line data

Results 76 - 100 of 776Sort Results By: Published Date | Title | Company Name
By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
Es ist an der Zeit, sich für durchgängige Website-Sicherheit zu entscheiden. Da Online-Angriffe immer häufiger und einfacher werden, sind Unternehmen in aller Welt zunehmend auf dem Prüfstand und müssen zeigen, dass alle Online-Transaktionen mit vertraulichen Daten sicher sind. Unternehmen, die den Schutz ihrer Kunden und ihrer Marke ernst nehmen, implementieren Always-On SSL, um die Suche, den Meinungsaustausch und das Einkaufen im Internet sicherer zu machen. Mit Always-On SSL sind alle Kundeninteraktionen vom ersten bis zum letzten Klick geschützt. Informieren Sie sich ausführlich über diesen Schutz in unserem Leitfaden.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Schneider Electric     Published Date: Oct 17, 2016
In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
     Schneider Electric
By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : data, application performance, data protection, performance optimization, data center, infrastructure management, data management
     CDW
By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : data, application performance, data protection, performance optimization, data center, infrastructure management, data management
     CDW - APC
By: Jamf     Published Date: Aug 12, 2019
A well-planned cyberattack or an accidental download of malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security.
Tags : 
     Jamf
By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
     Red Hat
By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
     CA Technologies
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : mapping, public saftey, location data
     HERE Technologies
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : mapping, public saftey, location data
     HERE Technologies
By: Adobe     Published Date: Sep 12, 2017
Blend online and offline data to create a vibrant marketing world. Learn how to deliver uniquely experiences customers expect and to delight them with the ones they didn't see coming.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 08, 2019
As the lines between business-to-business (B2B) and business-to-consumer (B2C) marketing continue to blur, the B2B marketing environment looks set to change, with companies seeing more demands placed on their operations to satisfy their audiences. To stay competitive, B2B marketers must expand their existing operating models to incorporate data-driven decision-making, relationship engagement, and digital technologies that enable individualized communications.
Tags : 
     Adobe
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
     Carbonite
By: XO Communications     Published Date: Jul 17, 2014
Bank Administration Institute (BAI) is a financial services association that offers expertise in retail banking, payments and regulatory compliance.
Tags : bai, streamlines, data, backup, disaster, recovery, financial services, retail banking
     XO Communications
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
     Cisco
By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
     Cisco
By: NAVEX Global     Published Date: Apr 15, 2016
Join us for a complimentary webinar where we will unveil the findings from the first ever NAVEX Global EMEA & APAC Whistleblowing Hotline Benchmark Report.
Tags : webinar, navex, data, benchmark, compliance programmes, compliance programme webinar
     NAVEX Global
By: NAVEX Global     Published Date: Apr 12, 2016
Join us for a complimentary webinar where we will unveil the findings from the first ever NAVEX Global EMEA & APAC Whistleblowing Hotline Benchmark Report.
Tags : 
     NAVEX Global
By: SEPATON     Published Date: Mar 11, 2008
Today’s enterprise faces a convergence of data protection challenges. Addressing them means extending online data retention, enabling deduplication, and simplifying operations. This report outlines how ContentAware VTL and deduplication solutions from SEPATON uniquely address these challenges.
Tags : sepaton, backup, data protection, virtual tape library, vtl
     SEPATON
By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
     IBM
By: Janrain, Inc.     Published Date: Jan 07, 2013
This paper covers establishing best practices in implementing user registration, and strategies for collecting more and better user data without sacrificing conversion rates. Topics include social login, progressive profiling, CAPTCHA, SSL, and more.
Tags : online registration, data management, unified data, data validation, ssl, progressive profiling
     Janrain, Inc.
By: Janrain, Inc.     Published Date: Mar 22, 2013
A common objective for a website is to convert an anonymous visitor to an engaged and active registered user. Download this paper for best practices in implementing online user registration and collecting data without sacrificing conversion rates.
Tags : user registrations, user management platform, registration system, registration optimization, registration infrastructure
     Janrain, Inc.
By: SAS     Published Date: Apr 13, 2011
This paper will outline the value and methods involved in data mining across both quantitative and qualitative data. In addition, it will describe the data transformations necessary before doing such work, and the tools that are particularly valuable for mining mixed data types.
Tags : business intelligence, michael lock, predictive analytics, business insight, business visibility, small to medium sized business
     SAS
By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
     FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com