RSS feed Get our RSS feed

News by Topic

technical

Results 326 - 350 of 573Sort Results By: Published Date | Title | Company Name
By: IBM Software     Published Date: Oct 24, 2011
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
     IBM Software
By: SAS     Published Date: Jul 01, 2019
Industry and technical experts discuss how to generate betterinsights, including how to surface HCCs with machine learning.
Tags : 
     SAS
By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : encryption, bitlocker, data protection, endpoint, security, best practices
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.
Tags : patch, best practices, networking, risk mitigation, network security, security
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : whitelisting, endpoint security, av signatures, patch management
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : best practices, devices control, encryption, security, business continuity
     Lumension
By: Gluster     Published Date: Mar 17, 2011
This document discusses some of the unique technical aspects of the Gluster architecture, discussing those aspects of the system that are designed to provide linear scale-out of both performance and capacity without sacrificing resiliency.
Tags : gluster, cloud computing, virtual environments, open source storage software, infrastructure
     Gluster
By: Liaison Technologies     Published Date: Feb 07, 2014
This how-to-guide has been designed to help you better evaluate a VAN provider and determine the real value of the offer.
Tags : liaison, van, value-added network, transaction management, real value, reduce errors, accuracy of data, provider consolidation
     Liaison Technologies
By: IBM Cloud Business     Published Date: Jul 12, 2011
Comprehensive product capability discussed throughout this 15-page technical paper, including 11 Best Practices for the IBM Cloud. Written for IT Managers, IT Architects, and developers, learn how you can better manage SaaS cloud applications and bring new applications on line in the future.
Tags : best practice, emerging technologies, ibm corp., managed hosting, software as a service (saas)
     IBM Cloud Business
By: IBM Cloud Business     Published Date: Jul 12, 2011
If you're leading or working on a SaaS or PaaS project, interoperability and performance challenges through application migration processes are givens. Avoid common frantic missteps that will add time to your production cycles. This technical note offers specific proactive steps you can take to ensure to the successful migration of your enterprise apps.
Tags : app behavior, application migration, application migration process, cloud computing, emerging technologies
     IBM Cloud Business
By: IBM Cloud Business     Published Date: Jul 12, 2011
Get under the hood: This technical note describes how to transform XML response into a JavaT-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes.
Tags : ibm corp., java, programming languages, software development, software/web development
     IBM Cloud Business
By: IBM Cloud Business     Published Date: Jul 13, 2011
Are you getting the most you can out of your resource utilization? This technical note features two scenarios designed to illustrate the technical process of monitoring cloud services. Learn more about these time-saving,effective options for monitoring in the IBM Cloud.
Tags : cloud, components, hardware, ibm corp., monitor, resource, utilization, ibm
     IBM Cloud Business
By: IBM     Published Date: Aug 07, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threat detection.
Tags : ibm, threat detection, technology, data management, security, it security
     IBM
By: IBM     Published Date: Aug 08, 2012
IBM Analytical Decision Management revolutionizes how organizations make decisions by optimizing and automating high-volume, operational decisions at the point of impact to drive better business outcomes. In this technical white paper, learn about the architecture, deisgn and execution environments for this leading-edge technology, as well as recommendations on how to manage an implementation of this decision management solution.
Tags : ibm, technology, optimized decision-making, analytical decision management, decision management, automation, technology, decision management solution
     IBM
By: Cisco     Published Date: Nov 08, 2012
This white paper addresses technical professionals who want to increase the efficiency and flexibility of their data center and are considering deployment of private cloud or delivery of IT as a service (ITaaS).
Tags : business agility, data center, unified data centers, cloud computing, cisco, virtualization, automation, itaas
     Cisco
By: CDW     Published Date: Jul 08, 2015
Data leakage prevention systems get new respect thanks to technical advancements and new implementation best practices.
Tags : dlp, data loss, security, best practices
     CDW
By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
     SafeNet
By: NetApp     Published Date: Sep 19, 2013
Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage and learn how it will effectively help deliver big analytics with pre-engineered, compatible, and supported solutions ultimately reducing the cost, schedule, and risk of do-it-yourself systems.
Tags : netapp, open solution, hadoop, solutions guide, e-series storage, big analytics, big data
     NetApp
By: NetApp     Published Date: Jan 21, 2014
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : cloud services, revenue projections, business growth, cloud provider, storage
     NetApp
By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program
     The Vitality Group
By: Box     Published Date: Jan 16, 2015
Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.
Tags : nexgen, flash, la metro, vdi, vmware, vdi
     Box
By: Quark Software     Published Date: Mar 19, 2015
For decades technical writers have reaped the benefits of XML to lower the cost and effort associated with creating, managing and reusing content across multiple output formats. Now, with the introduction of Smart Content, business users and subject matter experts can easily adopt XML in order to keep up with consumer demand for high-value communication. Download the free eBook The Beginner’s Guide to Smart Content and discover: • What is Smart Content? • A Brief Primer on Publishing Processes • The Cost of Smart Content • Who Else Is Using XML for Document Production? • What’s Wrong with XML? • Smart Content Details • 12 Reasons to Adopt Smart Content
Tags : xml schema, xml tool, xml authoring, structured authoring, structured content, dynamic publishing, enterprise publishing, automated publishing
     Quark Software
By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : communications, enterprise grade, communications solution, 8x8, geo-routing
     8x8 Inc.
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : pinkslipbot, malware protection, malware, technology
     McAfee
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics