ira

Results 101 - 125 of 262Sort Results By: Published Date | Title | Company Name
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
     Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
     Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Os dispositivos da Zebra com Android oferecem aos clientes experiências de compras consistentes e gratificantes que criam fidelidade, enquanto os associados se beneficiam de maneiras muito mais eficientes de se comunicar e gerenciar o estoque.
Tags : mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
     Zebra Technologies
By: Justworks     Published Date: Sep 27, 2017
This eBook will walk you through the process of selecting a comprehensive benefits package for your team and budget. Specifically, you’ll learn how to select a desirable benefits package, navigate the legal waters of some of those benefits, and choose a provider for your small business.
Tags : 
     Justworks
By: Justworks     Published Date: Sep 26, 2017
This eBook will walk you through the process of selecting a comprehensive benefits package for your team and budget. Specifically, you’ll learn how to select a desirable benefits package, navigate the legal waters of some of those benefits, and choose a provider for your small business.
Tags : 
     Justworks
By: OKTA     Published Date: Sep 26, 2017
Cyberbreaches aren’t just in the news—they are the news. Yet headlines rarely mention the No. 1 source of those breaches: weak or stolen passwords. Whether they involve malware, hacking, phishing, or social engineering, the vast majority of breaches begin with account compromise and credential theft, followed by dormant lateral network movement and data exfiltration. In fact, weak or stolen passwords account for a staggering 81% of breaches, according to the Verizon 2017 Data Breach Investigations Report. Not surprisingly, a new Okta-sponsored IDG survey finds that identity access management (IAM) is a top priority for nearly three-quarters (74%) of IT and security leaders. Yet the same survey uncovers widespread concern that their current IAM implementations are falling short. Just one worrisome example: Fewer than one-third (30%) of respondents report a good or better ability to detect a compromise of credentials. The following report explores the gap between respondents’ aspiratio
Tags : 
     OKTA
By: NetApp     Published Date: Sep 21, 2017
This report provides insight into how 250 global IT professionals are currently using storage automation, the challenges they face, and their aspirations in next generation data center technology.
Tags : netapp, database performance, flash storage, data management, cost challenges, automation
     NetApp
By: The Starr Conspiracy     Published Date: Sep 19, 2017
The true failure points for startups in the HCM tech segment are less obvious than a lack of money and poor product quality. Download our latest Lightpaper®, “Why HCM Tech Startups Fail,” and receive a breakdown of the patterns we have witnessed time and time again that cause many startups to lose their way and end up in the junk pile.
Tags : 
     The Starr Conspiracy
By: The Starr Conspiracy     Published Date: Sep 19, 2017
It doesn’t matter if your goals involve brand awareness, functional association, or demand generation. Brands that fail to integrate an earned media strategy with paid and owned media strategies are missing key opportunities to influence the buyer’s journey. If you ignore earned media channels, you do so at the risk of missing that ideal customer. In this white paper, we’ll outline the top three reasons you need an integrated approach — that includes PR — to achieve great brand awareness
Tags : 
     The Starr Conspiracy
By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity
     IBM APAC
By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : phishing, malware, des individus pris pour cible
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le piège tendu par un imposteur est plus facile qu'il n'y paraît. Imaginez le scénario suivant : vous travaillez pour une importante société qui a récemment procédé à plusieurs acquisitions. Votre travail consiste à régler les factures. Un matin, vous recevez un message de votre PDG actuellement en déplacement. Il vous demande de virer des fonds afin de pouvoir entamer les négociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu'à la conclusion de l'accord.
Tags : directeur opérationnel, directeur financier, ressources humaines, service financier, gestion des salaires
     Proofpoint
By: Akamai Technologies     Published Date: Aug 17, 2017
The largest DDoS attacks have increased greatly in strength, doubling in attack size during 2016. They are bigger, more complex, and require more expertise to defend against than past Distributed Denial-of-Service (DDoS) attacks. They are not limited to a specific industry.
Tags : mira botnet, cyber attack, ddos, security
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Das Mirai-Botnet nutzt Hunderttausende von internetfähigen Geräten, die nur über ein schwaches standardmäßiges Kennwort verfügen. Durch Installation von Malware übernimmt Mirai die Kontrolle über die Geräte und errichtet auf diese Weise eine weltumspannende Armee von infizierten Bots. Bis zum Zeitpunkt der Attacke durchsucht jedes betroffene Gerät das Internet nach weiteren angreifbaren Geräten und infiziert diese. Das Internet der Dinge besteht aus Milliarden von Geräten, die Daten senden und empfangen können und heutzutage fast überall anzutreffen sind. Private Sicherheits- und Unterhaltungsgeräte wie Internetkameras, digitale Videorecorder (DVR) und Router werden häufig mit der Mirai-Malware infiziert.
