guide

Results 351 - 375 of 3513Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Mar 27, 2019
Cyberattacks are rapidly evolving. It is more critical than ever that your company be protected by the latest innovations in endpoint security. And if you’re dealing with outdated antivirus solutions, your risk of experiencing damaging attacks is increasing exponentially.
Tags : 
    
Carbon Black
Published By: CA Technologies     Published Date: Aug 22, 2017
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. Acknowledging that changing your point of view can be difficult, Maslow wrote “[I]t is tempting, if the only tool you have is a hammer, to treat everything like a nail.” We have all had this experience. We get so used to the way things have been done in the past, we sometimes don’t question the reasons for doing them.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In his 1966 book “The Psychology of Science,” American psychologist Abraham Maslow tackled the idea that those in the field of psychology needed to approach treatment from multiple perspectives, to take on new ideas, and not just continue using the same theories and techniques created by Freud and his followers so many years ago. It may seem curious to refer to psychology in a work on REST and API Design, but it works to illustrate two distinctive points: (1) that all design decisions, regardless of whether they pertain to software or architecture, should be made within the context of functional, behavioral, and social requirements—not random trends; (2) when you only know how to do one thing well, everything tends to look identical. To get started, let’s take a look at REST in some detail by downloading this whitepaper today.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Mar 29, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
security, cloud platform, cloud security
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
    
Group M_IBM Q418
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance, bpm, eda, bam, infrastructure, service management, thbs, torry harris
    
Torry Harris Business Solutions
Published By: PwC     Published Date: Jun 14, 2018
The positive impact of most cost-cutting efforts is short-lived, as individuals revert to past behaviors and spending habits. As normalcy returns, so can costs and head count. How do you keep the spirit alive? How do you make cost consciousness an organizational capability and a shared mind-set, rather than a bunch of rules that are resented and resisted? Look to the following strategic, operational, organizational, and cultural levers to help you sustain the change.
Tags : 
    
PwC
Published By: First Advantage     Published Date: Apr 30, 2018
Understanding the sources, access and rules around the use of criminal record histories in employment-related background checks assists employers in their hiring process. This guide is a resource for any organization wanting concise information on key criminal records screening components and considerations.
Tags : 
    
First Advantage
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt
    
Sunbelt Software
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how SMEs are able to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : 
logicnow, web protection, cyber crime, cyber security
    
LogicNow
Published By: LogMeIn     Published Date: Jul 18, 2014
A Nucleus Research guidebook to join.me
Tags : 
join.me, screensharing, conference meetings, customer service, customer support, guidebook to join.me
    
LogMeIn
Published By: LogMeIn     Published Date: Jul 18, 2014
A Nucleus Research guidebook to LogMeIn Rescue
Tags : 
logmein rescue, rescue guidebook, saas, management tools, remote control
    
LogMeIn
Published By: Evariant     Published Date: Sep 07, 2016
Over the past eighteen months we have seen a dramatic shift in consumers’ trust of traditional versus digital marketing.
Tags : 
evariant, traditional marketing, hospital, patient engagement, digital marketing
    
Evariant
Published By: CA Technologies     Published Date: Mar 10, 2015
Vereinfachen der OAuth-Implementierung in Ihrem Unternehmen
Tags : 
    
CA Technologies
Published By: Adobe     Published Date: Sep 28, 2010
This How-To Guide for Creating Open Government reviews the opportunity of open government, how technology enables open government, and how to make government more transparent, participatory and collaborative.
Tags : 
adobe, open government, customer interaction, information management, collaborative, transparency
    
Adobe
Published By: CA Technologies     Published Date: Mar 06, 2015
Semplificare l'implementazione di OAuth per l'azienda
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 12, 2015
Learn the in’s and out’s of OAuth & API security and see how this can greatly benefit your organization.
Tags : 
oauth, api, ca tehnologies, twitter, resource server, authorization
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: Liaison Technologies     Published Date: Feb 07, 2014
This how-to-guide has been designed to help you better evaluate a VAN provider and determine the real value of the offer.
Tags : 
liaison, van, value-added network, transaction management, real value, reduce errors, accuracy of data, provider consolidation, platform capabilities, growing adoption, unreliable network, vendor technical support, ease of migration
    
Liaison Technologies
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
Explore the findings of Oracle HCM's Employee Engagement Survey and discover fresh insight on ideas, best practices and current trends from your colleagues. Learn how other HCM leaders are creating compelling cultures, making technology decisions to support mobile and social ways of working, inspiring collaboration and driving employee engagement.
Tags : 
    
Oracle HCM Cloud
Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems
    
Sophos
Published By: Epicor     Published Date: Oct 06, 2016
This eBook and research identify five key factors that growing manufacturers believe contributed to their business growth last year, and five risks that manufacturers believe may prevent or weaken growth in the following year. Download this how-to guide to learn more.
Tags : 
    
Epicor
Published By: SAS     Published Date: Feb 29, 2012
This paper provides an intro to managers and marketing professionals applying analytics to marketing to significantly improve outcomes. It explains not only why you need to make this shift, but also how you get started and what tools you'll need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: Intercom     Published Date: Apr 05, 2018
Attracting users to your product is hard. It’s doubly hard if they don’t understand what you’re saying.
Tags : 
    
Intercom
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Resource Library