Results 201 - 225 of 242Sort Results By: Published Date | Title | Company Name
By: GeoTrust     Published Date: Jan 21, 2016
No todos los certificados SSL son iguales y, aunque no se pueden clasificar como «seguros» o «no seguros», cada uno inspira un nivel de confianza diferente en los visitantes. Este libro blanco le ayudará a escoger el nivel de validación que necesita.
Tags : 
By: Symantec     Published Date: Nov 30, 2015
A confiança naqueles com quem fazíamos transações e a confiança de que as informações de compra que fornecíamos estariam seguras. Afinal, como sempre acontece, onde houver dinheiro haverá criminosos ansiosos por tirar proveito das crescentes oportunidades.
Tags : 
By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
By: eROI     Published Date: Jan 23, 2007
Email marketing was an unexplored avenue for Meade Auto and they were open to its potential as a tool to help create awareness and sell cars. Learn how eROI helped Meade to implement a successful email marketing campaign for their Lexus dealerships that surpassed their expectations.
Tags : email marketing, newsletter design, viral marketing
By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based, policy-based, mirage, mirage networks
     Mirage Networks
By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : piracy, copyright, copyright infringement, digital piracy, fcc, envisional
By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding
By: TRIRIGA     Published Date: Jul 27, 2007
Leaders in every industry perform sale-leaseback transactions to unlock the value of real estate, improve the balance sheet and realize tax benefits. The paper discusses how sale-leasebacks enhance financial ratios, elevate operations and re-focus real estate strategies on profitability rather than logistics.
Tags : sales-leaseback, sale-leaseback, sales leaseback, sale leaseback, real estate, balance sheet, tax benefits, leased properties, lease management, lease, triraga, bottom-line, financial ratios, triraga
By: GlobalSpec     Published Date: Nov 21, 2008
Gain practical tips for making marketing work in a difficult business environment, helping to prevent a downward spiral of falling behind, gain market share from competitors who cut back, and position your company for a surge when conditions improve.
Tags : globalspec, engineering, technical, industrial marketers, marketing investments
By: BMC ESM     Published Date: Jul 17, 2009
Are you looking for new inspiration to move forward with ITIL in these tough economic times? Join us as we talk with Erin Casteel, Solutions Architect with BMC Software and draw on Erin's wealth of experience as an ITIL consultant for tips on leading change in the organization. Learn how you can avoid reinventing the wheel, what it really means to sell ITIL in the organization, and why it pays to find opportunities in crises.
Tags : itil, bmc, tough times, economy, organization, software, iso, architecture, change, crises, recession, cost cutting, strategy, itil adoption, it infrastructure library
     BMC ESM
By: DIR Incorporated     Published Date: Jan 13, 2011
Many companies have a goal of creating messages with "viral" appeal and content. The value of viral sharing is that a message is broadcast and passed along from one person to the next to a rapidly growing audience. This is in
Tags : viral marketing, social media, online marketing, interactive marketing, dir incorporated
     DIR Incorporated
By: Shay Stewart     Published Date: Feb 06, 2011
Analysis of the New Iraqi Dinar
Tags : iraq, dinar, currency, investment, speculation
     Shay Stewart
By: GMS Inc     Published Date: May 18, 2011
Insights into the service and support offerings of GMS and business software providers alike
Tags : accounting, causes, charity, community, consultants, donation, donations, donorexpress, donorperfect, donorworks, education, environment, finance, fundraising, funds, grants, inspiration, loans, non-profit, nonprofits
     GMS Inc
By: Keynectis     Published Date: Aug 03, 2011
Tips for safe purchasing on the Internet. Good practices. Dangers. What to avoid. Recommendations. How can SSL help.
Tags : ssl, phishing, piracy, internet, fraud, e-commerce
By: Spredfast, Inc.     Published Date: Oct 03, 2013
The Making of a YouTube Blockbuster: 10 YouTube Blockbusters
Tags : spredfast, youtube, youtube blockbuster, viral videos, marketing efforts
     Spredfast, Inc.
By: Spredfast, Inc.     Published Date: Mar 04, 2014
Are you ready to make the most of your social strategy and build lasting relationships?
Tags : spredfast, viral video, online video, marketing, social strategy
     Spredfast, Inc.
By: Globoforce     Published Date: Jan 17, 2012
Successful recognition programs are the ones that are adopted virally. Learn how innovative communication techniques can turn your recognition strategy into unequivocal success.
Tags : globoforce, human resources, recognition programs, performance management, employee management
By: CSB by Cornerstone on Demand     Published Date: Aug 10, 2012
When all my good work and planning has been undone, I like to visit pinterest, where I've built a utopian world filled with "when I grow up" aspirations.
Tags : performance management, sonar6, pinterest
     CSB by Cornerstone on Demand
By: BlackBerry     Published Date: Oct 03, 2012
RIM recently worked with Park Manor Public School in Elmira, ON to integrate BlackBerry PlayBook tablets in two Grade 6 classrooms. Check out this great story on the value of PlayBook tablets in Education!
Tags : tablets, blackberry, rim, classroom applications, real world applications, mobile computing
By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : internet, security, cryptocurrency, data, breaches, botnet
By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
By: Epicor     Published Date: Oct 29, 2018
Every lawn and garden retailer wants to win—to be profitable, to grow, to be regarded as the go-to source in their community for quality products and service. Not every retailer will come out on top, though, and those who do have a secret. That “secret sauce” is what all of us strive to identify. Those who’ve done it already know there’s not a single recipe. Why? Markets, economies, locations, and competition vary—and so do retailers’ aspirations.
Tags : 
By: CA Technologies     Published Date: Jun 04, 2015
Muito se fala sobre DevOps, uma metodologia que reúne função antes distintas de desenvolvimento de software (Dev), de produção e operações (Ops) em um processo comum, integrado e contínuo. DevOps quebra as barreiras entre o desenvolvimento, a produção e as operações. Utiliza pessoas, processos e tecnologia para estimular a colaboração e a inovação nos processos de desenvolvimento e liberação de software. O o desenvolvimento, a produção e as operações deveriam sempre fazer parte de um processo integrado, mas isso nem sempre é tão fácil como parece. Você pode se perder no que chamamos de “Dysfunction Junction”. Leia este eBooklet e conheça os obstáculos de DevOps, como evitá-los e os primeiros passos para chegar lá.
Tags : 
     CA Technologies
By: VMware AirWatch     Published Date: Oct 02, 2015
John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: