RSS feed Get our RSS feed

News by Topic

technical

Results 401 - 425 of 579Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Jul 22, 2014
In this white paper, we will begin by looking at HP’s flash design strategy and how it differs from other vendors. Then we will present the architectural requirements for delivering real advantages in flash-based storage performance, efficiency, resiliency, and data mobility. We’ll also unveil the technical details of the new HP 3PAR StoreServ 7450 Storage, the only all-flash array in the industry to deliver the performance advantages of a flash-optimized architecture while delivering the Tier 1 resiliency and data services that power three of the world’s four largest managed service providers.
Tags : 3par, storeserv, storage, data, flash, data mobility, performance
     HP
By: IHS GlobalSpec     Published Date: Jul 09, 2014
Industrial customers use content to research and make purchasing decisions. Are you giving them the info they need? Developed by IHS GlobalSpec, this white paper explains the growing importance of using content to attract, acquire and engage engineers and technical professionals. Content marketing positions your company as an expert, builds trust and introduces new products and services to a wider audience via webinars, technical articles, social media and more. Find out which content appeals most to technical professionals. Learn how to provide information that fulfills their needs at specific points in the buying cycle. And see examples of how and where industrial suppliers effectively use content marketing to deliver information that can help turn shoppers into buyers. Content Marketing for Industrial Marketers also explores the challenges of producing enough of the right content, repurposing it across multiple channels and budgeting for it. Plus, it provides the steps to start dev
Tags : ihs globalspec, influence buying decisions, content marketing, purchasing decision makers, content marketing strategy, building brand awareness, content marketing vehicles, engagement opportunities
     IHS GlobalSpec
By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : microsoft sharepoint, data integration, security, sharepoint solutions
     K2
By: Telx     Published Date: Mar 22, 2016
For many midsize companies, the Cloud may not seem error-proof due to a growing list of challenges—technical, financial, and personnel. So, how can IT pros today deliver on the value of Cloud services and applications, while mitigating these resource constraints?
Tags : cloud, services, applications
     Telx
By: Recruiting.com     Published Date: Jul 08, 2015
In this white paper, we’ll share some of our key discoveries to help you attract more technical candidates and fill your technical roles.
Tags : tech talent, private sector employers, talent acquisition, employment brand, recruiting, hiring, recruitment, benefits
     Recruiting.com
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
     CA Technologies EMEA
By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
     Group M_IBM Q2'19
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
     Tripwire
By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and it’s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it’s becoming more difficult to recruit and retain people who really get it and know how to help. It’s time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers—and the feedback is overwhelmingly positive.
Tags : security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm
     IBM
By: Dell     Published Date: Aug 29, 2013
Virtualization helps you get the most from your investments, and is a flexible, powerful way to get things done. But what happens when you encounter problems with virtualization? Native tools aren’t powerful enough when you have questions about your virtual infrastructure and its capacity. In this new technical brief, see how you can properly size your VMs, measure VM density, find virtual infrastructure waste, measure storage latency – and more! – with a free, powerful tool. Discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with virtualization challenges. Read this technical brief today.
Tags : virtualization, foglight, infrastructure, vms
     Dell
By: IBM     Published Date: Feb 29, 2016
This is the Key technical support considerations for smart IT infrastructures White Paper
Tags : ibm, it infrastructure, tech support, support, storage
     IBM
By: IBM     Published Date: Apr 01, 2016
Discover how to break down IT silos and increase agility for globally and technically diverse teams by using a DevOps approach with an open, unifying platform for z/OS mainframes. Find out how enterprises reduce cost and risk for source code management (SCM) strategy.
Tags : ibm, devops, z systems, scm, source code
     IBM
By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security
     IBM
By: IBM     Published Date: Jul 20, 2016
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Tags : ibm, enterprise social solutions, enterprise solutions, business technology, hybrid cloud, hybrid
     IBM
By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
     IBM
By: VMware     Published Date: Aug 09, 2012
This technical white paper covers the the vSphere® Storage Appliance (VSA) architecture, deployment of a VSA cluster, and basic monitoring and management.
Tags : vsa, vsphere storage appliance, storage, data storage, security, vmware, clustering
     VMware
By: Intel     Published Date: Apr 16, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : cloud, cloud computing, myths, infrastructure, services, it executives, data, intel
     Intel
By: Ping Identity     Published Date: Jan 29, 2013
Although the term "SSO" seems self-descriptive, the technical approaches to accomplishing it can get muddy for all but the identity security savvy IT manager. Make sure you are not putting your organization at risk.
Tags : ping, sign on, savvy it manageer, organization, indentity security
     Ping Identity
By: Sybase     Published Date: May 10, 2012
This webcast discusses the technical benefits of Sybase ASE's compression technology. Watch the recording to learn more and to hear about use cases, strategies for data migration and a look at the performance implications.
Tags : adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program
     Sybase
By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse
     Microsoft Dynamics
By: Safari Books Online     Published Date: Feb 12, 2009
This white paper explores how this 'always on' eLearning resource can facilitate technology professionals' ability to increase productivity, pursue professional certifications, and improve collaborations and communication.
Tags : safari books online, digital libraries, elearning resources, professional certifications, e-reference evangelists, education
     Safari Books Online
By: Mentor Graphics     Published Date: Sep 11, 2009
"As the number of enhancements to various Hardware Description Languages (HDLs) has increased over the past year, so too has the complexity of determining which language is best for a particular design. Many designers and organizations are contemplating whether they should switch from one HDL to another. This paper compares the technical characteristics of three, general-purpose HDLs.
Tags : comparison of vhdl, verilog and systemverilog, mentor graphics, hardware description languages (hdls), vhdl (ieee-std 1076), verilog (ieee-std 1364), ieee standard, accellera
     Mentor Graphics
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics