact of automation on work and found that augmented workplaces–those with collaboration between human and machines–score 33% higher on factors deemed to make a workplace more human.
Tags : 
    
Automation Anywhere
Published By: Automation Anywhere     Published Date: Jul 16, 2019
The advent of artificial intelligence (AI) has shown incredible promise across a wide range of industries. But the benefits of automation have mostly occurred through Robotic Process Automation (RPA), which automates repetitive, mundane tasks – liberating workers to focus on higher-level business initiatives that only humans are capable of providing. After successful trials in most of the world’s largest organizations, automation and AI are poised to transform the global workplace. Making Work Human: 5 Challenges, research by Goldsmiths, University of London, supported by Automation Anywhere, seeks to uncover the main obstacles that organizations must now overcome in order to scale automation and AI, and recognize the true potential of these ground-breaking technologies.
Tags : 
    
Automation Anywhere
Published By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : 
blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackLine     Published Date: Jun 12, 2017
The last ten years have seen two seismic shifts for accounting and finance teams. First, the expectations of finance have changed: be more efficient and agile in an increasingly regulatory environment while also being more strategic. Secondly, a new wave of modern finance apps have arrived for core accounting, financial close, and planning and reporting, that are designed to automate more and analyze more.
Tags : 
    
BlackLine
Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies
Published By: CareerBuilder     Published Date: Apr 24, 2019
AKAs can be any alternative name or date of birth used by or associated with the candidate in the past. Conducting the search on AKA names can help ensure that you do not miss records that were logged under another name, for example a maiden name or an abbreviated version of a first name. When someone is arrested, if they do not have an ID on them they’ll be booked under whatever name they give to the police. Richard could be Rick, Elizabeth could be Beth, and John Joseph Smith-Johnson could be Joe Smith. These additional names are called alias names. When we look for records, we only have the name and date of birth to go on. Today, very often the individuals arrested provide an alternate name. If you are ONLY using the current legal name, or have search limitations such as LAST NAME ONLY, you might be missing records.
Tags : 
    
CareerBuilder
Published By: CDW     Published Date: Apr 04, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : 
data management, business practices, data center. data application, rack cable management
    
CDW
Published By: CDW - APC     Published Date: Apr 07, 2016
Poor rack cable management has proven to many data center operators to be a source of downtime and frustration during moves, adds and changes. It can also lead to data transmission errors, safety hazards, poor cooling efficiency, and a negative overall look and feel of the data center. This paper discuses the benefits of effective rack cable management, provides guidance for cable management within IT racks including high density and networking IT racks, which will improve cable traceability and troubleshooting time while reducing the risk of human error.
Tags : 
data management, business practices, data center. data application, rack cable management
    
CDW - APC
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
    
Ciena
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.