truste

Results 76 - 100 of 294Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: GeoTrust     Published Date: Oct 06, 2014
Without trust, no website or online service can succeed in the competitive online marketplace. This year has seen a spate of breaches that have targeted the systems of Certificate Authorities (CAs), the companies that prove websites and services are secure and safe to use. Some of these attacks have undermined the trusting relationship between users and even well-known online brands. The changing security landscape has demonstrated not all CAs are the same, and choosing the right CA is critical to running and maintaining a safe and trusted online business. This white paper looks at the role of CAs in web security, including what measures a CA can take to promote trust in its certificates and the criteria to consider when choosing the best CA for the job.
Tags : 
certificate authority, web security, security landscape, online service, trusting relationship, certificate authorities
    
GeoTrust
Published By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, alternative payment methods, chinese wallets, international payment solutions
    
Global Payments
Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code
    
GlobalSign
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
A white paper details how to apply authentication methods that strengthen security while delivering an excellent user experience.
Tags : 
trusted authentication, authentication methods, security, ibm
    
Group M_IBM Q1'18
Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 24, 2018
Evaluating cloud providers and looking for a trusted technology partner? Focus on these five vital aspects of cloud security.
Tags : 
    
Group M_IBM Q418
Published By: HERE Technologies     Published Date: Sep 26, 2018
From improving driver safety to traffic congestion to freight challenges, cities and states across North America seek out HERE to find solutions to improve quality of life for increasing populations. This eGuide showcases five projects where HERE has directly supported transport departments in their work to improve quality of life for their people - from making one of the most challenging highways in North America safer for drivers to helping people travel on a Chicago Cubs game night to reducing congestion as cities attract newcomers. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is a trusted advisor with a range of proven solutions to keep cities moving as they grow.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
With HPE, you have a trusted partner with flexible, right-sized solutions tailored to your needs.
Tags : 
best practices, business optimization, business management, productivity, storage, growth
    
Hewlett Packard Enterprise
Published By: HP     Published Date: Jul 29, 2008
This white paper explores the advantages of Operational ITSM- through incremental and continual improvement of service management practices on an ongoing basis. IT organizations must evolve into trusted service providers that adapt quickly, offer cost-effective, reliable, and flexible services to meet today's business initiatives. This evolution is not easy. It requires that the IT organization adopt an IT Service Management (ITSM) framework. Operational ITSM provides an incremental approach for companies that may not have the resources to finance and staff a large ITSM project.
Tags : 
itsm, service management, service level, service-level, itil, mission critical, it management
    
HP
Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: HP     Published Date: Aug 25, 2014
Virtualization offers significant agility and efficiency benefits. Pre-tested and optimized solutions from HP and Red Hat® are your fastest—and most cost-effective—path to get there. HP and Red Hat—two trusted business partners—have collaborated to create an answer. HP RA for Red Hat on ConvergedSystem 700x combines proven HP Converged Infrastructure components—to speed virtual server deployments—with open-source Red Hat Enterprise Virtualization software. The result is a compelling, cost-effective platform for consolidating your Linux systems. Read this solution brief to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, red-hat, agility, efficiency, benefits, deployments, linux, platform, cost-effective, converged-system, storage
    
HP
Published By: HP & Intel     Published Date: Feb 18, 2012
This guide provides practical information to help you prepare your data center for the cloud with Unified Networking, scaled-out storage, trusted server pools, and intelligent power management.
Tags : 
    
HP & Intel
Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
Use the Mission-Critical Converged Infrastructure as the foundation for the next decade of your computing. Combine years of trusted HP Integrity resiliency with HP BladeSystem efficiencies in the newest line of HP Integrity systems.
Tags : 
virtualization, hp integrity server, server, it infrastructure, data management., data management, business technology
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
The Mission-Critical Converged Infrastructure is the foundation for the next decade of computing. The newest line of HP Integrity systems combines years of trusted HP Integrity resiliency with HP BladeSystem efficiencies. Read on to learn more.
Tags : 
migration, workload migration, consolidation, it infrastructure, dynamic optimization, data management, business technology, data center
    
HP and Intel® Xeon® processors
Published By: IBM     Published Date: May 29, 2008
The lack of trusted information - information that is accurate, timely and relevant - is on the minds of CEOs and senior executives around the world. The cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
Tags : 
information management, data management, best practices, ibm, ibm li, li campaign, leveraging information
    
IBM
Published By: IBM     Published Date: Feb 02, 2009
Learn how IBM’s change data capture technology can be used in conjunction with IBM’s performance management solutions from Cognos to provide access to the trusted information that systems and employees need to make informed decisions at the speed of business.
Tags : 
ibm, information management software, performance management, business intelligence, ibm cognos, bi-ready data, departmental reporting with ibm cognos, in-memory data store, operational data stores, enterprise data warehouse, ibm® infosphere change data capture, cdc, kpi, cognos now!, operational data store, ods, ibm infosphere datastage
    
IBM
Published By: IBM     Published Date: Sep 22, 2011
Help reduce operational costs and risk while improving accessibility of critical business data.
Tags : 
ibm, data delivery, risk reduction, cdc, soa, mdm, data management
    
IBM
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
cloud computing, managed services, it service providers, ibm, cost reduction, complexity mangement, it organization, partnership, managed services provider, business technology
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, managed services provider, managed services, it management, it service providers, cloud computing
    
IBM
Published By: IBM     Published Date: Jun 26, 2014
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, security, cyber security, cybercrime, cybercriminals, malware, network security, it management
    
IBM
Published By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : 
ibm, data, customer, watson explorer, master data, structured, it management, data management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.