sample

Results 1 - 25 of 67Sort Results By: Published Date | Title | Company Name
Published By: Samsung     Published Date: Dec 18, 2015
This eBook provides a few samples of mobile technology in retail so you can find just the right fit.
Tags : 
    
Samsung
Published By: DocuSign     Published Date: Mar 23, 2016
Compilation of three customer success stories for: LinkedIn, Cision, and HotelTonight, plus DocuSign for Sales Department Brief.
Tags : 
    
DocuSign
Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense
Published By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Retail report is based on a sample of almost 500 retail respondents who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Financial Services and Insurance report is based on a sample of almost 850 FSI respondents1 who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
    
Adobe
Published By: Pure Storage     Published Date: Jul 03, 2019
University of California-Berkeley researchers employ the latest tools built on Apache Spark to accelerate DNA sequencing in pursuit of precision medicine. Adding Pure FlashBlade™ from Pure Storage® has significantly reduced the time needed to sequence data-intensive DNA samples and analyze results.
Tags : 
    
Pure Storage
Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack, web security, networking, knowledge management, business technology
    
Akamai Technologies
Published By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
microsoft, analytics, data, business impact
    
Microsoft
Published By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
    
Microsoft
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Skillsoft     Published Date: Dec 13, 2016
Skillsoft has created an entirely new business skills portfolio based on in-depth research with end-users and eLearning enterprise buyers. The end result is a content pipeline of over one thousand, 3-5 minute micro-videos, packaged into over 240 new courses. Multi-dimensional and micro-sized, the new courses are flexible training and development solutions that target the need of diverse populations, at all stages of their career. The courses feature purposeful application of video treatments, including: • Well-acted, interactive scenarios • High-end animations • “TED-talk” style presentations • “How-to” videos • Whiteboard tutorials Watch a sample scenario-based course, Mobilizing Your Team to Take Action.
Tags : 
business skills, training and development, knowledge management
    
Skillsoft
Published By: Skillsoft     Published Date: Dec 07, 2016
There are many potential threats to your time and productivity in a typical workday. In this sample lesson from our new Improving Your Personal Productivity Business Skills course, learn how to eliminate the most common time wasters at work. Skillsoft's new line of business skills courses are designed for the modern learner. We’ve created fresh, new business skills videos in a variety of formats including scenario-based storytelling, animation, and panel discussions with subject matter experts. Watch a sample course, Avoiding Time Wasters in the Workplace.
Tags : 
video courses, business skills courses, knowledge management
    
Skillsoft
Published By: Cisco     Published Date: Jul 01, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale
    
Cisco
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Splunk     Published Date: Nov 29, 2018
DevOps allows teams to effectively build, test, release, and respond to your software. But creating an agile, data-driven culture is easier said than done. Developer and devops teams struggle with lack of visibility into application monitoring tools and systems, accelerated time-to-market pressure, and increased complexity throughout the devops lifecycle process. As a Splunk customer, how are you using your machine data platform to adopt DevOps and optimize your application delivery pipeline? Download your copy of Driving DevOps Success With Data to learn: How machine data can optimize your application delivery The four key capabilities DevOps teams must have to optimize speed and customer satisfaction Sample metrics to measure your DevOps processes against
Tags : 
devops, devops tools, continuous delivery, devops methodology
    
Splunk
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec, business technology, data center
    
IBM
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
    
Domino Data Lab
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
The Modern Malware Review presents an analysis of 3 months of malware data derived from more than 1,000 live customer networks using WildFire™ (Palo Alto Networks™ feature for detecting and blocking new and unknown malware). The review focuses on malware samples that were initially undetected by industry-leading antivirus products.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, it management
    
Palo Alto Networks
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
St. Joseph’s Hospital Health Center has a total of 310 refrigerators throughout the organization. These items require strict temperature ranges for quality patient care and safety. Regulatory agencies perform audits requiring logs of temperature monitoring and corrective actions. Read this case study to learn about how St. Joseph's deployed the wireless AeroScout Environmental Monitoring solution to leverage its wireless network by working with STANLEY Healthcare.
Tags : 
wi-fi, environmental monitoring, healthcare, pharmaceuticals, lab samples, patient care, patient safety, temperature monitoring
    
STANLEY Healthcare
Published By: CA Virtualization/Automation     Published Date: Dec 22, 2010
This whitepaper: Describes a 4-stage virtualization maturity lifecycle experienced by many organizations and discusses in detail (using sample project plans) the tasks and capabilities required to succeed at each stage of the maturity lifecycle.
Tags : 
virtualization, virtual, virtualisation, agility, capex, opex, vmware, hypervisor, gartner, forrester, idc, analyst, server consolidation, private, hybrid, cloud, clouds, datacenter, datacenters, ca technologies
    
CA Virtualization/Automation
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors. There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient.
Tags : 
specimen, labeling, benefit, hospitals
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors.1 There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) for 2010 advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient. Producing specimen labels at the patient bedside and encoding patient identification in a barcode satisfies both The Joint Commission’s NPSG and Health Insurance Portability and Accountability Act (HIPAA) requirements. T
Tags : 
    
Zebra Technologies
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Sample identification and results reporting errors can lead to misdiagnosis and inappropriate treatment with deadly consequences. A 2006 Wall Street Journal article reported that while malpractice claims for pathology errors are relatively low, they are the second most costly. In addition to creating a serious risk to patient safety, sample misidentification creates significant financial implications. Redraws, retesting and additional treatment that result from sample errors cost the healthcare industry an estimated $200 million to $400 million per year.
Tags : 
    
Zebra Technologies
Start   Previous   1 2 3    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.