RSS feed Get our RSS feed

News by Topic

isms

Results 51 - 58 of 58Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 30, 2015
en 1994 se llevó a cabo la primera compra en línea de la historia: una pizza de pepperoni con champiñones y extra de queso en Pizza Hut. un año más tarde, amazon vendió su primer libro, Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought, de douglas Hofstadter2. dos décadas después, se calcula que las ventas mundiales de los comercios electró-nicos ascienden a más de 1,2 billones de dólares. ¿Qué ha hecho posible un cambio tan espectacular en nuestros hábitos de compra? la confianza.
Tags : 
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Désormais, acheter sur Internet est devenu une seconde nature pour la plupart d’entre nous. Mais à quel moment ce phénomène a-t-il débuté, et sous quelle im-pulsion a-t-il atteint le niveau que nous connaissons aujourd’hui ? Selon plusieurs sources1, il faut remonter à 1994, date du premier achat sur Internet d’une pizza aux peppéroni et champignons avec supplément fromage chez Pizza Hut. Lorsque cette pizza a été commandée et qu’un an plus tard, Amazon vendait son premier livre (« Concepts & Fluid Analogies Creative : Computer Models of the Fundamental Mechanisms of Thought » de Douglas Hofstadter2), nous assistions sans le savoir aux prémices d’une déferlante qui a submergé le réseau. Presque vingt ans plus tard, en 2013, les ventes mondiales sur Internet dépassaient 1,2 trillion de dollars3. Au centre de cette révolution dans nos habitudes de consommation : la confiance
Tags : 
     Symantec
By: Symantec     Published Date: Nov 30, 2015
Gli acquisti online fanno ormai parte della nostra quotidianità, ma come è cominciato tutto questo e cosa ha fatto sì che sia cresciuto fino ai livelli odierni? Secondo le cronache1 iniziò tutto nel 1994, quando venne effettuato il primo acquisto sul Web: una pizza con funghi, peperoni e aggiunta di formaggio nella catena Pizza Hut. Con quella prima pizza e con la vendita, un anno dopo, del primo libro da parte del gigante del commercio online Amazon (‘Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought’, di Douglas Hofstadter2), ebbe inizio un’attività inarrestabile. Vent’anni dopo, nel 2013, le vendite mondiali di e-commerce sono state stimate in oltre 1.200 miliardi di dollari3. Cosa ha reso possibile questo cambiamento epocale delle nostre abitudini di acquisto? La fiducia.La fiducia nei siti presso i quali acquistiamo, nonché la fiducia che le informazioni di acquisto da noi fornite siano al sicuro. Perché, come sempre, dove ci sono soldi
Tags : 
     Symantec
By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
     Imprivata
By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
     TopLayer
By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : class of service, service management, traffic management, bandwidth, at&t, att, network performance management
     AT&T
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : bot manager, bot interaction bot detection
     Akamai Technologies
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics