dam

Results 351 - 375 of 856Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Cisco
By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: Cisco     Published Date: Sep 14, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive.
Tags : 
     Cisco
By: Adobe     Published Date: Sep 12, 2017
Learn why 78% of marketers say the right digital asset management system can fast-track time to market and ensure that your content flows free and easy.
Tags : 
     Adobe
By: Entelo     Published Date: Sep 06, 2017
We searched high and low to find every top recruiting and HR conference happening around the world between July and December of 2017. From London and Omaha, to Amsterdam and San Francisco, you'll find nearly 100 events to choose from. Inside you’ll find actionable intel to help you make informed, decisions about which conferences and events best fit your professional goals and organizational imperatives, including: The full rundown on conferences and meetups happening through the end of 2017, focused on recruiting, human resources, talent management, diversity and inclusion, and more Dates, locations, and cost breakdowns to make planning a cinch Keynote speakers and interesting sessions that we’ve got our eyes on Recommendations on who should attend each conference Which events Entelo will be attending, sponsoring or presenting Download your copy of the Ultimate Guide to start planning where you're headed this Summer and Fall!
Tags : 
     Entelo
By: Entelo     Published Date: Sep 06, 2017
With tech talent in high demand, understanding the networks engineers live and work in is fundamental to finding qualified people and establishing rapport. Learn how to leverage GitHub, Stack Overflow, and Hacker News to identify relevant candidates, assess their skill sets, and boost your company's engineering brand to stand out from competing recruiters. GitHub Lead Talent Strategist Tessa Wilder joins us to share recommendations on how to best use GitHub to connect with engineers. In this webinar, you'll learn: How to read a GitHub profile to understand an engineer's contributions, impact, and how to cross-reference this info with resumes and other social profiles Ways to use Stack Overflow's reputation score and tags to find active, notable engineers How to (tastefully) utilize Hacker News beyond a social news site to generate interest with tech candidates and find those actively seeking new opportunities
Tags : 
     Entelo
By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
     Lookout
By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
     F5 Networks Inc
By: IBM APAC     Published Date: Aug 25, 2017
Digital technologies have altered how people and businesses interact. Digital forces have created unprecedented levels of industry dislocation and are fundamentally changing business economics. To succeed in this disruptive environment,organizations will need to offer compelling new experiences, establish new focus, build new expertise and devise new ways of working. Business leaders will face a stark choice: Either digitally reinvent their enterprises, or watch as their businesses decompose around them. Successful Digital Reinvention will involve a fundamental reimagining of how an organization operates and how it engages with its environment.
Tags : technology factors, market factors, macroeconomic, technological disruption, regulatory concerns, socioeconomic factors
     IBM APAC
By: CA Technologies     Published Date: Aug 24, 2017
In dem Maße, in dem Unternehmen ihre On-Premise-Daten und -Anwendungsfunktionen für Partnerunternehmen, das Internet, mobile Anwendungen, intelligente Geräte und die Cloud zugänglich machen, verschwimmen branchenübergreifend die Grenzen des traditionellen Unternehmens. Die Grundlage dieses neuen, offenen Unternehmens sind APIs (Anwendungsprogrammierschnittstellen), denn damit können Unternehmen die vorhandenen Informationen unternehmensübergreifend für mehrere Zwecke auf einmal nutzen.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
     CA Technologies
By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : digital future, digital revolution, data integration, positioning
     Kofax
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 21, 2017
Wenn Sie noch nicht zu den Vorreitern zählen, aber einer werden möchten, lesen Sie weiter. Abteilungen arbeiten darauf hin, mehr Agilität für ihre Unternehmen zu erreichen. Dies ist sehr mühsam, aber Sie werden die Belohnungen dafür erhalten. Sogar wenn Sie nur den ersten Schritt abschließen, werden Sie echte geschäftliche Ergebnisse sehen. In diesem Artikel erfahren Sie, wie Sie: • Schritte identifizieren, mit denen Sie Ihre Abteilung transformieren und die Geschäftsflexibilität erhöhen können; • herausfinden, was Sie tun können, damit jeder Schritt Ihrer Transformation Fuß fasst; • die Änderungen an der Denkweise erkennen, die Sie benötigen, um das organisatorische Gleichgewicht zu erreichen und aufrechtzuerhalten, das den Mitarbeitern regelmäßige und schnelle Reaktionen auf Veränderungen ermöglicht.
Tags : 
     CA Technologies
By: Oracle     Published Date: Aug 17, 2017
Damit ein Treueprogramm ein echter Erfolg wird, muss es sowohl den Gästen als auch dem Restaurantbetrieb einen Mehrwert liefern. Um Gastronomiebetrieben aufzuzeigen, was Gäste von einem Treueprogramm erwarten, hat Oracle Hospitality eine globale Verbraucherstudie durchgeführt. Auf den folgenden Seiten finden Sie die Antworten auf diverse Fragen, darunter: • Welche Belohnungen schätzen Gäste am Treueprogramm eines Restaurants am meisten? • Bevorzugen Sie Stempelkarten aus Papier? Mobile Apps? Magnetkarten aus Kunststoff? • Aus welchen Gründen nehmen Sie nicht an einem Treueprogramm teil? • Warum verlassen Sie ein Treueprogramm oder nutzen es nicht mehr? • Welches Restaurant-Treueprogramm gefällt Ihnen am besten?
Tags : magnetkarte aus kunststoff, stempelkarte aus papier, mobiltelefon-app, registrierte telefonnummer, oracle
     Oracle
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
     Symantec
By: Akamai Technologies     Published Date: Aug 11, 2017
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
     Juniper Networks
By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a series of articles Paul Gerrard, a testing guru and consultant, discusses a range of testing topics. Test models are fundamental to testing and, in this article, Paul talks about the art of creating and using models. If testers are “shifting left,” pairing with developers or at least working more closely with developers, testers (and developers) need to be able to create models, learn how to articulate and share them, and support better collaboration.
Tags : testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
     CA Technologies EMEA
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com