Tags : 
     Akamai Technologies
By: Quick Base     Published Date: Aug 07, 2017
Many financial leaders struggle to find enough time to do everything needed because they must deal with manual processes and clunky spreadsheets. If you're concerned about wasting time by manually collecting financial data, find out how to conquer spreadsheets with the power of automation. You'll learn key trends and insights backed by research and hear real-world examples and best practices for financial automation. You'll come away with the practical tips and inspiration you need to improve team performance, mitigate financial risk, and increase business impact.
Tags : 
     Quick Base
By: Curalate     Published Date: Aug 02, 2017
People control their own consumer journeys. Consumers expect a borderless world in which they roam freely between a brand’s social media channels, email campaigns, blogs and e-commerce site, effortlessly buying things that catch their eye. It’s led to a sporadic, personalized shopping journey that frequently begins on digital touchpoints that weren’t built for commerce. That’s made it increasingly complex for brands hoping to meet customers’ needs and measure the results of their marketing strategies. At the center of this new customer-driven revolution is visual content. Images and videos play starring roles in the decisionmaking process, and provide consumers with a whole new level of inspiration and knowledge. Every picture and video clip is now the entrance to a digital storefront, meaning brands can use them to drive not only engagement but revenue.
Tags : visual commerce, personalized shopping, e-commerce, email campaigns, blog, media channel, branding
     Curalate
By: Curalate     Published Date: Aug 02, 2017
Dune London partnered with Curalate. Leveraging Curalate, Dune was able to source inspirational images from a variety of online sources and connect them to places of purchase. These sources included content created by customers, influencers, as well as Dune itself. In doing so, Dune was able to get more out of their existing investments in content while inexpensively acquiring compelling images from sources outside the organization.
Tags : dune london, curalate, customers, influencers, content
     Curalate
By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Employee management tools that are paper-driven and spreadsheet-oriented are no longer viable workforce development strategies. The modern worker wants performance evaluations to be goal-oriented and feedback-focused, with learning opportunities that are self-driven and personalized to their own career aspirations. Combining Performance with Learning helps employees and managers create meaningful career-building plans that lead to bottom line growth.
Tags : management tools, performance evaluations, bottom line growth, workforce development
     Cornerstone OnDemand
By: Urban Airship     Published Date: Jul 24, 2017
An app message center allows you to reach your entire app audience - including those opted-out of push notifications. Research shows a quarter of those opted out of push notifications read message center content, and more than half of your opted in audience does. Not only that, high-performing message center content generates 8x the read rate of push notifications. Check out our Inspiration Guide to see 20 examples of how companies are putting message centers to work to better address and grow their mobile audiences.
Tags : messaging, notifications, message center, technology, mobile audience
     Urban Airship
By: Urban Airship     Published Date: Jul 24, 2017
Thinking about adding web notifications to your marketing mix? Download our Web Notifications Inspiration Guide for: The 3 kinds of messages every brand should consider sending via web notifications How web push notifications can fit into (and help you get more value from) your current messaging and notifiation strategy 15 use cases that will spark ideas for your brand See how web notifications can help you can deepen connections and engagement with your web visitors. Get the guide today.
Tags : notifications, messaging, marketing, branding, web traffic
     Urban Airship
By: Urban Airship     Published Date: Jul 24, 2017
Rich Notifications give marketers and mobile leaders the ability to engage their customers more deeply by including photos, videos, GIFs and even audio — right on a user’s lockscreen. August 2016 research shows Rich Notifications that include pictures see a 56% higher direct open rate on average than notifications without images. We created this Inspiration Guide to help you envision new possibilities and quickly understand how to implement Rich Notifications with Urban Airship Engage for smarter, more responsive campaigns that lead to better user experiences.
Tags : rich notifications, open rate, images, user experiences, customer engagement
     Urban Airship
By: The Starr Conspiracy     Published Date: Jun 29, 2017
HCM marketing has messed up something that should really be a lot of fun: trade shows. Sorry, trade show fans.
Tags : 
     The Starr Conspiracy
By: The Starr Conspiracy     Published Date: Jun 29, 2017
Why HCM Tech Startups Fail, a breakdown of the patterns we have witnessed time and time again that cause many startups to lose their way.
Tags : 
     The Starr Conspiracy
By: The Starr Conspiracy     Published Date: Jun 29, 2017
In this report, discover what’s important to learning buyers and what has changed with them since 2014.
Tags : sales engagement, active evaluation, brand and need awareness, sales leveraging, trade show, active evaluation
     The Starr Conspiracy
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com