dam

Results 726 - 750 of 902Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 10, 2013
Zurich Insurance suffered a major flooding incident in 2011 that put their office out of commission for almost a month. The company invoked its disaster recovery plan and moved 120 staff to IBM’s Damastown Technology Campus. Read the case study to find out how planning and working with IBM helped Zurich Insurance cope with this serious incident.
Tags : disaster recovery, zurich insurance, flooding, recovery, natural disaster, disaster recovery plan, ibm
     IBM
By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring, sharepoint monitoring, monitor sharepoint, sharepoint health
     Metalogix
By: Oracle     Published Date: Nov 21, 2013
Today's Grande Guide explores a cutting edge marketing practice: Content Marketing. Our guide pays special, but not exclusive, attention to the role content marketing can play for B2B businesses.
Tags : zenithoptimedia, oracle, eloqua, rules on content, content marketing, grande guide, customer aquisition, lead generation, budget spent on content marketing, business development, conforming new ways, nurturing leads, content marketing fundamentals, identify audience, no spam, useful content
     Oracle
By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : ibm, it management, risk management, risk, risk management strategy, reputational risk, security
     IBM
By: IBM     Published Date: Sep 15, 2014
Application release and deployment practices are the backbone of the DevOps movement. Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk. Improve software deployment in your organization through innovative automation methods!
Tags : application release, deployment practices, software development, software delivery products
     IBM
By: Cisco     Published Date: Dec 21, 2016
It’s not easy to revolutionize longstanding technology norms. It takes vision, knowhow, determination, and most of all, industry acceptance. This edition of Unleashing IT showcases the groundswell of momentum surrounding Cisco® Application Centric Infrastructure (Cisco ACI™), which fundamentally transforms the way technology is delivered in support of business priorities. Hundreds of organizations are already using the year-old architecture, and we could not have achieved such rapid and widespread adoption without the enthusiasm and support of Intel®, our networking and application partners, and customers.
Tags : 
     Cisco
By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach, hackers, business security, security
     bitglass
By: Epicor     Published Date: Jun 30, 2014
Manufacturers that address the fundamental requirements know that “Top-to-Shop” isn’t an urban legend anymore. Those that have eliminated the disconnect between the shop floor and the top floor have succeeded in enhancing the extended supply chain. More importantly, their executive leadership consistently achieves business goals—with the help of those on the line and in plant, operations and management.
Tags : epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing, enterprise applications
     Epicor
By: Wyng     Published Date: Jul 13, 2015
The holiday season has become an increasingly competitive space for retailers over the past few years, with brands struggling to break through the noise to gain customer attention. Not only are brands expected to drive increased sales year over year, but they are also expected to create fun and relevant experiences for customers that ultimately drive engagement and support conversions. This fundamental shift in consumer behavior has complicated retailers’ marketing strategies, but also opens up the opportunity to more accurately target and cater to their different shoppers’ needs during the holidays. Download this ebook to learn how to increase Average Order Value, drive last minute purchases, increase sales, extend in-store shopping experiences, and make use of consumer data to inform future marketing decisions.
Tags : offerpop, retail marketing, customer engagement, consumer data, marketing solutions
     Wyng
By: FIBRWRAP     Published Date: Jan 08, 2016
Decades of continuous service of large diameter pressure pipelines leads to deterioration that threatens the structural integrity of piping systems. This white paper highlights the project background for repairing cement mortar lined steel piping discharge headers.
Tags : fibrwrap, cfrp, cement damage, repairs, engineering, construction, water pipes
     FIBRWRAP
By: Microsoft Office 365     Published Date: Sep 26, 2017
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations. In a 2014 study of 700 consumers about brand reputation by Experian and the Ponemon Institute, data breaches were reported as the most damaging occurrence to brand reputation, exceeding environmental disasters and poor customer service.1 In a world where data breaches have become commonplace, what steps can be taken to minimize damage?
Tags : 
     Microsoft Office 365
By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : cisco, threat, cybercrime, infrastructure, security
     Cisco
By: Cisco     Published Date: Dec 19, 2016
Cisco AMP for Endpoints is a cloud-managed endpoint security solution that provides the visibility, context and control to not only prevent cyberattacks, but also rapidly detect, contain, and remediate advanced threats if they evade front-line defenses and get inside—all cost-effectively, without affecting operational efficiency, and before damage can be done.
