• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pts

Results 251 - 275 of 348Sort Results By: Published Date | Title | Company Name
By: Allscripts     Published Date: Apr 23, 2015
In this paper, you will learn the challenges facing organizations using yesterday’s Practice Management systems, and discover why capitalizing on the latest technology is easier—and much more rewarding—than you might think.
Tags : 
revenue cycle, healthcare, practice management, technology, allscripts, financial processes
    
Allscripts
By: IBM     Published Date: Jan 09, 2015
This research report by Reliabiltyweb.com captures insight that attempts to predict and even guide the future of asset management practices, investments and challenges from a snapshot taken from approximately 1,000 participants from a wide variety of industries around the world.
Tags : 
asset management, asset management practices, asset management challenges, risk management, it management, knowledge management, enterprise applications, data management
    
IBM
By: Linx Technologies     Published Date: Jun 23, 2008
While actual RF design is quite difficult, understanding basic RF concepts is amazingly straightforward. For those of you delving into the world of RF for the first time, when you finish this article, you will have a clearer understanding of how signals are transmitted and received in an RF environment.
Tags : 
rfid, radio frequency, plm, product lifecycle, identification, linx, linx technologies, rf concepts
    
Linx Technologies
By: Rocket Fuel     Published Date: Jan 28, 2013
This whitepaper explains the fundamentals of programmatic buying, and what it can do to propel your digital marketing. It also explains the key concepts you must understand in order to access the huge profit potential of programmatic buying.
Tags : 
media buying, programmatic buying, real time bidding
    
Rocket Fuel
By: Opalis     Published Date: Nov 06, 2006
This paper highlights how Run Book Automation Software provides the new level of automation required to automate IT operations and traditional job scheduling tasks, without the costs and management burden associated with custom programming and scripts.
Tags : 
automation, process automation, it automation, scheduling, schedule, cost control, it management, opalis
    
Opalis
By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : 
logrhythm, scalability, hackers, systems, scripts
    
LogRhythm
By: F5     Published Date: May 15, 2013
Elasticity is considered superior to traditional scalability because it attempts to exactly match resources to demand. Take a closer look at a ScaleN technology that offers a more efficient, elastic, and multi-tenant approach to meeting the challenges and demands of modern data center architectures. You’ll learn how elasticity can be achieved and how it offers multiple scalability models to better meet the sub-second failover and on-demand scalability required by modern business and IT organizations.
Tags : 
scalen, elastic infrastructure, technology, multi-tenant approach, over provisioning, it management, knowledge management, enterprise applications
    
F5
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
    
Symantec
By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
    
Breece Hill, LLC
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh, security, internet security
    
Likewise Software
By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
By: Microsoft Dynamics     Published Date: Jul 11, 2007
This paper introduces various supply chain concepts and explains their importance. It describes initiatives being undertaken by the largest retailers and reviews what small and mid-size firms need to do to compete.
Tags : 
retailer, enterprise resource, erm, erp, sales software, sales management, scm, supply chain
    
Microsoft Dynamics
By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos
    
Torry Harris Business Solutions
By: Salesforce Commerce Cloud     Published Date: Aug 18, 2016
While 85% of retailers say that unified commerce is a priority, many attempts at implementing have fallen short. Retailers, in order to accommodate today’s retail environment, need to rethink things and adopt a new approach. Read this special report on how retailers can overcome IT challenges and start on the road to unified commerce.
Tags : 
demandware, commerce, unified commerce, retailers, retail, it challenges, enterprise applications
    
Salesforce Commerce Cloud
By: Beqom     Published Date: Dec 05, 2018
Download this free e-guide to gain an understanding of predictive analytics concepts, how to align your data sources to unlock the value of the data in your organization, analyze the correlations, and reap the benefits of analytics in optimizing sales performance.
Tags : 
salesforce compensation management, commission plans sales teams, compensation management, compensation management sales teams, compensation plans sales teams, compensation sales teams, deferred compensation, deferred compensation management
    
Beqom
By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
Venafi
By: SAS     Published Date: Apr 20, 2015
This conclusions paper introduces key machine learning concepts and describes new SAS solutions – SAS In-Memory Statistics for Hadoop and SAS Visual Statistics – that enable machine learning at scale.
Tags : 
    
SAS
By: SAS     Published Date: Oct 18, 2017
Machine learning uses algorithms to build analytical models, helping computers “learn” from data. It can now be applied to huge quantities of data to create exciting new applications such as driverless cars. This paper, based on presentations by SAS Data Scientist Wayne Thompson, introduces key machine learning concepts and describes SAS solutions that enable data scientists and other analytical professionals to perform machine learning at scale. It tells how a SAS customer is using digital images and machine learning techniques to reduce defects in the semiconductor manufacturing process.
Tags : 
    
SAS
By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions
By: RES Software     Published Date: Jul 11, 2012
In this web seminar, you'll find ways to achieve better long-term results from Windows migration. Use RES Software to keep risks small, complexity low and productivity high for both you and your users.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, windows migration
    
RES Software
By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam
    
Lumension
By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath, storage, data management
    
Creekpath
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter