nis

Results 1801 - 1825 of 1951Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Feb 02, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: HP     Published Date: Feb 11, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: Automation Anywhere APAC     Published Date: May 30, 2019
The University of Melbourne deployed Automation Anywhere’s Robotic Process Automation (RPA) technology to reduce manual work and automate a range of administrative processes across student admissions, faculty administration, and supplier tracking. The deployed software bots now automate the entry of all data and attachments for new admission applications, and the university has slowly expanded its automation capabilities for staff across other faculties. This has allowed the University of Melbourne to increase the efficiency of critical business processes, boost staff engagement, and improve customer experience for its teachers and student body.
Tags : 
    
Automation Anywhere APAC
Published By: Iconixx     Published Date: Mar 09, 2016
To unleash the beast in every sales professional, the sales beastmaster must wipe out every possibility of sales downtime caused by trivial administration and clunky processes. The beastmaster needs automated sales compensation
Tags : 
iconnix, automated sales compensation, sales compensation management, sales compensation solution, sales commission reconciliation, manual commission reconciliation, commission plans, data management
    
Iconixx
Published By: CA Technologies     Published Date: Aug 22, 2017
Data is the most valuable asset a business has, and the most important data lives on the mainframe. This critical information fuels the new apps and services that differentiate your business. And it’s rapidly growing, with each new app creating a new source of data. What’s more, usage demands are increasing as developers seek access to mainframe-based data to promote innovation.
Tags : 
database, administration, management, performance optimization, sla, ca technologies, security
    
CA Technologies
Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
Kaspersky
Published By: Shell     Published Date: Aug 15, 2018
Globally, the demand for power is increasing, driven by a growing population, mass urbanisation, and rapid industrialisation of nations like China and India. The consequence for those in the business of power generation, transmission and distribution is a need to achieve greater productivity and reliability, in a challenging climate of stricter environmental targets, severe penalties for supply interruptions, tighter budgets and tougher operating conditions.
Tags : 
power, urbanisation, industrialisation, power generation, equipment reliability, turbines, transformers, stationary engines
    
Shell
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions
    
Tripwire
Published By: Oracle     Published Date: Oct 20, 2016
Flexibility and the ability to adapt easily to change can create a compelling competitive advantage for E&C organisations. Whether it’s behind the desk, on the go, or at the job site, E&C project teams need to be empowered to get a project done no matter where the job takes them and with a limited amount of resources.
Tags : 
    
Oracle
Published By: IBM     Published Date: Oct 26, 2017
Authentication is the beating heart of security. The most fundamental action in all of IT is to identify “who you are”—and authentication is the building block that answers that question. Now more than ever, IT teams must do everything they can to ensure that users are who they say they are, and that their credentials have not been stolen. IT is in state of crisis, with hundreds of millions of identities stolen annually. For system administrators, it’s crucial to know which users have the right to access a given resource, and whether unauthorized users have tried to get in.
Tags : 
user authentication, mobile multi factor authentication, data flows, security, it strategies
    
IBM
Published By: Infomatica     Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to: • Improve research outcomes in search of cures and other diseases • Determine the true cost of providing care with longitudinal patient records • Examine clinical practice variations to benchmark and improve future procedures • Strengthen information security, privacy and compliance capabilities
Tags : 
    
Infomatica
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft, together with Unisys Corporation, completed benchmark testing of Microsoft Dynamics CRM 4.0 running on the Microsoft Windows Server 2008 operating system with Microsoft SQL Server 2008 database software. Benchmark results demonstrate that Microsoft Dynamics CRM can scale to meet the needs of an enterprise-level, mission-critical workload of 24,000 concurrent users while maintaining performance at sub-second response times.
Tags : 
microsoft crm, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: Epson     Published Date: Feb 27, 2019
By the end of 2019, the National Archives and Records Administration (NARA) will require all U.S. federal agencies to meet stringent new standards for electronic records management. This includes a requirement that all agencies manage their records electronically to the fullest extent possible, with long-term plans to stop accepting paper-based records and archives completely by 2022
Tags : 
    
Epson
Published By: DocuSign UK     Published Date: Aug 08, 2018
"When implementing digital transformation initiatives that incorporate eSignature, organisations need to make sure they do not disrupt business processes and that their solutions work seamlessly with existing technology platforms. Download this eBook to learn how you can enhance your existing tech investments. "
Tags : 
    
DocuSign UK
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
back up systems, symantec, netbackup, ndmp, it infrastructure, it management, data management, business technology
    
Sponsored by HP and Intel®
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec, netbackup, report, outlines
    
HP and Intel® Xeon® processor
Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec, netbackup, report, outlines
    
Intel Corp.
Published By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : 
intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets
    
Intuit, Inc
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protección del acceso con privilegios y la prevención de infracciones siguen constituyendo preocupaciones urgentes en empresas de todos los tamaños. Los atacantes recurren a una gama mayor de métodos más sofisticados para infiltrarse en sistemas vulnerables y, a pesar de que las noticias sobre infracciones externas ocupan con frecuencia los titulares, las organizaciones también deben ser capaces de defenderse contra las amenazas internas. De hecho, dado que en la actualidad se recurre de forma generalizada a la externalización y la asociación para acometer labores clave, un mayor número de usuarios tiene, hoy en día, acceso con privilegios a sistemas empresariales de fundamental importancia. Además, resulta primordial que los administradores actuales de los sistemas comprendan cómo se están utilizando estos últimos, quién los usa y en qué condiciones. Desafortunadamente, las soluciones estándar de seguridad no pueden proteger el acceso interno o con privilegios de manera eficaz y ad
Tags : 
    
CA Technologies EMEA
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Encore à l’heure actuelle, l’une des priorités pour les entreprises, quelle que soit leur taille, est de protéger les accès à forts privilèges et d’empêcher les violations de sécurité. Les attaquants font appel à des méthodes toujours plus variées et sophistiquées pour infiltrer les systèmes vulnérables. Et bien que les attaques ayant une origine extérieure fassent souvent la une, les entreprises doivent également pouvoir se défendre contre les menaces internes. Il est clair aujourd’hui que, du fait de la généralisation de l’externalisation et de la sous-traitance pour des fonctions clés, davantage d’utilisateurs bénéficient d’un accès à forts privilèges aux systèmes critiques de l’entreprise. En outre, il est essentiel que les administrateurs système actuels comprennent comment les systèmes sont utilisés, qui les utilisent et dans quelles conditions. Malheureusement, les solutions de sécurité standard ne parviennent pas à sécuriser efficacement les accès internes/à forts privilèges ;
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protezione degli accessi privilegiati e la prevenzione delle violazioni restano preoccupazioni urgenti per le aziende di tutte le dimensioni. Gli autori di attacchi utilizzano una gamma sempre più ampia di metodi sempre più sofisticati per infiltrarsi in sistemi vulnerabili. E anche se le notizie di violazioni esterne spesso dominano le cronache, le aziende devono essere in grado di difendersi anche dalle minacce interne. In effetti, dato l'impiego oggi diffuso di outsourcing e partnership per supportare le funzioni aziendali chiave, il numero degli utenti che dispongono di accesso con privilegi ai sistemi di business critici è aumentato. In aggiunta, è essenziale per gli amministratori di sistema di oggi comprendere in che modo i sistemi vengono utilizzati, da chi e in quali condizioni. Purtroppo, le soluzioni di sicurezza standard non sono in grado di proteggere l'accesso interno/privilegiato in modo efficace e presentano gravi carenze, che mettono a rischio l'azienda.
Tags : 
    
CA Technologies EMEA
Start   Previous    65 66 67 68 69 70 71 72 73 74 75 76 77 78 79    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.