RSS feed Get our RSS feed

News by Topic

transfer

Results 101 - 125 of 204Sort Results By: Published Date | Title | Company Name
By: Ipswitch     Published Date: May 02, 2014
With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.
Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server
     Ipswitch
By: Ipswitch     Published Date: May 15, 2014
In this free on demand webinar, you’ll get a first-hand look at how leading companies leverage Managed File Transfer to improve security, reduce risk and relieve pressure on their IT departments.
Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server
     Ipswitch
By: Ipswitch     Published Date: Dec 01, 2014
The third largest US-based provider of inter-bank transaction services offers a Financial Services case study illustrating the automation of over 1,100 tasks by MOVEit Core and MOVEit Central for managing financial transactions. MOVEit File Transfer to manage file transfers to client banks, regulators, and other financial institutions. Companion product MOVEit Central to automate file-based business processes.
Tags : ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution
     Ipswitch
By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen it in the news. The fines levied against financial institutions for non-compliance with governmental regulations can be staggering. We’re no longer talking about millions of dollars—but billions of dollars. Needless to say, the stakes are high. And at no point in the life of your IT department has it ever been more important to ensure compliance with international, federal and state mandates. File transfers are a perfect case in point.
Tags : ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution
     Ipswitch
By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen the digital evolution that’s taking place in healthcare and you’re at your job every day as this evolution continues—and organizations seek to more efficiently and securely manage the proliferation and management of electronic health records (EHRs) and every type of digital file that relates to patient care.
Tags : ipswitch, healthcare, compliance, file transfer, secure transfer, efficiently transfer, clinical data, medical file
     Ipswitch
By: Ipswitch     Published Date: Dec 01, 2014
It’s easy to understand why many organizations are confused about the need for a Managed File Transfer (MFT) system. There are a lot of different products in the market, file transfer product functionality is not clearly defined and often overlaps with other solutions, “MFT” is not fully understood, and there are a lot of mixed messages in the marketplace.
Tags : ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution
     Ipswitch
By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad
     ITI
By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Following are best practices amassed through working with leading global companies on learning initiatives.
Tags : jonckers, multilingual elearning, successful knowledge, training
     Jonckers Translation & Engineering
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci
     Linoma Software
By: Makino     Published Date: Jun 23, 2017
Aaron Woller, president of Woller Precision Machine, discusses how his company enhanced its productivity and profitability by transitioning from conventional vertical machining centers to an automated horizontal machining cell. Beyond simply improving capacity and workflow, this investment in automation has enabled Woller to maximize the value of skilled labor, redeploying personnel into new business development roles. In doing so, the company experienced a 21 percent increase in sales with only a 6 percent increase in labor requirements.
Tags : horizontal machining centers, horizontal milling machines, pallet handling system, hmc, pallet transfer system, automation, automated machining
     Makino
By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits
     McAfee
By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information
     McAfee
By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
     McAfee Inc
By: Mentor Graphics     Published Date: Jun 04, 2010
The Mechanical Analysis Division of Mentor Graphics (formerly Flomerics) provides the world's most advanced computational fluid dynamics products. Our simulation software and consultancy services eliminate mistakes, reduce costs, and accelerate and optimize designs involving heat transfer and fluid flow before physical prototypes are built.
Tags : mentor graphics, fluid dynamics simulation, aerospace design, mechanical analysis, cfd
     Mentor Graphics
By: Microsoft     Published Date: May 04, 2017
Business Processes within the enterprise are becoming more and more driven by software systems. Booking flights for a trip or transferring money in a bank account, it’s usually software that makes it happen. Successful software development projects lead to valuable software that improves business processes within an enterprise. These software-based business processes can increase profitability and drive competitive advantage.
Tags : 
     Microsoft
By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : mobileiron, mobile, cloud, enterprise, security, endpoint security
     MobileIron
By: NetShelter - YouSendIt     Published Date: Dec 14, 2011
Read this white paper to learn why implementing a secure email attachment management solution can help you enhance security and productivity.
Tags : email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
     NetShelter - YouSendIt
By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : network automation, data security, data transfer, disaster recovery, security
     Network Automation
By: Oracle     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
     Oracle
By: Oracle     Published Date: Feb 21, 2018
We have been awash in the Financial Services over the past several years of hearing of the next big technology that will change the face of the industry, and Transfer Agency has been no different. In the year 2017 it is the turn of Distributed Consensus Ledger Technology (also known as ‘Blockchain’) to set pulses racing and generate many reams of papers from various parties. Whatever happened to Big Data from 2016? Download this article to learn more!
Tags : 
     Oracle
By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
     Oracle CX
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics