connection

Results 376 - 400 of 435Sort Results By: Published Date | Title | Company Name
By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
This paper examines enterprise adoption of blade servers in the US, UK and China; the benefits of blade server use; and the connection between enterprise data center management and agility goals and blade server use.
Tags : cloud, cloud computing, planning, intel, data center, unified networking, scaled-out storage, server pools, power, power management, enterprise, storage, data management
     Sponsored by HP and Intel® Xeon® processors
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
For many organizations facing IT budget challenges, delaying capital expenses by prolonging the life of hardware assets is a common strategy.
Tags : intel, idc analyst connection, it budget, server refresh cycles
     Sponsored by HP and Intel® Xeon® processors
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Nov 20, 2012
After more than a decade of increases in the size of IT environments due to the proliferation of systems, devices, storage, and management tools, IT complexity has reached an all-time high.
Tags : intel, idc analyst connection, xeon, it complexity, it enviornments
     Sponsored by HP and Intel® Xeon® processors
By: Suzy Feine     Published Date: Sep 30, 2010
Press releases are no longer just a means to announce business news. Learn the five reasons why press releases can have a dramatic effect on your company's marketing strategy.
Tags : marketing, seo, press release, media, editors
     Suzy Feine
By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase
     Sybase
By: Symantec     Published Date: Oct 02, 2012
Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
Tags : ssl, firesheep, sidejacking, http connections, tls, ssl, symantec
     Symantec
By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections, security, data management
     Symantec
By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection, security
     Symantec
By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to websites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: TD.Org     Published Date: Nov 06, 2017
Talent development leaders recognize that a key element in keeping learning relevant and engaging involves seizing opportunities to creatively embed social media in their organizations’ talent development portfolios. ATD’s Social Learning: Developing Talent Through Connection, Contribution, and Collaboration whitepaper reports on the use of social media for learning and the approaches that are driving organizational success. Download this whitepaper to better understand the strategies and practices talent development leaders are using to leverage social learning effectively.
Tags : 
     TD.Org
By: TE Connectivity     Published Date: Feb 23, 2018
In our increasingly connected world, quality, reliability and consistency matter a great deal, particularly in the context of the smart home ecosystem. The antennas, connectors, relays, sensors, switches, terminals and tubing inside these devices play critical roles in the product’s ultimate functionality. If you don’t focus on the right components or choose the wrong or incompatible ones, then device reliability becomes an issue.
Tags : 
     TE Connectivity
By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : secure devops, idc, analyst report, container security
     Tenable
By: Teradata     Published Date: Mar 10, 2014
A look at the importance of customer data-who they are, what they do, what they're interested in, what motivates them-in creating a holistic customer view. This paper looks at how data-driven marketing creates more loyal and more satisfied customers.
Tags : teradata, customer view, data-driven marketing, loyalty, customer satisfaction, analytics, customer engagement, digital marketing
     Teradata
By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
     Teradata
By: Tharpe Robbins     Published Date: Jun 23, 2014
Do you recall the commercial a cellular provider once ran a that displayed cellular-connection “bars” above people’s heads to indicate the signal strength of the connection? Maybe that’s the way we can all look at employee engagement. Employee engagement is measurable, and we call that engagement signal strength (ESS). It’s not a static score, but a dynamic measurement that may change every day depending on what happens at work with a co-worker or supervisor, or at even home. This white paper from TharpeRobbins explains how you can understand your ESS and increase it with smart solutions.
Tags : employee engagement, rewards, awards, recognition, performance recognition, length of service recognition, organization performance, attract talent, retention, social recognition, sales performance, career recognition, retirement recognition, employee incentives, recognition software, engagement platform, career, performance, social, service award
     Tharpe Robbins
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security, data management
     Thawte
By: The Mx Group     Published Date: Jul 12, 2017
As the number of tactics available to marketers has multiplied, it has become harder and harder for many to determine where they should focus their resources. Digital marketing, in particular, is becoming increasingly sophisticated and offers opportunities for highly targeted and effective campaigns. But as B2B marketers are designing integrated programs, many overlook a tactic that has successfully generated leads and closed sales for decades: telemarketing. Strategically deploying telemarketing to enhance engagement, nurture prospects and improve your data can make the difference between revenue that goes to your bottom line and revenue that goes out the door. This kind of direct, one-to-one communication has a natural connection with the B2B world, a field built around relationships and tightly targeted audiences.
Tags : digital marketing, telemarketing, lead generation, sales, engagement
     The Mx Group
By: The Vitality Group     Published Date: Jan 28, 2014
Companies that offer employee wellness programs are clearly committed to the idea that a healthier workforce means a healthier bottom line. Yet, how this connection gets made is the subject of much debate. What's really known about what work? What will it mean to your company, in terms of business outcomes and healthcare costs? And, how do you show real bottom-line benefit to a skeptical CFO or CEO?
Tags : employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive program, workplace wellness program, workplace health program, workplace health promotion, health and wellness program, corporate health program cost, the vitality institute, effective health promotion
     The Vitality Group
By: Thismoment     Published Date: Oct 08, 2014
Brands are in a content pressure cooker. The demand for quality content is forcing marketers to keep a rapid pace with emerging technology and consumers’ growing expectation for real-time, authentic connection with brands. How does one keep up with such a rapid pace? Download Becoming a Brand DJ today to gain insight on how to stay up to speed with consumers expectation in the emerging world of technology.
Tags : branding, quality content, emerging technology
     Thismoment
By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
     ThreatTrack Security
By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
     U.S. Cellular
By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
     U.S. Cellular
By: Urban Airship     Published Date: Mar 15, 2013
Push messaging is becoming must-have technology because nothing else enables such a close and personal connection with mobile users. Read more
Tags : push messaging, mobile, mobile marketing, engagement, smartphones, mobile devices
     Urban Airship
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com