pts

Results 276 - 300 of 353Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Apr 14, 2016
Download the ebook, “5 Biggest CIO Communications Problems, Solved”, to learn how Office 365 addresses these common pain points: Change disrupts business as usual It costs time and money to implement new solutions Incompatibility can wreak havoc The risks seem high while the benefits are unclear I need a solution that addresses my teams' unique needs
Tags : 
    
Microsoft Office 365
Published By: ASME - Formlabs     Published Date: Aug 28, 2019
Rapid prototyping helps companies turn ideas into realistic proofs of concept, advances these concepts to high-fidelity prototypes that look and work like final products, and guides products through a series of validation stages toward mass production. With rapid prototyping, designers and engineers can create prototypes directly from CAD data faster than ever before, and execute quick and frequent revisions of their designs based on real-world testing and feedback. Download this white paper to learn: How rapid prototyping fits into the product design process The applications of rapid prototyping from concept models to manufacturing An overview and comparison of 3D printing technologies for rapid prototyping: FDM vs. SLA vs. SLS
Tags : 
    
ASME - Formlabs
Published By: SPSS     Published Date: Jun 30, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the technology sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
The intrepid data miner runs many risks, including being buried under mountains of data or disappearing along with the "mysterious disappearing terabyte."  This article outlines some risks, debunks some myths, and attempts to provide some protective "hard hats" for data miners in the marketing sector.
Tags : 
spss, data mining, data miner, data management, business process, best practices, business intelligence, statistics, statistical modeling, algorithms, predictive analysis, data analysis, scalability, optimization, business knowledge, decision-making
    
SPSS, Inc.
Published By: SAS     Published Date: Oct 18, 2017
Are you thinking about adding artificial intelligence to your organization? It’s certainly a hot topic and worth the attention. This paper outlines the SAS approach to AI and explains key concepts. It also provides process and implementation tips if you are considering adding AI technologies to your business and analytical strategies.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
Machine learning uses algorithms to build analytical models, helping computers “learn” from data. It can now be applied to huge quantities of data to create exciting new applications such as driverless cars. This paper, based on presentations by SAS Data Scientist Wayne Thompson, introduces key machine learning concepts and describes SAS solutions that enable data scientists and other analytical professionals to perform machine learning at scale. It tells how a SAS customer is using digital images and machine learning techniques to reduce defects in the semiconductor manufacturing process.
Tags : 
    
SAS
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, marketing analytics, marketing data, crm, customer relationship management
    
IBM
Published By: Sponsored by HP and Intel ®     Published Date: Feb 21, 2013
In this paper, we explore these concepts and highlight the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components.
Tags : 
virtualization, network, storage, cloud computing, it infrastructure, vaai, san
    
Sponsored by HP and Intel ®
Published By: IBM     Published Date: Aug 20, 2013
When 83 percent of online consumers participate in social media, it is no surprise that, like bees to honey, marketers are following suit. According to a recent IBM® Unica® survey of marketers, 47 percent of respondents say they currently use social media marketing tactics; in North America, that number jumps to 58 percent. Yet, for all the rush, many marketers are wondering, “where’s the gold?” The IBM Unica survey found that 48 percent of marketers admit that their social media marketing efforts are totally siloed, frustrating their attempts to create richer customer relationships.
Tags : 
social media, social media analytics, social media marketing, ibm, unica, crm, customer relationship management, top-line marketing strategy, mass-marketing strategy
    
IBM
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national
    
Cisco
Published By: Silk Road Technology     Published Date: Jul 30, 2014
Mobile is a massive trend in life as well as recruiting. Technology is Download to read about some key concepts to keep in mind when entering the mobile recruiting arena.
Tags : 
silkroad, mobile recruiting, mobile, talent, technology recruiting, human resources
    
Silk Road Technology
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security
    
Palo Alto Networks
Published By: Bronto     Published Date: Mar 16, 2012
Set your email marketing success in motion with triggered messages. From a customized welcome series to reengagement messages, learn how to identify triggered message opportunities and define business rules. Explore these key concepts and best practices to create or enhance your automated campaigns today.
Tags : 
marketing, marketing message, markeing tools, engagement, customer engagement
    
Bronto
Published By: Symantec     Published Date: Nov 30, 2015
en 1994 se llevó a cabo la primera compra en línea de la historia: una pizza de pepperoni con champiñones y extra de queso en Pizza Hut. un año más tarde, amazon vendió su primer libro, Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought, de douglas Hofstadter2. dos décadas después, se calcula que las ventas mundiales de los comercios electró-nicos ascienden a más de 1,2 billones de dólares. ¿Qué ha hecho posible un cambio tan espectacular en nuestros hábitos de compra? la confianza.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Désormais, acheter sur Internet est devenu une seconde nature pour la plupart d’entre nous. Mais à quel moment ce phénomène a-t-il débuté, et sous quelle im-pulsion a-t-il atteint le niveau que nous connaissons aujourd’hui ? Selon plusieurs sources1, il faut remonter à 1994, date du premier achat sur Internet d’une pizza aux peppéroni et champignons avec supplément fromage chez Pizza Hut. Lorsque cette pizza a été commandée et qu’un an plus tard, Amazon vendait son premier livre (« Concepts & Fluid Analogies Creative : Computer Models of the Fundamental Mechanisms of Thought » de Douglas Hofstadter2), nous assistions sans le savoir aux prémices d’une déferlante qui a submergé le réseau. Presque vingt ans plus tard, en 2013, les ventes mondiales sur Internet dépassaient 1,2 trillion de dollars3. Au centre de cette révolution dans nos habitudes de consommation : la confiance
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Gli acquisti online fanno ormai parte della nostra quotidianità, ma come è cominciato tutto questo e cosa ha fatto sì che sia cresciuto fino ai livelli odierni? Secondo le cronache1 iniziò tutto nel 1994, quando venne effettuato il primo acquisto sul Web: una pizza con funghi, peperoni e aggiunta di formaggio nella catena Pizza Hut. Con quella prima pizza e con la vendita, un anno dopo, del primo libro da parte del gigante del commercio online Amazon (‘Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought’, di Douglas Hofstadter2), ebbe inizio un’attività inarrestabile. Vent’anni dopo, nel 2013, le vendite mondiali di e-commerce sono state stimate in oltre 1.200 miliardi di dollari3. Cosa ha reso possibile questo cambiamento epocale delle nostre abitudini di acquisto? La fiducia.La fiducia nei siti presso i quali acquistiamo, nonché la fiducia che le informazioni di acquisto da noi fornite siano al sicuro. Perché, come sempre, dove ci sono soldi
Tags : 
    
Symantec
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp
    
NetCom Info
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: IBM     Published Date: Jan 09, 2015
This research report by Reliabiltyweb.com captures insight that attempts to predict and even guide the future of asset management practices, investments and challenges from a snapshot taken from approximately 1,000 participants from a wide variety of industries around the world.
Tags : 
asset management, asset management practices, asset management challenges, risk management
    
IBM
Published By: IBM     Published Date: Mar 10, 2015
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.
Tags : 
real-time agility, ibm, agile methods, software development
    
IBM
Published By: AdRoll     Published Date: Oct 05, 2016
Over the past few years attribution has become one of the most-discussed concepts in marketing and sales. Everyone agrees it’s critically important to get right, but there’s no such thing as a “one size fits all” model. Meanwhile countless whitepapers have been written, all with the goal of providing a brief precis of the best way to measure it, but the reality is there’s no universally correct answer...
Tags : 
attribution, marketing, sales, attribution model
    
AdRoll
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library