RSS feed Get our RSS feed

News by Topic

technical

Results 276 - 300 of 595Sort Results By: Published Date | Title | Company Name
By: Appian     Published Date: Jun 29, 2010
This Aberdeen Group report reveals that Best-in-Class organizations are delivering process management capability to their non-technical business users faster and more efficiently, and leveraging these optimised processes for a substantial reduction in operating cost and cycle time.
Tags : appian, bpm, business process management
     Appian
By: CollabNet     Published Date: Jan 11, 2013
For most enterprises, effective management of Git is a challenge. Discover technical innovations and emerging best practices now provide additional options to manage Git in the enterprise.
Tags : git, enterprise, productivity, security, scalable, compliance
     CollabNet
By: Citrix Systems     Published Date: Sep 06, 2013
A technical how-to guide— updated for Android 4.2, iOS 6.1, and Windows Phone and Surface 8.
Tags : citrix, apple ios, enterprise information, smartphones, enterprise computing, security
     Citrix Systems
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware
     Skillsoft
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: McAfee     Published Date: Nov 19, 2013
This technical brief outlines enterprise email sender identity technologies.
Tags : spear-phishing, dmarc, spf, dkim, mcafee email protection, saas, email security, security
     McAfee
By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
     Viavi Solutions
By: Aruba Networks     Published Date: May 21, 2013
A Farpoint Group Technical Note: 802.11ac: What’s New and Important
Tags : aruba, aruba networks, farpoint technical note, eee 802.11ac standard, lans, phy, wi-fi alliance
     Aruba Networks
By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : ssl certificates, communication, webmail, technical support, technology, data, security
     Symantec Corporation
By: GoodData     Published Date: Oct 14, 2013
Get the cloud BI guide now!
Tags : gooddata, platform as a service, paas, cloud, cloud bi
     GoodData
By: LogMeIn Rescue     Published Date: Oct 21, 2013
For companies that sell products or services that require technical support, the support customers receive might be the only personal experience they can use to gauge their satisfaction with an organization. Since, for many of these organizations, customer satisfaction directly affects revenue, measuring customers’ satisfaction with the service experience and the services provided is extremely important as it enables these organizations to manage and improve the customer experience. This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers.
Tags : logmein, hdi research corner, customer satisfaction, customer support, support services, remote support, technical support, remote desktop connection
     LogMeIn Rescue
By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Nimble Storage’s patented Cache Accelerated Sequential Layout (CASL™) is the industry’s first flash-optimized storage designed from the ground up to maximize efficiency. In this product brief, you’ll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: Nimble Storage     Published Date: Oct 28, 2013
Get this 36-page technical report and learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array. This validated solution provides efficient infrastructure, adaptive performance, rapid provisioning, linear scalability, and dramatically simplified management.
Tags : nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
     Nimble Storage
By: join.me     Published Date: Jan 29, 2014
This HDI Research Corner report reveals the findings from 264 support organizations that provide technical support for the services or products used by customers. The data was collected via an online survey from August to October 2012.
Tags : logmein, customer satisfaction, support services, service experience, hdi, technical support
     join.me
By: HP     Published Date: Jun 05, 2015
See how HP Agile Enterprise Solutions can transform development processes in your organization while increasing quality and reducing time and costs of development.
Tags : enterprise, management, mobility, workforce, operating system, device, productivity, agile
     HP
By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
     Cherwell Software
By: MuleSoft     Published Date: May 02, 2016
This is a webinar about rethinking IT for digital transformation.
Tags : digital, transformation, customer, enterprise, applications, technical
     MuleSoft
By: ServiceNow     Published Date: Oct 11, 2017
Customer service and contact centers are on the front lines representing organizations. Their successful handling of service issues helps deliver on the promise of a great customer experience. To continue meeting the demands of customers — while fulfilling the organizational goal of delivering a differentiated service experience — the modern customer service organization requires a seamlessly integrated front-office to back-office enterprise applications architecture and set of processes. As products and services become more technical in nature — think IoT devices — this interconnectedness is essential. Systems and customer support staff must be informed and enabled through technology to provide a contextualized experience that meets the customer's needs. Consistency across channels, proactive service, knowledge of a customer's past service requirements, technical skills, and rapid assessment and response will be essential requirements for modern customer service, which in turn creates
Tags : 
     ServiceNow
By: Forcepoint     Published Date: Apr 19, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture
Tags : 
     Forcepoint
By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : genesys, contact center infrastructure, cci, contact center engagement, cec
     Genesys
By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : security, technology, best practices, information technology, cyber threats, mobility
     LogRhythm
By: Red Hat     Published Date: Mar 26, 2019
The rise of digital platforms and their rapid adoption by customers has created significant opportunities for financial service organizations. Industry leaders are capturing additional revenue streams and creating new value chains by investing in this distribution channel. Regulators are also encouraging participation in open banking through either guidance or mandate, aiming to improve competition in the financial services marketplace. Lastly, the pace of technical innovation is reducing the barrier to market entry, driving interest in open banking by incumbents and challengers alike. However, the full value of open banking might be not always be so clear. Below are five benefits for organizations that embrace open banking.
Tags : 
     Red Hat
By: Dassault Systemes SolidWorks Corp.     Published Date: Jul 23, 2018
In this educational webinar from Dassault Systèmes, industry experts share best practices on how to streamline manufacturing collaboration and design when it comes to plastic injection molding. Learn how to find valuable resource materials such as part design guides and technical service bulletins, and troubleshoot common challenges that occur during every stage of the injection-molding process using 3D simulation software.
Tags : streamline, plastics, manufacturing, resource, material
     Dassault Systemes SolidWorks Corp.
By: Lenovo and Intel     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovo’s 360° approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : security, supply, chain, hardware, security
     Lenovo and Intel
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics