high tech

Results 501 - 525 of 558Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
     Symantec
By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : mobile, security, technology, deployment, enterprise, crow sourced, intelligence
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Symantec Corporation     Published Date: Oct 03, 2013
Over the past decade, businesses have had to adapt to an array of technical changes, including an increasingly hostile cyber environment. We saw the early precursors of cybercrime decades ago when computer use was limited to a relatively small group of specialists and electronics enthusiasts. Innovative programmers, some still in high school, would find ways to display annoying messages on their friends’ computers and from there spread to other devices via shared floppy disks.This kind of part practical joke-part vandalism form of malware has been overshadowed by the more serious, technically complex, and financially lucrative form of today’s cybercrime. In this guide, we will examine major types of threats to information security that businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Tail-f Systems     Published Date: Oct 01, 2008
The complexity and size of networks are increasing dramatically. This is placing new demands on network operators to deploy networks in an affordable and effective manner. NETCONF is a new IETF standard that is redefining the way in which network devices are configured using a highly-scalable, XML-based, machine-to-machine protocol. This webinar will provide a technological update on NETCONF.
Tags : netconf, ietf standard, xml-based network management, configuration management, networking
     Tail-f Systems
By: Taleo     Published Date: May 08, 2009
This paper provides insights into recruiting practices that enable acquiring and retaining a high quality workforce. Uncover new sourcing, assessment, process, and green opportunities to cut recruiting costs by quantifying the reduction of direct costs savings and benefits from technology.
Tags : talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
     Taleo
By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
     Tenable
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
     Thawte
By: The FeedRoom     Published Date: Mar 31, 2009
Many companies still are experimenting with different ways to use Web video in order to squeeze more efficiency out of their on-going operations. New, creative applications of the technology are emerging every day, helping organizations to achieve high returns on investment from their spending on the technology.
Tags : feedroom, communications, web, video, online video, emerging markets, video enhancement, outbound marketing, rich media, multimedia
     The FeedRoom
By: TIBCO Software     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Aug 15, 2018
World leader in design and manufacture of innovative sensing solutions that enhance safety, security, and energy efficiency. For this manufacturers of high-tech imaging systems, monitoring accuracy and product quality are critical. Any quality problem could mean a part fails sooner than expected, or triggers a false alarm at a customer site that causes unnecessary panic. By setting up automated manufacturing analytic workflows with the TIBCO StatisticaTM platform, the company can complete complicated processes in just a few minutes and improve product quality by decreasing the variability of everything they produce.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Feb 26, 2019
MoneyLIVE’s annual survey of over 600 banking professionals found that traditional banks face a significant challenge when it comes to building AI-powered customer journeys. 75% believe that as the use of AI intensifies, banks will struggle to recruit the necessary expertise. 84% fear regulatory and liability issues surrounding AI. Just 7% think their organization’s use of AI is highly sophisticated. But for banks to keep pace with challengers and FinTechs, it’s crucial that they harness this continually evolving technology. Download this chapter of MoneyLIVE's The Future of Retail Banking Report 2018/19 now and understand how TIBCO’s Connected Intelligence Platform, with the use of AI and machine learning algorithms, can help with banks’ digital transformation needs.
Tags : artificial intelligence, machine learning, financial services, retail banking
     TIBCO Software
By: TIBCO Software     Published Date: Aug 26, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Sep 03, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs.
Tags : 
     TIBCO Software
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Enterprises use data virtualization software such as TIBCO® Data Virtualization to reduce data bottlenecks so more insights can be delivered for better business outcomes. For developers, data virtualization allows applications to access and use data without needing to know its technical details, such as how it is formatted or where it is physically located. For developers, data virtualization helps rapidly create reusable data services that access and transform data and deliver data analytics with even heavylifting reads completed quickly, securely, and with high performance. These data services can then be coalesced into a common data layer that can support a wide range of analytic and applications use cases. Data engineers and analytics development teams are big data virtualization users, with Gartner predicting over 50% of these teams adopting the technology by 202
Tags : 
     TIBCO Software GmbH
By: Tippit, CRM     Published Date: May 15, 2009
Today's Customer Relationship Management (CRM) solutions aim to recapture the personalized customer service provided by local mom-and-pop shops of yore – except with high-tech-analytics capabilities, collaborative platforms and automated processes. By gathering information from multiple data sources and storing it in a centralized location, a hosted CRM solution provides a holistic view of a customer in real time. Armed with this insight, a company’s management, sales and service people can better generate leads, target top customers, manage marketing campaigns, drive sales and boost customer satisfaction.
Tags : tippit, marketing, analytics, sales force automation, crm, onyx software, rightnow technologies, enterprise applications
     Tippit, CRM
By: Trifacta     Published Date: Nov 02, 2018
In the latest report, Forrester evaluated 10 top data preparation solutions against 18 criteria, grouped into categories of Current Offering, Strategy and Market Presence. See how each data prep provider compares and who received the highest scores. Download your copy today to review: What are the key technical differentiators for data preparation solutions Which user personas do data preparation solutions focus on Why ownership of data preparation is transitioning from IT to business end users
Tags : 
     Trifacta
By: TYAN     Published Date: Jun 06, 2016
Organizations that implement high-performance computing (HPC) technologies have a wide range of requirements. From small manufacturing suppliers to national research institutions, using significant computing technologies is critical to creating innovative products and leading-edge research. No two HPC installations are the same. For maximum return, budget, software requirements, performance and customization all must be considered before installing and operating a successful environment.
Tags : 
     TYAN
By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most — even in tech, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the codes of the high-tech world would indicate that “hard” elements, such as cost, quality and efficiency, are more compelling to this audience, new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, high-tech executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they relied on most to help them make decisions.
Tags : 
     Tyco Integrated Security
By: Urban Airship     Published Date: Jul 08, 2012
Consumers adopt convenient services and products that offer immediacy and simplicity through highly contextual experiences. The ability to deliver this will evolve in sophistication with smartphone technology. Discover key principles that maximize opportunities and conversions.
Tags : push notifications, mobile messaging, mobile marketing, ebusiness, emarketing, digital marketing, mobile advertising
     Urban Airship
By: Vertica     Published Date: Oct 30, 2009
Independent research firm Knowledge Integrity Inc. examine two high performance computing technologies that are transitioning into the mainstream: high performance massively parallel analytical database management systems (ADBMS) and distributed parallel programming paradigms, such as MapReduce, (Hadoop, Pig, and HDFS, etc.). By providing an overview of both concepts and looking at how the two approaches can be used together, they conclude that combining a high performance batch programming and execution model with an high performance analytical database provides significant business benefits for a number of different types of applications.
Tags : vertica, analytical computing, adbms, mapreduce, application management, data management, data mining
     Vertica
By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability, uptime, maximizing uptime, downtime, minimizing downtime, vision, vision solutions, journaling
     Vision Solutions
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com