RSS feed Get our RSS feed

News by Topic

fines

Results 176 - 200 of 221Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 27, 2014
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.
Tags : ibm, ibm software, application release, deployment, software delivery, delivery methods, deployment standards, implementation
     IBM
By: Act-On     Published Date: Oct 09, 2015
Tweets with hashtags receive 2X more engagement than those without hashtags (Buddy Media). Used correctly, hashtags will amplify your message like nothing else on social media. All you have to do is apply the right ones at the right times, with a bit of finesse. To give you the tools you need to create and manage your hashtag strategies, we’ve put together this eBook to show you the ropes.
Tags : reachmail, social media, hashtags, effective hashtags, hashtag strategies, search marketing
     Act-On
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : application delivery, application deployment, software delivery methods, deployment solutions, automated application release, software development life cycle
     IBM
By: Confio     Published Date: Aug 21, 2009
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance.
Tags : database, oracle, oracle database, database administrator, resource mapping, resource management, rmm, database performance
     Confio
By: PerformanceIT     Published Date: Aug 21, 2009
With the current demands on today's CIO and IT Managers, implementing a top notch, easy-to-use proactive network, application and server support structure that meets budgetary confines can seem like a daunting task. Until now...
Tags : infrastructure, network management, server management, application performance management, server support, performance management, performanceit, performance it
     PerformanceIT
By: Safe Software     Published Date: Aug 21, 2009
This paper defines the function of spatial ETL and expands the role and impact it has with spatial data processes and GIS systems.
Tags : spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer
     Safe Software
By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection
     Third Brigade
By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
     Third Brigade
By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : remote control, help desk, remote access, remote network management, remote support, network security, symantec
     Symantec
By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage
     Xiotech
By: Lombardi Software     Published Date: Dec 07, 2006
For those individuals or organizations that are being asked to investigate process improvement, Business Process Management (BPM) is a term that frequently associated with the process improvement. This paper defines BPM and explains how it can be applied to help companies achieve process improvement goals.
Tags : bpm, business process management, process improvement, productivity, business management, work smarter, lombardi, lombardi software
     Lombardi Software
By: GFI     Published Date: Sep 16, 2008
Email is a primary source of documentation for many organizations and it has taken on an increasingly critical role in corporate litigation and court cases. The need to archive all email correspondence is growing in importance because companies are realizing that being in a position to retrieve an old email could save them thousands of dollars (euros) in legal fees and fines as well as their credibility.
Tags : email, archive, archiving, sox, sarbox, sarbanes oxley, sarbanes-oxley, gfi
     GFI
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: SchemaLogic     Published Date: Jun 11, 2008
SchemaLogic of Kirkland, WA, provider of business semantics management software, announced that Chevron has chosen SchemaLogic Enterprise Suite as a critical software component for Phase 3 of the company's third-generation Global Information Link (GIL3) initiative. This strategic initiative defines Chevron's overall information management strategy, global hardware and software architecture and operating environment.
Tags : schemalogic, oil, gas, petroleum, sharepoint, share point, collaboration, chevron
     SchemaLogic
By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : mobile applications, ecosystem, risk, defense, application, risk
     HP - Enterprise
By: Cisco     Published Date: Mar 15, 2011
This document explores the environmental uses of job scheduling (batch processing) and RBA (IT process automation) and defines the conditions for choosing one solution over another. This document also notes when it is appropriate to run a combination of both to gain immediate benefits for business operations and continuity.
Tags : cisco, it automation, job scheduling, run book automation, batch processing, process automation, continuity
     Cisco
By: PC Mall     Published Date: Jun 22, 2011
This PC Mall webinar addresses the types of cloud services available, provides real world examples of cloud services and defines the economic benefits of working with the cloud.
Tags : cloud services, webinar, public cloud, private cloud, hybrid cloud, pc mall, cloud computing, solutions
     PC Mall
By: Focus     Published Date: Feb 02, 2011
Learn how Webinar effectiveness defines the 9 Management Practices any company can embrace to ensure their Webinar initiative becomes the cornerstone of a proven lead-generation engine.
Tags : citrix, webinar, business practices, lead-generation, lead gen, leads, integration, b2b
     Focus
By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : penetration, test, pen, tracesecurity, risk, assessment, social, engineering
     TraceSecurity
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics