ria

Results 326 - 350 of 1773Sort Results By: Published Date | Title | Company Name
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Take a structured approach to designing your cloud applications. This cloud computing architecture e-book focuses on architecture, design, and implementation—considerations that apply no matter which cloud platform you choose. The guide includes steps for: Choosing the right cloud application architecture style for your app or solution. Selecting appropriate compute and data store technologies. Incorporating 10 design principles to build a scalable, resilient, and manageable application. Following the five pillars of software quality to ensure your cloud app is successful. Using design patterns that specifically apply to the problem you’re trying to solve. Download the 300-page cloud architecture e-book to explore these best practices, and get access to design review checklists, reference architectures, and more.
Tags : 
    
Microsoft Azure
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Cloud Business Email providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, cloud, cloud business, email, cloud business email, market quadrant, cloud based services, security, deployment, it management, business technology
    
SilverSky
Published By: Internap     Published Date: Nov 04, 2011
Whether you've already deployed a solution or are looking to move to the cloud, you'll find this buyer's guide essential to mapping a cloud strategy.
Tags : 
internap, cloud, strategy, hosting, host, buyer, cloud, deploy, buyer's guide, key criteria, evaluating, vendors
    
Internap
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : 
mobile devices, security, data protection, data loss, information security
    
IBM
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Budgets are tight in today's business environment. You may be asked to do more with less. Take a look through your equipment room. You may have several devices that work just fine, but they are not visible via your network management system (NMS).
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Vonage Business     Published Date: Jan 15, 2019
In this eBook you’ll learn: How digital technologies, including advanced communications, remove cumbersome obstacles to growth that have built up over time The myriad of technologies being used by business customers to interact with companies The way CPaaS solutions quickly address specific business needs today while laying the foundation for the future
Tags : 
    
Vonage Business
Published By: Oracle     Published Date: Apr 16, 2018
Embora 89% dos líderes de marketing acreditem que devam fornecer uma experiência ideal aos clientes e, assim, criar um diferencial para seus produtos e serviços na era digital, apenas 20% acreditam cumprir com êxito esta premissa. Isso significa que existe uma dificuldade por meio dos profissionais de marketing em alcançar seu público em canais diferentes, o que resulta em taxas de conversão baixas, relacionamentos curtos com clientes e perda de receita. Veja como O Oracle Marketing Cloud oferece simplicidade para as equipes de marketing, voltado para os públicos relevantes e uma solução escalonável de TI
Tags : 
como, conversar, publico, diferentes, canais, marketing
    
Oracle
Published By: SAP SME     Published Date: May 09, 2017
A história da transformação digital é frequentemente retratada como uma batalha na qual gigantescas corporações são ameaçadas por minúsculas startups. No entanto, existem milhões de empresas entre esses dois extremos para as quais as oportunidades oferecidas pela tecnologia digital, e a ameaça da transformação digital, também são convincentes.
Tags : 
    
SAP SME
Published By: Oracle     Published Date: Apr 16, 2018
Hoje em dia enfrentamos muitos desafios nas áreas de finanças e no processo de gestão empresarial. Entre eles estão sistemas internos obsoletos, infraestrutra e pessoas caras para manutenção, dificuldade em acompanhar a legislação, entre outros. Saiba como o Oracle Cloud permite e habilita que empresas de qualquer tamanho tenham acesso às finanças ágeis, atualmente, praticadas nas melhores empresas globais.
Tags : 
como, revolucionar, suas, financas
    
Oracle
Published By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
    
CA Technologies
Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
Hyperconverged infrastructure is radically shaking up the IT landscape, creating huge operational and economic benefits. Tier 1 applications such as Exchange, SQL Server, Oracle and others are among the many beneficiaries of this new generation of infrastructure. However, there are many vendors jumping on the market bandwagon, and not all systems that are marketed as hyperconverged really fit the criteria. IT organizations need to do their homework to ensure they are selecting true hyperconverged solutions.
Tags : 
hyperconverged, infrastructure, virtualized, environments, sql, it landscape
    
Hewlett Packard Enterprise
Published By: Kenexa     Published Date: Aug 31, 2011
This white paper outlines the role compensation has in a company's ability to attract and retain the best talent.
Tags : 
kenexa, compensation, fixed pay, variable pay, market pay, market pricing, pay structures, salary surveys, market data, business lifecycle, market-based salary data
    
Kenexa
Published By: Compass Datacenters     Published Date: Jul 07, 2015
Read this white paper to learn why ensuring that your data center is in compliance with the appropriate requirements is extremely important.
Tags : 
data center compliance, data center requirements, data center regulations, it management
    
Compass Datacenters
Published By: Success Factors     Published Date: Aug 10, 2012
When ICRW was forced to reduce its HR headcount, the center began looking for ways to automate performance management. With the help of SuccessFactors Professional Edition Performance Management, ICRW's HR staff was able to provide better service without adding headcount.
Tags : 
successfactors, sap, customer testimonial, case study, icrw, performance management, sherian roggeband
    
Success Factors
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : 
stratus, tco, total cost of ownership, operations, business technology
    
Stratus Technologies
Published By: STARLIMS     Published Date: Apr 25, 2014
Clinical labs use STARLIMS to ensure compliance with the strictest regulatory requirements, and to manage a wide range of laboratory workflows.
Tags : 
starlims, clinical order management, trial management, sdms, quality control, networking, it management, data management
    
STARLIMS
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: rPath     Published Date: Dec 10, 2010
Manufacturing evolved from manual to automated, ad hoc to repeatable. From art to science. Manufacturing has been forced to "industrialize." Aiding in the effort are product lifecycle and supply chain management tools for streamlining manufacturing process and linking together previously isolated stages in the value chain.
Tags : 
rpath, software supply chain, manufacturing process, automation, product lifecycle, supply chain management tool
    
rPath
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.