Tags : 
     Cisco
By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to National Cyber Security Alliance estimates. That’s not surprising when you consider how many small and medium-sized businesses (SMBs) still rely on legacy AV tools despite their repeated failures to stop modern malware, ransomware, and zero-day attacks. Legacy AV is a lose-lose-lose proposition for SMBs. Attacks get through and cause damage. IT staff struggle to keep up with endless signature file updates from their AV vendors. End-users complain about sluggish system performance during scans and signature file updates. Fortunately, next-generation solutions are now available that protect endpoints with artificial intelligence (AI) rather than signatures. Ready to learn more? Then read the new eSecurity Planet executive brief sponsored by BlackBerry Cylance.
Tags : 
     BlackBerry Cylance
By: IBM     Published Date: Jul 09, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas, recovery point objectives, rpo, recovery time objectices, rto, virtualized server recovery, it management
     IBM
By: IBM     Published Date: Oct 14, 2014
If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.
Tags : disaster recovery operations, cloud technologies, cloud computing, critical business aplplications, it management
     IBM
By: IBM     Published Date: Apr 09, 2015
Confused by all the agile advice? Relax! With Agile For Dummies by your side you’ll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : agile, ibm, productivity, software teams, customer satisfaction, software development, it management, enterprise applications, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
This white paper digs deep into the reasons testing mobile apps is fundamentally harder than traditional web or desktop applications. A collaboration by Tina Zhuo and Dennis Schultz from IBM along with Yoram Mizrachi from Perfecto Mobile and John Montgomery from uTest, these experts explore the complexities of mobile test environments, the value of the mobile device cloud, the unique role crowd sourcing can play, and how teams can leverage automation to help deliver quality apps.
Tags : mobile apps, mobile app testing, mobile device cloud, crowd sourcing, ibm, networking, software development, enterprise applications
     IBM
By: Act-On     Published Date: Aug 28, 2012
Read the top five reasons why B2B organizations should pay attention to long-term leads, and learn ten fundamentals for nurturing prospects from end to end, from that first contact to the closed deal.
Tags : lead nurturing, b2b, lead scoring
     Act-On
By: Act-On     Published Date: Aug 28, 2012
Seven foundational steps your company can take to set up a functional, cost-effective lead scoring strategy, including understanding the fundamentals of lead scoring.
Tags : lead scoring, lead generation, b2b marketing, generating roi
     Act-On
By: ComCorp     Published Date: Oct 08, 2009
Hiring a search engine optimization firm can be a difficult process. A skilled SEO firm will help you significantly increase the impact of your web presence, while a lesser firm will waste your money, and damage your online reputation. Yet, at least from the outside, the two can look relatively similar.
Tags : seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search, keywords, traffic generation, site traffic, web traffic, comcorp
     ComCorp
By: Jive     Published Date: Feb 12, 2015
Relive this webinar with leading industry analyst Brian Vellmure. Flanked by seasoned CIOs (and Jive customers) Tony McGivern of FICO and Patrick O’Hare of Spectrum Health, Brian explores how CIOs are taking the lead in guiding their organizations through a rapidly evolving technology landscape. Topics covered include: • Navigating internal politics to overcome technological inertia • Choosing infrastructure and platforms that allow rapid technology adoption at scale • Shifting focus to exploit a fundamentally different technological landscape • Balancing and evolving the role of CIOs from cutting costs to driving business strategy
Tags : enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
     Jive
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
     Q1 Labs
By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, enterprise applications
     Riverbed
By: Quantcast     Published Date: Feb 18, 2015
Wie hat die Evolution des digitalen Marketings und der Aufstieg von Programmatic Display die heutige Landschaft der Onlinewerbung geprägt? Diese Präsentation beleuchtet, welche Veränderungen die Onlinewerbung in den letzten 20 Jahren beeinflusst haben – vom ersten statischen Web-Banner bis zu dynamischen, personalisierten Werbemitteln, die über Real-Time-Bidding-Algorithmen ausgeliefert werden. Paco Panconcelli, Managing Director bei Quantcast Deutschland, zeigte die Möglichkeiten von Programmatic Display für Werbungtreibende und Mediaagenturen auf, damit sie das Beste aus der neuen, digitalen Welt herausholen.
Tags : quantcast, programmatic display, real-time-bidding, digitalen marketings
     Quantcast
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com