transact

Results 151 - 175 of 680Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
     Oracle
By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Les opérations de bases de données sont cruciales, tant par l’importance qu’elles revêtent pour votre entreprise que par leur ampleur même. Les tests que nous avons réalisés avec le serveur Dell EMC PowerEdge R930 et la baie de stockage Unity 400F All Flash montrent que cette solution offre des performances comparables à celles d’un serveur HPE ProLiant DL380 Gen9 et d’une baie 3PAR sur les charges applicatives OLTP, avec un taux de compression supérieur (3,2 pour 1 contre 1,3 pour 1). Pour le chargement de vastes ensembles de données, la baie Dell EMC Unity s’est montrée 22 pour cent plus rapide que la baie HPE 3PAR, ce qui peut faciliter la tâche de l’administrateur chargé des DataMarts. Lors de l’exécution simultanée des charges applicatives OLTP et DataMart, la baie Unity a surpassé la baie HPE 3PAR, avec 29 pour cent de commandes traitées en plus par minute.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Les algorithmes de compression réduisent le nombre de bits nécessaires pour représenter un ensemble de données. Plus le taux de compression est élevé, plus cette technique de réduction des données permet d’économiser de l’espace. Lors de notre test OLTP, la baie Unity a atteint un taux de compression de 3,2 pour 1 sur les volumes de base de données. De son côté, la baie 3PAR affichait en moyenne un taux de 1,3 pour 1. Sur le test de chargement DataMart, la baie 3PAR a atteint un taux de 1,4 pour 1 sur les volumes de bases de données, tandis que la baie Unity enregistrait un taux de 1,3 pour 1.
Tags : 
     Dell PC Lifecycle
By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure, software authentication platforms
     Entrust Datacard
By: IBM     Published Date: Dec 06, 2013
Most enterprise datacenters are so cluttered with individually constructed servers, including database servers, that staff time is largely taken up with just the maintenance of these systems. As a result, IT service to business users suffers, and the agility of the enterprise suffers. Integrated systems represent an antidote to this problem. By dramatically reducing the amount of setup and maintenance time for the applications and databases they support, integrated systems enable the technical staff to spend more of their time supporting users and enabling the enterprise to thrive.
Tags : ibm, ibm puredata system, transaction, datacenter, data management, integrated system, configuration, consolidation, enterprise applications, data center
     IBM
By: Microsoft Dynamics CRM     Published Date: Mar 11, 2010
Covering All Points of Attack. As the availability of product and service information on the Internet grows, both the providers and receivers of service have larger networks through which to communicate, interact and transact.
Tags : microsoft dynamic crm, service delivery, contact center, customer satisfaction, customer relationship management
     Microsoft Dynamics CRM
By: Sparton Corporation     Published Date: Oct 09, 2018
Manufacturing suppliers range from approved vendors and contract manufacturers (CMs) who only deliver materials and services to complex strategic partnerships. A transactional relationship based primarily on order fulfillment might work well for some companies. However, by taking a CM relationship to the next level of supplier-partner, organizations gain strategic benefits including cost savings, reduced risks, and optimized profits. The right cultural fit and the right-sized partner for your business can play a key role in building this long-term relationship.
Tags : 
     Sparton Corporation
By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws
     Docusign
By: IBM     Published Date: Jan 26, 2016
Read this in-depth ebook to learn what industry standards look like, how they work, and the ways they enable automated exchanges of business transactions and information.
Tags : ibm, b2b, integration, industry, standards, processing, enterprise applications, data management
     IBM
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
     DigitalPersona UK
By: IBM     Published Date: Mar 28, 2008
The dominant provider of investment processing services in the U.S., DTCC sought to parlay its record of service innovation and cost leadership by expanding globally. DTCC teamed with IBM to re-architect its core processing infrastructure to enable it to push its already world-leading transaction capabilities even further to accommodate DTCC's global growth vision.
Tags : 
     IBM
By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : mobile applications, ecosystem, risk, defense, application, risk
     HP - Enterprise
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets, security
     ArcSight
By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
     SAS
By: Docusign     Published Date: Feb 19, 2015
À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.
Tags : docusign, la signature electronique
     Docusign
By: Riverbed     Published Date: Jul 10, 2017
Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result, detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code.
Tags : application performance, performance issues, complex infrastructure, transactions
     Riverbed
By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws
     Docusign
By: Cisco     Published Date: Feb 23, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video
Tags : cloud computing, cisco, contact center, best practices, cloud network, data center
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video. Cloud solutions allow contact centers to gain access to new technology capabilities and channels on demand with the ability to scale up quickly. They offer the best technology innovation as well as the ability to scale agents up and down as business needs change. This whitepaper provides background on cloud contact cen
Tags : 
     Cisco
By: Deluxe     Published Date: Mar 15, 2017
The financial services industry has been significantly impacted by the increasing use of technology from smartphones to wearables. This transformation in methods of transacting has enabled more personalized engagement, allowing customers to use multiple channels simultaneously to engage in seamless, multi-dimensional banking. This has also increased both the potential and complexity of creating a positive customer experience.
Tags : 
     Deluxe
By: Eloqua     Published Date: Nov 20, 2013
Reading and responding to your prospects’ digital buying behavior
Tags : oracle, eloqua, digital buying behavior, b2b, b2b transaction, marketing integration
     Eloqua
By: Eloqua     Published Date: Dec 18, 2013
Find out more about Digital Body Language. Download “Reading and Responding to Your Prospects’ Buying Behavior in the Online World”
Tags : oracle, lead delivery, buying behavior, oracle eloqua, marketing, buying patterns, b2b transactions
     Eloqua
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com