dam

Results 551 - 575 of 878Sort Results By: Published Date | Title | Company Name
By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
     sevone
By: Tyco Integrated Security     Published Date: Dec 08, 2014
When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. We’ve outlined some ways you can begin eliminating both internal and external threats.
Tags : business protection, workplace violence, burglary, employee theft, business management, security
     Tyco Integrated Security
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
"In this white paper, The 8 Ways Outdated ERP Damages Your Business, learn how old ERP hold back business and how the cloud can help. Find out why economic, market, and technology changes have made it necessary for modern business systems to adapt more quickly, how outdated systems drain your IT budget, what a modern business must do to ensure their ERP systems keep pace with the demands of a global mobile business, and the four reasons companies are turning to the cloud to keep up with their ever-changing organizations."
Tags : erp system, upgraded erp, business innovation, productivity, enterprise applications
     Netsuite DWASF Leads Display Q1 2015
By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, security, it management
     Niara
By: Delta Risk     Published Date: Jan 03, 2017
This white paper takes an extensive look at the regulatory and legal obligations providers must uphold to avoid costly fines, compromise of PHI, reputational damage, and potential litigation. Download now!
Tags : 
     Delta Risk
By: Microsoft     Published Date: Jul 20, 2018
SaaS represents an opportunity for ISVs to fundamentally transform their business to deliver greater value to customers, sell software to a broader range of customers, and streamline their internal operations. The market for software is quickly changing to demand this mode of delivery, as software buyers start considering total ownership costs, ease of use, and flexibility in their purchase decisions. ISVs need to prepare for such a transition. This paper will discuss the benefits that stem from changes to an ISV’s business model (how it competes in the marketplace) and operating model (how the ISV executes on its business model) as well as suggestions on how to prepare for a SaaS transition, based on the experience of 20 ISVs who successfully transitioned from a traditional software licensing and delivery model to SaaS.
Tags : 
     Microsoft
By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: Skillsoft     Published Date: Apr 26, 2011
This paper seeks to uncover the fundamental requirements for a successful social learning program.
Tags : social learning, skillsoft, eigth truths, ingenius, learning re-imagined blog, business value, social platform, informal learning activity, social networking
     Skillsoft
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
     Melissa Data
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
     Trend Micro SaaS
By: Marchex     Published Date: Nov 11, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Marchex     Published Date: Oct 25, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss
     Tripwire, Inc
By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
Procurement fraud affects nearly one-third of organizations, and it is often perpetrated by the most trusted, longtime employees, the ones you’d least suspect. Learn from three white-collar crime specialists about common flavors of procurement fraud, striking examples from recent headlines, four fundamental ways to get better at detecting and preventing fraud, and how to take procurement integrity to the next level.
Tags : 
     SAS
By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : teamquest, capacity planning, cost effective, fundamental
     TeamQuest
By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance, data management
     TeamQuest
By: Netezza IBM US     Published Date: Mar 27, 2012
This eBook will explain the fundamental differences between the IBM Netezza 1000 and Oracle Exadata solutions. You will learn which solutions best meet your business needs and how to achieve optimal results from your data.
Tags : ibm, netezza, exadata, technology, data center, data management, oracle exadata solutions
     Netezza IBM US
By: Dell     Published Date: Sep 24, 2012
The EqualLogic family of virtualized storage solutions from Dell is fundamentally changing the way enterprises think about purchasing and managing storage.
Tags : bulk data transfer, dell, microsoft, offloaded data, storage solutions, data storage
     Dell
By: Navisite- A Time Warner Cable Company     Published Date: Jul 01, 2013
In recent years, IT has seen a fundamental shift toward always-on capabilities for anywhere, anytime productivity. The Cloud has taken center stage as one of the largest influencers of IT decision making, modifying company operations, impacting enterprise finances, and incorporating into profit engines.
Tags : navisite, daas, it decision makers, impacting enterprise finances, profit engines
     Navisite- A Time Warner Cable Company
By: IBM     Published Date: Aug 10, 2012
Meeting healthcare's most fundamental mission - The role of software in helping you measure, monitor and improve patient satisfaction
Tags : patient satisfaction, healthcare, ibm, business analytics, roi, research, data, predictive analytics
     IBM
By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : sap, mobile, managing, business, mobility, technology
     SAP
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com