it technology

Results 326 - 350 of 3937Sort Results By: Published Date | Title | Company Name
Published By: DocuSign     Published Date: Mar 23, 2016
Download this whitepaper to learn the role that electronic signature technology plays in straight-through processing, the benefits of eSignatures, and key criteria to consider when selecting an electronic signature solution for your organization.
Tags : 
    
DocuSign
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO challenges IT operations to cut 70% off of the application deployment schedule. Are his application, security, and network teams up to the task? How can SDN in the data center provide a powerful answer?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: Cisco     Published Date: Jun 29, 2015
Ron the CIO is getting complaints about slow application response time during peak ordering season. Is the problem with the application or in the SDN infrastructure?
Tags : 
cisco, cisco aci, technology, security, data center, apic, security data, cio
    
Cisco
Published By: Adobe     Published Date: Mar 03, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
media and entertainment, acquiring audience, retaining audiences, data-driven marketing, engagement obstacles
    
Adobe
Published By: Adobe     Published Date: May 16, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
    
Adobe
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
The Actional architecture enables end-to-end transaction monitoring and alerting as well as fast root cause analysis-with cost-effective scalability and high performance. This paper presents a detailed description of the unique technology that makes these and other key characteristics possible.
Tags : 
progress actional, actional architecture, soa operations, soa management, operational management, soa whitepaper
    
Progress Software BTA Telecommunications
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Whether they’re millennials born with technology in their DNA, or experienced workers who’ve become accustomed to highly connected digital experiences in all areas of their lives—digital employees are everywhere. According to Gartner, today, every employee is a digital employee. The flexible, digital, data-driven experiences they all receive as consumers have given them extremely high expectations of every service they engage with—including internal ones such as HR.
Tags : 
digital, digital transformation, human resources, data
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware
    
Symantec
Published By: IBM     Published Date: Apr 18, 2012
This white paper describes the ability of IBM Maximo Asset Management solutions to efficiently and effectively manage processes and costs across the life cycle of an organization's vehicular fleet by standardizing processes, managing complexity, and aligning resources with demands.Dynamic transportation fleets require integrated asset management
Tags : 
ibm, manufacturing, asset management, transportation, fleets, product, technology
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
    
Trend Micro, Inc.
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
    
IBM
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance
    
Actiance, Inc.
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Hybrid cloud adoption is accelerating within the financial services industry. Just recently IBM led a financial services focus group meeting with 20 banks and insurance companies. All of them indicated that they will be accelerating adoption of cloud technology over the next 12 to 18 months.
Tags : 
    
Group M_IBM Q4'19
Published By: McAfee EMEA     Published Date: Nov 15, 2017
NSS Labs performed an independent test of the McAfee Endpoint Security v10.5 product. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v1.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for McAfee’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com.
Tags : 
mcafee, endpoint, security, product, technology
    
McAfee EMEA
Published By: IBM     Published Date: Dec 12, 2006
The purpose of this paper is to highlight the issues, requirements, and technologies available for automated advanced name recognition.
Tags : 
business process automation, data integration, data quality, information management, customer service, data management, enterprise software, contact management
    
IBM
Published By: Brother     Published Date: Nov 23, 2015
The Center for Digital Education (CDE) surveyed over 130 K-12 decision-makers on the classroom use of printer and scanner technologies in September 2014 and found scanning materials for digital use in the classroom is a key concern, with ease of use, cost containment and flexible deployment among the most critical needs. In the context of this study, this white paper will build a case for the use of scanners to revolutionize K-12 teaching, learning and administration.
Tags : 
scanners, brother, scanning solution, digital learning, touchscreen, education technology
    
Brother
Published By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : 
redhat, cloud management, vmware environments, virtualization infrastructure, visibility
    
Red Hat
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Cities are changing at a pace never before possible, bringing smart features online daily. But smart features don’t equal smart cities. That’s why aspiring smart cities are shifting from siloes of smart features to a more holistic approach that connects and makes sense of all people and things. This shift demands technology solutions that are edge-centric, cloud-enabled and data-driven, able to deliver citizen-centric outcomes now and into the future.
Tags : 
    
Hewlett Packard Enterprise
Published By: EMC Corporation     Published Date: Jun 14, 2013
Aerospec, a system engineering and manufacturing company, leverages VNXe and VMware to cut operating costs, increase reliability. They have seen a 2x increase in data access and 75% increase in storage utilization.
Tags : 
data, data access, reliability, redundant data, storage solution, information protection, application, storage utilization
    
EMC Corporation
Published By: NuCompass     Published Date: May 26, 2016
First impressions matter, and relocations are stressful. If your new hire isn’t taken care of during the relocation process, it can lead to an early resignation, a bad candidate experience, and a poor reputation for your company.
Tags : 
employee relocation, relocation, relocation program, new hire relocation, mobility, mobility services, mobility program, employee move
    
NuCompass
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library