• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pts

Results 301 - 325 of 368Sort Results By: Published Date | Title | Company Name
By: Silk Road Technology     Published Date: Jul 30, 2014
Mobile is a massive trend in life as well as recruiting. Technology is Download to read about some key concepts to keep in mind when entering the mobile recruiting arena.
Tags : 
silkroad, mobile recruiting, mobile, talent, technology recruiting
    
Silk Road Technology
By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security, anti spam, anti virus, email security, hacker detection, identity management, security management, wireless security, data protection
    
Palo Alto Networks
By: Bronto     Published Date: Mar 16, 2012
Set your email marketing success in motion with triggered messages. From a customized welcome series to reengagement messages, learn how to identify triggered message opportunities and define business rules. Explore these key concepts and best practices to create or enhance your automated campaigns today.
Tags : 
marketing, marketing message, markeing tools, engagement, customer engagement
    
Bronto
By: Symantec     Published Date: Nov 30, 2015
en 1994 se llevó a cabo la primera compra en línea de la historia: una pizza de pepperoni con champiñones y extra de queso en Pizza Hut. un año más tarde, amazon vendió su primer libro, Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought, de douglas Hofstadter2. dos décadas después, se calcula que las ventas mundiales de los comercios electró-nicos ascienden a más de 1,2 billones de dólares. ¿Qué ha hecho posible un cambio tan espectacular en nuestros hábitos de compra? la confianza.
Tags : 
    
Symantec
By: Symantec     Published Date: Nov 30, 2015
Désormais, acheter sur Internet est devenu une seconde nature pour la plupart d’entre nous. Mais à quel moment ce phénomène a-t-il débuté, et sous quelle im-pulsion a-t-il atteint le niveau que nous connaissons aujourd’hui ? Selon plusieurs sources1, il faut remonter à 1994, date du premier achat sur Internet d’une pizza aux peppéroni et champignons avec supplément fromage chez Pizza Hut. Lorsque cette pizza a été commandée et qu’un an plus tard, Amazon vendait son premier livre (« Concepts & Fluid Analogies Creative : Computer Models of the Fundamental Mechanisms of Thought » de Douglas Hofstadter2), nous assistions sans le savoir aux prémices d’une déferlante qui a submergé le réseau. Presque vingt ans plus tard, en 2013, les ventes mondiales sur Internet dépassaient 1,2 trillion de dollars3. Au centre de cette révolution dans nos habitudes de consommation : la confiance
Tags : 
    
Symantec
By: Symantec     Published Date: Nov 30, 2015
Gli acquisti online fanno ormai parte della nostra quotidianità, ma come è cominciato tutto questo e cosa ha fatto sì che sia cresciuto fino ai livelli odierni? Secondo le cronache1 iniziò tutto nel 1994, quando venne effettuato il primo acquisto sul Web: una pizza con funghi, peperoni e aggiunta di formaggio nella catena Pizza Hut. Con quella prima pizza e con la vendita, un anno dopo, del primo libro da parte del gigante del commercio online Amazon (‘Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought’, di Douglas Hofstadter2), ebbe inizio un’attività inarrestabile. Vent’anni dopo, nel 2013, le vendite mondiali di e-commerce sono state stimate in oltre 1.200 miliardi di dollari3. Cosa ha reso possibile questo cambiamento epocale delle nostre abitudini di acquisto? La fiducia.La fiducia nei siti presso i quali acquistiamo, nonché la fiducia che le informazioni di acquisto da noi fornite siano al sicuro. Perché, come sempre, dove ci sono soldi
Tags : 
    
Symantec
By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp, it career advancement
    
NetCom Info
By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
By: IBM     Published Date: Jan 09, 2015
This research report by Reliabiltyweb.com captures insight that attempts to predict and even guide the future of asset management practices, investments and challenges from a snapshot taken from approximately 1,000 participants from a wide variety of industries around the world.
Tags : 
asset management, asset management practices, asset management challenges, risk management, it management, knowledge management, enterprise applications, data management
    
IBM
By: IBM     Published Date: Mar 10, 2015
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.
Tags : 
real-time agility, ibm, agile methods, software development, it management, best practices, business intelligence, business management
    
IBM
By: AdRoll     Published Date: Oct 05, 2016
Over the past few years attribution has become one of the most-discussed concepts in marketing and sales. Everyone agrees it’s critically important to get right, but there’s no such thing as a “one size fits all” model. Meanwhile countless whitepapers have been written, all with the goal of providing a brief precis of the best way to measure it, but the reality is there’s no universally correct answer...
Tags : 
attribution, marketing, sales, attribution model
    
AdRoll
By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail, network security, remote access, remote network management, wide area networks
    
Aventail
By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath, storage, data management, backup and recovery, storage area networks
    
Creekpath
By: IBM     Published Date: Feb 25, 2008
An organization’s success and ability to react to market and environmental changes are now more dependent than ever on an effective and efficient IT infrastructure. This white paper provides a starting point for organizations contemplating server consolidation. Download this guide for an overview of server consolidation concepts and techniques, plus guidance on methodologies that should be employed.
Tags : 
servers, migration, consolidation, infrastructure, server hardware, ibm
    
IBM
By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture, database model, dba, database administration, database administrator, dba, objectivity, software development, c++, middleware, web development, web services
    
Objectivity
By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream, project management
    
RuleStream
By: SilverStorm Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0
    
SilverStorm Technologies
By: Opalis     Published Date: Nov 06, 2006
This paper highlights how Run Book Automation Software provides the new level of automation required to automate IT operations and traditional job scheduling tasks, without the costs and management burden associated with custom programming and scripts.
Tags : 
automation, process automation, it automation, scheduling, schedule, cost control, it management, opalis, enterprise applications, application performance management, business metrics, change management, enterprise software, system management software, windows server, productivity, service management
    
Opalis
By: Opalis     Published Date: Nov 06, 2006
This white paper describes how automating IT processes greatly reduces operational costs and improves service delivery. Learn how to standardize best practices and integrate data center and operations tools without the management burden associated with scripts and home-grown programs.
Tags : 
automation, business process automation, bpa, process automation, data centers, datacenter, datacenters, opalis, it management, local area networking, network management, network performance management, business integration, business process management, system management software, service management
    
Opalis
By: Infor     Published Date: Feb 27, 2007
There are seven keys to becoming a world-class manufacturer that distill the broad concepts above into specific actions that can be addressed and accomplished in your company. Download this white paper to learn more.
Tags : 
productivity, customer satisfaction, enterprise resource planning, business process management, supply chain management, bpm, scm, erp, crm, customer relationship management, manufacturing, infor
    
Infor
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery, data protection, data management, breece hill
    
Breece Hill, LLC
By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos, quality assurance, governance testing, testing, soa governance, torry harris, thbs, open source, software outsourcing, software testing, sla
    
Torry Harris Business Solutions
By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce, customer relationship, crm, gold lasso, marketing automation, sales & marketing software, sales automation
    
Gold Lasso
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark, pki, document management, secure content management
    
ProofSpace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter