RSS feed Get our RSS feed

News by Topic

silver

Results 1 - 25 of 135Sort Results By: Published Date | Title | Company Name
By: ADP     Published Date: Nov 16, 2017
Many businesses invest in analytics technology thinking it’s a silver bullet. But data doesn’t always tell the whole story. You get percentages but not insights. Trends but not necessarily relationships or patterns. Truly impactful workforce analytics has to do more. You have to turn data into insight, and then put it into action. This workbook is designed to help you progress through the workforce analytics maturity model. The first step in the process is to identify where you stand today.
Tags : 
     ADP
By: Appian     Published Date: Jun 29, 2010
In this paper, independent analyst Bruce Silver examines the Appian/MEGA integration of BPA and BPM, calling it a unique solution that "does it right".
Tags : appian, process architecture, application integration, execution, business process analysis, bpa, bpms, business process management
     Appian
By: Blue Coat     Published Date: Feb 04, 2016
As more and more organizations adopt cloud services, it’s essential to maintain a consistent level of security to protect data. There is no silver bullet. But there are some basic cloud security components. Find out now!
Tags : 
     Blue Coat
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : api, application programming interface, psd2, open banking, json, github
     CA Technologies EMEA
By: CareerSaver     Published Date: Dec 04, 2008
Our training programs employ an array of multi-dimensional learning techniques that makes our Four Point learning system so successful. The building blocks of this proven system include audio cds for learning on the go, extensive diagnostic pre-tests, adaptive software, simulated exams, video courseware for a visual learning environment and vendor specific press books; all available well below retail cost. Our strategic partnerships with companies large and small, authors, trainers and educators allow us to provide today’s IT professional with the finest educational material available.
Tags : careersaver, it certification, cisco certification, microsoft certification, linux certification, network security certification, software development certification
     CareerSaver
By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
     CyberSource EMEA
By: Ektron     Published Date: Feb 04, 2009
As Web sites move toward a richer user experience, rich internet applications (RIAs) are becoming the method of choice to dynamically engage site visitors. But even as sites are designed around RIAs built on Microsoft Silverlight and Adobe Flex, businesses and organizations are looking for the best possible ways to manage the data that these Web applications rely on.
Tags : ria, html, rich internet applications, multimedia, data management, silverlight, adobe flex
     Ektron
By: ETNA Software     Published Date: Feb 22, 2011
This whitepaper covers programming and design aspects of installation experience customization.
Tags : silverlight, finance software, investment software, financial tools, trading, technology, software, financial services
     ETNA Software
By: Gizmox     Published Date: May 24, 2012
In this Webinar, Jeffrey Hammond of Forrester Research discusses those trends, their challenges and why organizations need to rethink their application development strategies.
Tags : webgui, ajax frameworks, mobile, virtualization, visualwebgui, silverlight, winforms, enterprise
     Gizmox
By: HP     Published Date: Jul 22, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized.
Tags : tier-1, storage, data, flash, storage system, data center
     HP
By: HP     Published Date: Nov 05, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized. Download this whitepaper now.
Tags : data center, change management, data management, storage space, storage criteria, storeserv, tier-1, market report
     HP
By: IBM     Published Date: Oct 09, 2009
Tune into this Web Seminar to hear BPM industry analysts, Dr. Bruce Silver and Amy Lipton share how dynamic BPM powered by the IBM Smart SOATM approach can help you react quickly and drive ROI. After the seminar you'll receive a complimentary IBM BPM assessment for a targeted analysis of your current situation.
Tags : smart soatm, ibm, service oriented architecture, soa, bpm assessment, business process management
     IBM
By: IBM     Published Date: May 28, 2015
IBM Blueworks Live was designed expressly to engage business users in process improvement.
Tags : data, sharing, process improvement, cloud
     IBM
By: IBM     Published Date: Jun 09, 2015
This report provides an in-depth review of Blueworks Live’s features and benefits for engaging business users in process improvement.
Tags : ibm, process improvement, engagement, blueworks live, share, collaboration, project management
     IBM
By: Imperial Metals     Published Date: Nov 24, 2009
Precious metals like Gold and Silver can help you secure your future and meet long-term investing goals. In the last decade, Gold prices rose by an average of 40% per year! Our free IRA guide will show you how easy it is to invest in precious metals
Tags : imperial metals, ira, gold, silver, precious metals, 401k, equities
     Imperial Metals
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
     MalwareBytes EMEA
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
     McAfee
By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : malware, mcafee, cyber threat, technologies, innovation, analytics
     McAfee EMEA
By: Netapp     Published Date: Mar 12, 2013
Scale-out and responsive storage capabilities are “must have” features. Silverton Consulting evaluated and benchmarked all the leading vendors. Download this paper to see why they were impressed with NetApp Clustered SAN.
Tags : storage, data center, network
     Netapp
By: NetApp APAC     Published Date: Jul 04, 2019
"This report discusses NetApp’s AFF and FAS product lines, ONTAP 9 advanced functionality, NetApp SAN history and NetApp AFF A700s SAN IO performance. Our performance review uses recent benchmark results, ranks the A700s against a list of enterprise flash storage systems and shows where the NetApp AFF A700s falls on Silverton Consulting’s All-Flash Storage ChampionsChart™."
Tags : 
     NetApp APAC
By: Nevada Corporate Headquarters     Published Date: Sep 13, 2011
Incorporating in Nevada provides asset protection and reduced tax exposure. You can live anywhere and still incorporate in the Silver State.
Tags : nevada edge, asset protection, tax saving strategies, save money, business lawsuits
     Nevada Corporate Headquarters
By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : progress software, idc, complex event processing, business intelligence, cep, mom
     Progress Software Corporation CEP
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics