addresses

Results 126 - 150 of 302Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Published By: PC Mall     Published Date: Jun 22, 2011
This Cisco white paper addresses the power of the cloud, Cisco's vision for the cloud and provides valuable customer use cases.
Tags : 
cloud services, software as a service, private clouds, public clouds, hybrid clouds, cisco, pc mall, infrastructure
    
PC Mall
Published By: EMC Corporation     Published Date: Nov 08, 2011
Read this whitepaper to learn about solutions like the EMC Data Domain Archiver and how it addresses many challenges organizations are struggling with
Tags : 
retention, data retention, long-term, data domain archiver, backup, archive, recovery, solutions
    
EMC Corporation
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement
    
M86 Security
Published By: Citrix Systems     Published Date: Nov 10, 2014
Attend this webinar to learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately. Agenda: • How virtualization impacts the underlying network infrastructure • Why and how SDN addresses the challenge of virtualization • How SDN enables “Just in Time” networks for L4-7 services
Tags : 
application, deployment, research, enterprise, data center, controller, network, security
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : 
dlp, data-centric dlp, data leakage, dlp deployment
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
Published By: SAP     Published Date: Feb 26, 2016
Work has evolved, so performance management should follow. SuccessFactors partnered with PwC to develop a paper that helps companies assess their PM programs and make PM more effective. Rethinking your performance management program addresses: • The critical importance of having separate but integrated processes to accurately assess past performance and to provide continuous coaching for the future • Techniques for embedding user-friendly social and mobile performance tools that reflect the real rhythm of the business • The pivotal role of HR to evaluate and evolve PM processes Our proven tips on how to adjust and nurture PM processes are food for thought as many managers and employees focus on the business of making 2014 a successful year.
Tags : 
sap, pwc, performance management, human resources
    
SAP
Published By: Cloudian     Published Date: Feb 15, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ˝ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 26, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ˝ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage
Tags : 
    
Cloudian
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: Datalink     Published Date: Jun 01, 2012
This white paper looks at the benefits of data center virtualization and addresses both public and private cloud strategies. The paper reviews the necessary steps in the evolution and how to successfully put those steps into motion.
Tags : 
datalink, virtual, virtualization, data center, public cloud, private cloud, cloud, evolution
    
Datalink
Published By: Datalink     Published Date: Jul 27, 2012
If it's not already, data center virtualization should be a key component of every IT organization's strategy. This white paper looks at the benefits of data center virtualization and addresses both public and private cloud strategies. The paper reviews the necessary steps in the evolution to a virtual data center--ranging from aligning with virtual storage to managing your cloud--and highlights how to successfully put those steps into motion.
Tags : 
datalink, cloud, virtual data center, virtualization, infrastructure
    
Datalink
Published By: HP     Published Date: May 30, 2008
Storage virtualization has been around for several decades. While technologies have advanced and capabilities have become more sophisticated over time, the motivations for virtualizing resources and the anticipated benefits have remained relatively stable. Storage virtualization continues to be an important topic because it addresses a number of significant challenges.
Tags : 
storage management, storage virtualization, virtualization, storageworks, storage, hp eva 4400, hp eva 4000
    
HP
Published By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : 
disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks
    
HP
Published By: Motorola     Published Date: Feb 06, 2008
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. It then outlines how the Good™ Mobile Messaging solution addresses those key issues. Also included are includes two case studies of recent Good Technology customer deployments.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola
Published By: EMC Corporation     Published Date: Dec 01, 2014
This whitepaper details how to deploy an SAP environment on an EMC Hybrid Cloud with VMWare vCloud Automation Center as its core. This solution addresses provisioning, key security, migration, and operational efficiency challenges specific to an SAP infrastructure.
Tags : 
application landscapes, simplify, increased value, hybrid cloud, key security, migration
    
EMC Corporation
Published By: NetIQ     Published Date: Dec 23, 2010
The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.
Tags : 
netiq, security, hipaa compliance, protected data
    
NetIQ
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper, the first in a sequence, addresses the question, "who, specifically, are those right groups and right people?" on several different levels. It also highlights underlying principles that, properly applied, lead to solid answers to the "who" questions for a wide variety of scenarios.
Tags : 
dataflux, data agenda, data quality, governance, analytics, measurement and reporting, automation
    
DataFlux
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper addresses data profiling techniques that can help the analyst understand the empirical truth associated with enterprise data.
Tags : 
dataflux, data profiling, enterprise data, analyst, data rule validation, metadata compliance
    
DataFlux
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Have questions about what exactly Data Deduplication does for your business? This Q & A addresses a few commonly asked questions about Data Deduplication.
Tags : 
data deduplication, smb, disaster recovery, backup and recovery, data management
    
CDW Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library