log file

Results 1 - 25 of 90Sort Results By: Published Date | Title | Company Name
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity, file security, file movement, managed file transfer, mft, information management, collaboration
    
Ipswitch
Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration
    
Cleo
Published By: Oracle     Published Date: Feb 24, 2015
30 seconds or less. The average length of time that consumers spend reading or listening to online marketing communications . Marketers today are now equipped with the strategies and technologies to better capture consumer attention. To do this, they need to orchestrate individualized customer experiences across the digital channels. Read on for a statistical profile of today’s distracted consumer, followed by actionable tips for effectively communicating and converting this new type of consumer.
Tags : 
oracle, marketing, consumers, attention, message, distractions, communications, conversions, expectations, profile, experiences, individual, brand advocates, interactions, technology, search marketing, email marketing, emerging marketing, social media, advertising agencies
    
Oracle
Published By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before they’ve been introduced?
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow, internet marketing, traditional marketing
    
Kapost
Published By: Central Desktop     Published Date: Aug 05, 2011
Central Desktop is the ideal collaboration software for technology companies looking for a secure, powerful solution that will reduce costs, enhance team collaboration and improve project management. It helps IT directors and teams keep documentation up-to-date, share files, manage versions, and keep internal business units from using unapproved, non secure services for sharing documents online and internally. >>>Register to learn more
Tags : 
social collaboration, online collaboration, collaboration software, team collaboration, sharepoint alternative, project collaboration, online team collaboration, online project management, it collaboration, it project management, microsoft sharepoint
    
Central Desktop
Published By: Network Automation     Published Date: Dec 02, 2008
Accudata Technologies, provides flexible access to data validation through innovative technology and cutting-edge data transmission. Accudata serves as an access hub for validating information associated with telephone numbers, cellular numbers and IP locations while also providing line information database storage of phone numbers and corresponding information.
Tags : 
network automation, automate, accudata technologies
    
Network Automation
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: Ayla Networks     Published Date: Aug 11, 2015
Innovative approaches for the Internet of Things on core building-block technologies in communications, IoT platforms and security. Gartner profiled five Cool Vendors that can help CIOs, IT leaders and decision makers to build IoT solutions.
Tags : 
    
Ayla Networks
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration
    
Intralinks
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper, downtime, continuity plan, continuity tools
    
NETIQ
Published By: Extensis     Published Date: Dec 03, 2009
A straightforward guide to defining an efficient workflow, creating catalogs, organizing your files and more.
Tags : 
extensis, dam, digital asset management, workflow, efficient work, metadata, digital asset management'
    
Extensis
Published By: IBM     Published Date: May 22, 2013
Enterprise Management Associates (EMA) has conducted extensive research investigating the integration and management challenges created by the convergence of on-premise and public Cloud hosted applications. Research conducted in mid-2012 uncovered some compelling statistics about the role of Cloud integration in today's companies: Nearly 50% of the companies surveyed have already deployed tiered transactions spanning public Cloud and on-premise computing environments (one form of "hybrid Cloud") Approximately 35% have integrated (or are in the process of integrating) multiple Software as a Service (SaaS) applications. As one IT professional put it, "Everything is connected to everything." Because of this fact, any discussionof public Cloud as a standalone technology is outmoded. Few modern on-premise applications exist as"silos," and the same is true of Cloud-delivered applications.
Tags : 
ibm, cloud, cloud computing, integration, cast iron, ema, hosted, cloud hosting
    
IBM
Published By: Pure Storage     Published Date: Apr 10, 2019
Pure Storage, a pioneer in block-based flash arrays, has developed a technology called FlashBlade, designed specifically for file and object storage environments. With FlashBlade, IT teams now have a simple-to-manage shared storage solution that delivers the performance and capacity needed to bring Spark deployments on premise. To help gain a deeper understanding of the storage challenges related to Spark and how FlashBlade addresses them, Brian Gold of Pure Storage sat down with veteran technology journalist Al Perlman of TechTarget for a far-reaching discussion on Spark trends and opportunities.
Tags : 
    
Pure Storage
Published By: Dell Storage     Published Date: Nov 28, 2012
A custom Technology Adoption Profile Commissioned by Dell and Intel.
Tags : 
dell, intel, enterprises, virtualization, cloud, private cloud
    
Dell Storage
Published By: IBM Corp     Published Date: Sep 23, 2011
ESG Lab Validation Report - Reducing Storage Capacity and Costs without Compromise. Even with the plethora of storage efficiency technologies-such as deduplication and thin provisioning-available in the market today, users have not been able to stem the growth. This ESG Lab report looks at how IBM Real-time Compression can be used to reduce the cost of storing primary file data without impacting performance. The results of hands-on testing of IBM Real-time Compression Appliances performed by ESG at an IBM facility is used to demonstrate the value of non-disruptive deployment, loss-less capacity savings, real-time performance, and non-stop high availability.
Tags : 
ibm, esg, lab validation, storage capacity, real-time compression, technology
    
IBM Corp
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: Stackify     Published Date: Nov 19, 2014
Have you ever had to work with your log files once your application left development? If so, you quickly run into a few pain points. Learn how to create a “culture of logging” and work smarter, not harder.
Tags : 
log management, developer tools, error tracking, log analytics, stackify, application support, debugging tools, software logging, log files, application monitoring
    
Stackify
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees
    
HP and Intel ®
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
    
Oracle PaaS/IaaS/Hardware
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.