dam

Results 826 - 850 of 926Sort Results By: Published Date | Title | Company Name
By: TIBCO Software     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
     TIBCO Software
By: Workday Netherlands     Published Date: Apr 30, 2019
Het hoeft niet moeilijk te zijn om uw personeelsplan beter af te stemmen op uw zakelijke doelstellingen, zeker wanneer u het aan de basis goed aanpakt. In deze whitepaper worden de 10 fundamentele stappen voor het opstellen van een effectief strategisch personeelsplan uiteengezet en komt u te weten hoe technologie u kan helpen bij de implementatie.
Tags : workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday Netherlands     Published Date: May 21, 2019
Het hoeft niet moeilijk te zijn om uw personeelsplan beter af te stemmen op uw zakelijke doelstellingen, zeker wanneer u het aan de basis goed aanpakt. In deze whitepaper worden de 10 fundamentele stappen voor het opstellen van een effectief strategisch personeelsplan uiteengezet en komt u te weten hoe technologie u kan helpen bij de implementatie.
Tags : 
     Workday Netherlands
By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : virtualization, cloud services, security, encryption, safenet
     SafeNet
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: Point It     Published Date: Mar 02, 2009
Whether you’re an experienced marketing manager, or just starting your career, it’s imperative that you know the fundamentals of search engine marketing and optimization. If for no other reason, you certainly don’t want to let your boss know you’re a marketing dinosaur. This whitepaper details the top 10 myths and errors behind SEO.
Tags : point it, b2b search mistakes, seo, meta tags, meta keywords, crawl rate, pay per click, ppc
     Point It
By: IBM     Published Date: Jun 05, 2014
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : ibm
     IBM
By: IBM     Published Date: May 20, 2015
Whether in high-performance computing, Big Data or analytics, information technology has become an essential tool in today’s hyper-competitive business landscape. Organizations are increasingly being challenged to do more with less and this is fundamentally impacting the way that IT infrastructure is deployed and managed. In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.
Tags : 
     IBM
By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
     Tripp Lite
By: MoreVisibility     Published Date: Jun 04, 2012
Want to maximize your PPC advertising efforts? Take a moment to see what best practices we advise to ensure search engine marketing success.
Tags : 
     MoreVisibility
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
     Entrust Datacard
By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity and access management, saas applications, single sign-on, active directory, management solutions
     Okta
By: OKTA     Published Date: Mar 30, 2018
"The enterprise cloud revolution is here. IT organizations everywhere, from small and mid-sized to Fortune 500 companies, are moving from on-premises software to on-demand, cloud-based services. As enterprise IT makes this transition to a new hybrid on-demand/on-premises configuration, controlling access to applications becomes increasingly important. CIOs and their teams have a whole new set of identity management challenges; their role is also fundamentally changing. As the steward of these new services, IT must provide insight and advice about Software-as-a-Service (SaaS) products to ensure the company gets the highest business value of their investments. Read this eBook to learn eight main identity and access management (IAM) challenges of adopting and deploying cloud applications. And, most importantly, best practices for addressing each of them."
Tags : 
     OKTA
By: Okta     Published Date: Jul 27, 2016
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and provisioning solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : hidden costs, sexual harassment, toxic employees, employee behavior
     Cornerstone OnDemand
By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
     IBM APAC
By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
     Fidelis Cybersecurity
By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
     CA Technologies
By: Infosys     Published Date: May 21, 2018
Our client is a Finnish consulting and engineering company that deals with some of the world's toughest industries. Since 1958, the company has handled the power transmission system for the Swedish National Grid, revamped Salzburg railway station, and has been involved in 90 percent of the world's largest pulp mill designs. The nature of our client's work places unique demands on their IT infrastructure. Many of their projects require them to set up temporary offices in remote locations to deliver their engineering expertise, making seamless connectivity a critical business requirement. Large files, such as complex pipeline drawings, are passed between team members in different locations. Any outage that causes a delay in projects leads to potential financial penalties and damage to reputation.
Tags : landscape, company, industry
     Infosys
By: CDW     Published Date: Aug 04, 2016
As IT advances, organizations are adopting infrastructures that enhance agility and improve efficiency. Data centers are evolving to a state that is almost unrecognizable from only a few years ago. Numerous forces, such as cloud computing and powerful orchestration solutions, are combining to fundamentally change data centers, making them more powerful, sophisticated, flexible and efficient. Many organizations are adopting a hybrid infrastructure data center model that combines a variety of technologies and methodologies, including virtualization, private clouds and other internal IT resources, along with external options such as hosting, colocation, Software as a Service (SaaS) applications and Infrastructure as a Service (IaaS) offerings.
Tags : data center, best practices, technology, data, cloud, cloud computing
     CDW
By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : data security, enterprise, data protection, mobile security, anti spyware
     VMware AirWatch
By: Infor     Published Date: Feb 27, 2007
There's no place to hide and ride out the fundamental transformation underway in the automotive industry today. Ignore changes caused by this transformation and you risk your long-term survival. But with pains can come gains, and innovative automotive executives know there's a way to turn today's adversity into long-term business advantage.
Tags : supply chain management, productivity, enterprise resource planning, manufacturing, customer satisfaction, manufacturing, automotive, assembly line, infor
     Infor
By: Symantec     Published Date: Jun 13, 2018
El Reglamento General de Protección de Datos (GDPR) entra en vigor el 25 de mayo de 2018. Si necesita procesar datos personales de la Unión Europea (UE), posiblemente el GDPR aplica para usted, a pesar de no estar en la Unión Europea. Esto se debe a que el reglamento realmente es global en su alcance y se aplica a cualquier organización que procesa datos personales de la UE, más allá de la ubicación de las compañías o del procesamiento de los datos. En su esencia, la legislación del GDPR está centrada en garantizar que se respete la privacidad como un derecho fundamental y que los datos personales sean guardados privada y seguramente. Elizabeth Denham, del Gabinete del Comisario de Información de la UE (ICO - Information Commissioner Office), dice: “Esta ley no es sobre multas. Se trata de poner en primer lugar al consumidor y al ciudadano” y “La emisión de multas siempre fue y seguirá siendo, el último recurso”. Sin embargo, es importante observar que los costos por incumplir el regla
Tags : 
     Symantec
By: Symantec     Published Date: Jun 13, 2018
O Regulamento Geral de Proteção de Dados (GDPR) entrou em vigor em 25 de maio de 2018. Se você processa dados pessoais da União Europeia (UE), o GDPR provavelmente aplica-se a você, mesmo se você não estiver na UE. Isso porque o regulamento é global em seu escopo e se aplica a qualquer organização que processa dados pessoais da UE, independentemente da localização das empresas ou do processamento dos dados. Na sua essência, a legislação do GDPR foca em como garantir que a privacidade seja respeitada como um direito fundamental e que os dados pessoais sejam mantidos em sigilo e segurança. Elizabeth Denham, do Gabinete do Comissário de Informações da UE (ICO - Information Commissioner Office), diz: “Esta lei não é sobre multas. Trata-se de colocar o consumidor e o cidadão em primeiro lugar” e “A emissão de multas sempre foi e continuará sendo, um ultimo recurso”. No entanto, é importante observar que os custos de não cumprir o regulamento podem ser rigorosos. Podem incluir uma multa de a
Tags : 
     Symantec
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com