connections

Results 201 - 225 of 229Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Aug 08, 2013
"There are many reasons why now is the right time to make the move to Microsoft Exchange Server 2010,including a host of administration and security improvements. However, as with Microsoft Exchange Server 2007, Exchange 2010 requires SSL certificates to ensure the security of all connections to the email server. This guide from Thawte is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs)."
Tags : thawte, ssl certificate, application, web server, data collection, technology, encryption, security
     Thawte
By: IBM     Published Date: May 30, 2008
The productivity and bottom line of most businesses have benefited greatly from the increasing pace and pervasiveness of technological support. In the process, the community that characterizes and supports businesses of all sizes has been given short shrift. In this Clipper Group paper, read about IBM Lotus connections, the tool that will help your team to collaborate as efficiently as possible.
Tags : ibm, ep campaign, ibm ep, productivity, lotus, lotus connections, desktop management, collaboration
     IBM
By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
     Internet Security Systems
By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
     Meru Networks
By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity
     Reactivity
By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
     Sybase
By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : copiatech, wireless, wireless security
     CopiaTECH
By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : idengines, id engines, identity engines, access control, authentication
     Identity Engines
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions
     Virtela Communications, Inc.
By: MoreVisibility     Published Date: May 07, 2012
LinkedIn connections and groups foster a lot of interaction among professionals, who can discuss their respective industries and job functions. Learn more about the three main opportunities for you to become a master link builder on LinkedIn.
Tags : morevisibility, marketing, social media, emerging marketing, internet marketing, web analytics
     MoreVisibility
By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : bluevolt, extended enterprise, lms, learning management system, channel, training
     BlueVolt
By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
     SAS
By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
     SAS
By: Kaon     Published Date: Jul 07, 2011
In this complimentary white paper, discover how new interactive technologies allow companies to obtain quick ROIs - in the hundreds of thousands - while creating emotional customer connections at events. Learn how your 2011 marketing programs will generate greater ROI with new interactive marketing technologies.
Tags : kaon interactive, roi, marketing technologies, virtual product demonstrations, trade show trends, sales team, virtual technology
     Kaon
By: Symantec     Published Date: Oct 02, 2012
Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
Tags : ssl, firesheep, sidejacking, http connections, tls, ssl, symantec
     Symantec
By: IBM     Published Date: Sep 30, 2013
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : global chief executive officer, leadership, technology, connectedness, customer insights, connections, ceos, business strategy
     IBM
By: HP     Published Date: May 05, 2014
Performance testing solves application issues potentially impacting revenue, productivity, and brand recognition: Discover how Telus has reduced the number of performance issues introduced by IT releases and saved well over $10M in business impact costs (revenue loss/workaround expenses/impact on brand name) since 2011 using HP Performance Center. TELUS is a leading national telecommunications company in Canada, with $10.9 billion of annual revenue and 13.1 million customer connections.
Tags : it management, enterprise applications
     HP
By: Adobe     Published Date: Feb 08, 2016
Today, customers make decisions about brands on a moment-by-moment basis. They expect personal and authentic experiences that build connections and deepen relationships with their favorite brands. New technology makes it possible to deliver on these expectations and succeed in today’s new era of marketing.
Tags : adobe, marketing, new era, crm, brands, experience, customer expectations, enterprise applications
     Adobe
By: Adobe     Published Date: Feb 08, 2016
Today, customers make decisions about brands on a moment-by-moment basis. They expect personal and authentic experiences that build connections and deepen relationships with their favorite brands. New technology makes it possible to deliver on these expectations and succeed in today’s new era of marketing.
Tags : adobe, marketing, new era, crm, brands, experience, customer expectations
     Adobe
By: Adobe     Published Date: Mar 03, 2017
In a world of infinite choices, customer experience is the last true differentiator. The optimal shopping experience happens when the right content is presented to a customer at precisely the right time, no matter where they choose to engage. Read The Path of Experience to learn the critical capabilities needed to drive seamless commerce experiences that keep customers coming back for more. Read the guide to learn: • The role of dynamic merchandising in engaging customers • Steps to create compelling customer experiences using audience segmentation and personalization • Ways to scale customer experiences to create powerful connections, no matter the device or channel
Tags : customer experience, merchandising, customer engagement, commerce experience, audience segmentation, personalization
     Adobe
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
     VMware SD-WAN by VeloCloud
By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : use of technology in recruitment, new recruitment methods, mobile jobseekers
     Lumesse
By: Dell EMC     Published Date: Aug 03, 2015
Manage its unpredictably fast growth.
Tags : growth, management, virtual, experience, data
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com