RSS feed Get our RSS feed

News by Topic

scribe

Results 351 - 375 of 838Sort Results By: Published Date | Title | Company Name
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
To stay on top in in the competitive world of higher education, institutions are striving to differentiate themselves with innovative programs and high-quality student services. Core to the success of these initiatives is people. How are you attracting the best faculty and staff to deliver the outcomes today's students expect? This white paper describes modern HR best practices for fueling student success.
Tags : 
     Oracle HCM Cloud
By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : hipaa, compliant, data, center, centers, healthcare, providers, assure
     Dell Storage
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Schneider Electric     Published Date: Apr 20, 2018
In this paper we describe effective data center pod frame containment systems and demonstrate how they can reduce time to deploy by 21% and reduce capital costs by 15% compared to traditional methods and containment systems.
Tags : data center, it racks, pod frame, air containment, it deployment
     Schneider Electric
By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
     FireEye
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Silverpop Engage B2B     Published Date: Mar 24, 2009
What happens to the leads your marketing department generates from initiatives such as white-paper downloads, referrals and trade-show business-card drops? According to research firm MarketingSherpa, 12.5 percent are genuine leads, ready or willing to buy and get moved into the sales cycle, while 17.5 percent get discarded right away because they clearly didn’t qualify or couldn’t be verified. Learn more today!
Tags : silverpop b2b, lead management, engagement marketing solutions, emarketing tools, single-message, drip campaigns, engage b2b, b2b database
     Silverpop Engage B2B
By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
     Dell Server
By: IBM     Published Date: Apr 08, 2015
Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige Performance Excellence Award.
Tags : ibm, smarter processes, elevations credit union, blueworks live, cross enterprise, engagement, culture, performance
     IBM
By: IBM     Published Date: Mar 31, 2016
"Colorado-based, Elevations Credit Union has transformed their organizational performance, reducing the average time to fund a home equity loan by 61% and increasing the number of loans that each underwriter handles by 71%. By modeling, analyzing, and improving their existing processes, Elevations has been able to drive out inefficiencies and increase their revenues by delighting their customers. IBM Blueworks Live is the tool that’s been at the heart of Elevations gaining visibility and insight into their existing processes, and helping them drive cross-enterprise engagement and viral cultural change. Carla Wolfe, Senior Business Analyst at Elevations Credit Union will describe their process discovery journey, and how it has led to remarkable changes in their organization. Along the way they've also accumulated several performance awards, including the 2013 Rocky Mountain Performance Excellence PEAK award, and plan to be a 2014 applicant for the prestigious National Malcolm Baldrige
Tags : ibm, middleware, ibm blueworks live, process improvement, organizational performance, cloud
     IBM
By: Appistry     Published Date: Oct 11, 2007
This white paper describes how software-based, real-time grid environments -- i.e. application fabrics -- are successfully meeting the requirements of today's most demanding applications, delivering scalability, manageability and affordability.
Tags : application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry
     Appistry
By: IBM     Published Date: Feb 13, 2007
This paper describes IBM's experience with and the benefits achieved from basic network convergence and IP telephony, the convergence of applications, and the ability to transform the enterprise business model.
Tags : networking, convergence, ip telephony, network management, network convergence, business integration, application integration, ibm
     IBM
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Box     Published Date: Jun 22, 2018
• There are many opportunities for businesses to introduce the concept of paper-free or less intensive paper processes to their organizations. AIIM 2016 Industry Watch research found that “58% of respondents described their inbound handling of content as ad-hoc”. This is not surprising given paper is still fairly dominant in many businesses due to human desire to keep paper in hand for reading, note taking, and still today, signatures. • In this study we take a look the challenges businesses face in relation to: o Digital Transformation of their business operations o Capturing and managing multi-channel inbound content, including paper o Steps taken to automate the information capture process o Use of analytics to enhance the identification and classification of capture information o A look ahead at the next 5 years to understand where businesses are focusing their efforts and funding
Tags : 
     Box
By: SAS     Published Date: Aug 27, 2010
This report describes a research project that investigated how organizations are attempting to improve specific decisions.
Tags : sas, data management, decision making, tom davenport, decision making, iia, international institute of analytics
     SAS
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: rPath     Published Date: Dec 10, 2010
This paper describes how rPath's centralized hub becomes the control infrastructure for managing IT system construction and change. This hub becomes the basis for managing and reusing standardized system components.
Tags : rpath, application delivery automation, integration, lifecycle management, enterprise appliances
     rPath
By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : subscriber list, subscription list, email marketing
     Infacta
By: Boomtrain     Published Date: Mar 29, 2016
Learn how to get more value out of your traffic by turning nameless visitors into loyal, engaged subscribers.
Tags : audience development, user engagement, audience engagement, audience retention, user retention, content personalization, email personalization, web personalization
     Boomtrain
By: Yesler     Published Date: Oct 29, 2014
Today’s B2B buyers are on the hunt for information. Your job as a marketer is to provide them with the content they are looking for - but first you have to know who they are and what they need to know. Get to know your buyers better by building composite profiles that describe their pain points, motivations, definitions of success, preferred communication channels, and more.
Tags : buyer personas, b2b buyers, content marketing, communication channels, content maps, b2b marketing, buyer journey, market research
     Yesler
By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : teamquest, capacity planning, cost effective, fundamental
     TeamQuest
By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
     TeamQuest
By: IBM     Published Date: Jun 23, 2015
Watch this webinar to hear the VP of Enterprise Data Management for Sutter Health, Vijay Venkatesan describe the challenges and successes that Sutter Health faced in driving their enterprise wide data strategy.
Tags : ibm, customer data, customer insight, data management, medical records, medical intelligence
     IBM
By: Euler Hermes     Published Date: Jun 11, 2019
Like it or not, dealing with risk is part and parcel of what it takes to grow a business. Many serial entrepreneurs who notch up multiple success stories will describe themselves as risk-takers. One of the UK’s most famous examples, Sir Richard Branson, published a book called “ Screw It, Let’s Do It,” reflecting his willingness to take a chance even if the odds were stacked against him.
Tags : 
     Euler Hermes
By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
     Intellitactics
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics