nis

Results 1501 - 1525 of 1977Sort Results By: Published Date | Title | Company Name
Published By: Alert Logic     Published Date: May 23, 2019
IT professionals who attended the Alert Logic Cloud Security Summit on 20th June 2018 highlight aspects of the state of security of their organisation.
Tags : 
    
Alert Logic
Published By: Demand Frontier     Published Date: Mar 11, 2016
An energy manufacturing company with Refining and Marketing, Midstream and Chemicals expertise. The company has a strong focus on operational excellence – personal and process safety, environmental stewardship, reliability and cost efficiency. As one of the largest finished lubricants suppliers in the United States, Phillips 66 offers four premier lubricant brands, including: 76, Conoco, Phillips 66, and Kendall in the U.S. and 69 other countries.
Tags : 
manufacturing, marketing, best practices, digital media, communications
    
Demand Frontier
Published By: Demand Frontier     Published Date: Mar 11, 2016
An energy manufacturing company with Refining and Marketing, Midstream and Chemicals expertise. The company has a strong focus on operational excellence – personal and process safety, environmental stewardship, reliability and cost efficiency. As one of the largest finished lubricants suppliers in the United States, Phillips 66 offers four premier lubricant brands, including: 76, Conoco, Phillips 66, and Kendall in the U.S. and 69 other countries.
Tags : 
manufacturing, marketing, best practices, digital media, communications
    
Demand Frontier
Published By: Plantronics     Published Date: Oct 18, 2013
Maximize the effectiveness of collaboration. As teams become ever more dispersed, organisations need to think about more than technology to ensure collaboration is successful. With employees now separated much more by time and distance, a range of communication tools are being used by enterprises to keep everyone connected.
Tags : 
plantronics, communications experience, smarter working, working off-site, productive virtual collaboration, f2f encounters, reduce attrition, optimal working environment, collaboration tools, unified communication, savi wireless range, wireless, new office technologies, high-definition voice, dispersed workforces, communicate through technology, effective collaboration, networking, it management
    
Plantronics
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Redstor UK     Published Date: Jun 08, 2018
When studies indicate that around 70 per cent of an organisation’s data is usually ROT – redundant, obsolete or trivia – it makes no sense to leave it taking up expensive primary storage space. By downloading Redstor’s new Storage Analyser, you take the first step towards better capacity planning and cutting primary storage costs. It allows you to find out what space would be freed up if inactive data was offloaded to the cloud. Download the FREE Storage Analyser here today.
Tags : 
    
Redstor UK
Published By: EMC     Published Date: Apr 12, 2011
Download this white paper to learn how to address IT staff's demand for improved "usability" in storage solutions for small and medium businesses.
Tags : 
emc, vnxe series storage system, storage management, storage solutions, usability, small business, medium-sized businesses, unisphere
    
EMC
Published By: Dell Storage     Published Date: Jan 16, 2009
Although hardware storage prices have come down, storage administration and software expenses still run about seven times the cost of storage hardware. Storage consolidation provides a partial solution by expanding device connectivity and reducing points of management. However, once storage is consolidated, the job is only half done. You still need a centralized, flexible method of management that masks the complexity of the storage environment and reduces administrative overhead. That’s where virtualization fits in.
Tags : 
dell, storage virtualization, hardware storage, storage administration, software expenses, storage consolidation, storage environment, virtualization, it management, storage
    
Dell Storage
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 17, 2016
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling applications to be re-architected into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
avi networks, load balancing strategy, best practices, software defined architecture, application centric, application performance, application services, application delivery controller, automation, networking
    
Avi Networks
Published By: Cranfield University     Published Date: Jan 13, 2015
This paper gives information about the Strategic Performance Management course carried out by Cranfield School of Management.
Tags : 
strategic performance management, execute strategies, make strategies for your company
    
Cranfield University
Published By: CA Technologies     Published Date: Aug 22, 2017
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API-Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden. Es ist unabdingbar, dass alle Stakeholder verstehen, dass die geschäftlichen Ziele und die technischen Herausforderungen eines API?Programms eng miteinander in Beziehung stehen. Programmmanager müssen die Verantwortung dafür übernehmen, die wichtigen geschäftlichen Ziele einer vorgeschlagenen API den Architekten klar mitzuteilen, die diese API erstellen sollen.
Tags : 
    
CA Technologies EMEA
Published By: NAVEX Global     Published Date: Oct 18, 2016
Read this case study to find out the six essentials for creating a visionary organisational culture.
Tags : 
    
NAVEX Global
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how healthcare providers are reducing their need for storage capacity through thin provisioning and reducing administration time by up to 90% by using autonomic management to simplify, automate and expedite storage management and maintenance.
Tags : 
strategy cost effective, storage for healthcare, hp intel, it systems, storage maintenance, it management, data management, business technology, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: CA Technologies     Published Date: Nov 07, 2014
Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.
Tags : 
ca technologies, migrer vers le cloud, cloud computing, iam hybride permet
    
CA Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Tags : 
stratus, it administration, development engineer, mission critical, web services, disaster recovery, critical data, server unreachable, avance, disaster prevention, storage
    
Stratus Technologies
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management
    
Hewlett-Packard Company
Published By: HP     Published Date: Nov 05, 2014
Remove the unnecessary burdens of server management and provisioning with HP Integrated Lights-Out (iLO), designed to support the full lifecycle of servers from initial deployment to ongoing management and service alerting.
Tags : 
server management, streamlined, it life cycle, business intelligence, remote support, licensing options, servers, bladesystem, server administration
    
HP
Start   Previous    54 55 56 57 58 59 60 61 62 63 64 65 66 67 68    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.