dam

Results 826 - 850 of 911Sort Results By: Published Date | Title | Company Name
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
     Godfrey
By: Network Automation     Published Date: Dec 02, 2008
The Vanderburgh County Highway Department encompasses the Highway, Local Roads, and Street and Cumulative Bridge departments within the Vanderburgh County Government. About 55 employees within these departments handle public works and general maintenance for 560 lane miles of Vanderburgh County roads, including general road repairs and resurfacing, right-of-way mowing, roadway ditch maintenance, tree maintenance and emergency response to weather conditions such as storm damage and snow removal.
Tags : network automation, business process automation, automatic vehicle location, it management
     Network Automation
By: MoreVisibility     Published Date: Jun 04, 2012
Want to maximize your PPC advertising efforts? Take a moment to see what best practices we advise to ensure search engine marketing success.
Tags : 
     MoreVisibility
By: Symantec.cloud     Published Date: Dec 06, 2010
This white paper discusses the fundamentals of financial services compliance.
Tags : messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas
     Symantec.cloud
By: Extensis     Published Date: Dec 03, 2009
A straightforward guide to defining an efficient workflow, creating catalogs, organizing your files and more.
Tags : extensis, dam, digital asset management, workflow, efficient work, metadata, digital asset management'
     Extensis
By: IBM Software     Published Date: Oct 15, 2010
Read this Gartner report to find out what questions Gartner clients are asking about the IBM Cognos road map.
Tags : ibm cognos, business intelligence, bi suite, analytics fundamentals, customer management, tco
     IBM Software
By: GoToTraining     Published Date: Apr 06, 2011
In this eBook, Terrence Gargiulo, president of makingstories.net, explores the fundamentals of online learning, including drivers, benefits and how to create an online learning strategy that maximizes business value.
Tags : citrix gototraining, virtual learning, virtual training, online learning strategy, live online learning, social media, cbt, web-based learning, e-learning
     GoToTraining
By: Adam Phones Ltd     Published Date: Dec 21, 2010
One in three SMEs and half of larger enterprises still do not have a company policy in place to govern the procurement and management of their mobile and wireless services
Tags : mobile, wireless, data, tariff
     Adam Phones Ltd
By: HP and Intel® Xeon® processors     Published Date: Nov 30, 2011
Taneja Group highlights the fundamental phenomenon happening around server virtualization by identifying strategic actions that enterprises need.
Tags : foundation, virtualization, virtual, infrastructure, foundation, core storage, storage
     HP and Intel® Xeon® processors
By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
     IBM Corporation
By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network
     Endace
By: Oracle     Published Date: Dec 03, 2012
This white paper examines some of the fundamental problems that fragmented IT systems are causing for HR functions that have adopted, or are planning to adopt, the Ulrich model.
Tags : the ulrich model, hcm, human capital management, hcm cloud applications, strategic hr
     Oracle
By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : sage, social media, human resources, recruit, risk, intellectual property
     Sage
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : market engineering, ddos attacks, it security
     Arbor
By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security, enterprise applications, data management
     IBM
By: Oracle     Published Date: Jul 05, 2017
Tornadoes and floods hitting the Midwest, mudslides and wildfires on the West Coast, hurricanes ravaging the Gulf Coast, and blizzards blanketing the Northeast are just a few of the natural disasters that can be incredibly frightening and damaging due to their unpredictable nature. They can hit anytime and anywhere.
Tags : data center preparedness, intelligent load balancing, dns time to live, monitoring, customer relations, roi
     Oracle
By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : cyberespionage attacks, range of targets, security, spying, damage or disruption
     Symantec
By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
     IBM
By: IBM     Published Date: May 02, 2014
This eBookoutlines the best practices for data lifecycle management and how InfoSphere Optimsolutions enable organizations to support and implement them.
Tags : ibm, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management, big data strategy, it management
     IBM
By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
     NAVEX Global
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management
     AlienVault
By: NetApp     Published Date: Nov 14, 2017
Improved data sharing, mobility, and elasticity are the fundamental benefits for hybrid cloud storage environments. Read this report and discover the next-generation hybrid cloud storage technologies that are already available and ready to bridge the gap between your on-premises applications and data and leading cloud storage services, such as AWS, Google Cloud Storage, and Microsoft Azure.
Tags : 
     NetApp
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com