RecruitingBlogscom

Follow Us:

 

exploit

Results 1 - 25 of 260Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Oct 28, 2019
Les concepteurs de centres de données, les directeurs de la construction et de l’exploitation sont souvent confrontés aux défis de savoir comment répondre ou gérer la demande croissante de capacité des centres de données. Les investissements et les rénovations ne sont pas rares. Dans de tels cas, une analyse financière ou technique est utilisée pour déterminer la meilleure option pour l’entreprise. Aujourd’hui, il existe une solution alternative pour la construction de centre de données, plus économique et plus facile à déployer : il s’agit des modules de centres de données préfabriqués conçus pour l’infrastructure rassemblant l’informatique, l’alimentation et le refroidissement.
Tags : 
des centres de données, colocation, schneider electric
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 28, 2019
Notre livre blanc « Éléments d’exploitation essentiels des centres de données » détaille 12 méthodes que vous pouvez utiliser pour élaborer une stratégie d’exploitation et de maintenance efficace. Outre des conseils et astuces pratiques, le livre blanc présente également les grandes lignes : ?Un cadre d’évaluation des programmes d’exploitation et de maintenance des centres de données ?Les 12 éléments d’un programme équilibré de gestion des installations ?Les principes de la « mentalité axée sur l’essentiel ». Entrez dans cet état d’esprit axé sur l’essentiel et téléchargez votre livre blanc gratuit dès aujourd’hui !
Tags : 
des centres de données, colocation, schneider electric
    
Schneider Electric
Published By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
    
KPMG
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence (AI), automation, Internet of Things (IoT), blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies.
Tags : 
    
Group M_IBM Q4'19
Published By: Alert Logic     Published Date: Oct 25, 2019
As the variety and sophistication of exploits continues to grow, even large, mature Fortune 100 security teams feel unprotected. How well are your security systems and tools doing blocking threats from the most sophisticated cybercriminals? Download this resource to learn about a threat management approach designed to address today’s evolving cybersecurity threats, expanding compliance risks, and all-too-common resource constraints.
Tags : 
    
Alert Logic
Published By: Apptio     Published Date: Oct 09, 2019
"CIOs are under constant pressure to deliver innovation and efficiency, and at a lower cost to boot. Fortunately, when it comes to enterprise IT spend, chances are the necessary resources to drive improvements are already there, hidden in budget padding. All you need are the right tools to identify and exploit them. Download this brief to: -Understand your budget-to-actual variances and what causes them -Learn how to course-correct towards freeing up fettered funds for growing your business"
Tags : 
    
Apptio
Published By: Panasonic     Published Date: Oct 10, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum.
Tags : 
    
Panasonic
Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
Published By: Lenovo and Intel     Published Date: Oct 16, 2019
Every decision made for an institution requires security to match. Otherwise vulnerabilities can be created and exploited. We believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, and improve the end-user experience.
Tags : 
    
Lenovo and Intel
Published By: Lenovo and Intel     Published Date: Oct 29, 2019
Every decision made for an institution requires security to match. Otherwise vulnerabilities can be created and exploited. We believe that comprehensive and customizable end-to-end IT security not only dramatically reduces the risks of being compromised but can also have a tremendous benefit to the institution. ThinkShield goes beyond simple endpoint security, with solutions that create huge efficiencies, streamline IT administration, and improve the end-user experience.
Tags : 
    
Lenovo and Intel
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
There will be a ransomware attack on businesses every 14 seconds by the end of 2019 . Every 40 seconds, one of those attacks will prove successful , with devastating effects ranging from permanent loss of irreplaceable data to life-threatening interruptions to patient care. In years past, expert malware authors packaged up their know-how into costly exploit kits sold on the underground market. Cyber criminals had to recover high upfront costs before launching a campaign and realizing a profit. Today, ransomware-as a-service groups like Satan make it easier than ever before for would-be cyber criminals with minimal technical skills to launch attacks, offering free ransomware toolkits and hands-on help to manage campaigns and extort payments. Read our white paper to learn how CylancePROTECT® prevents Petya, Goldeneye, WannaCry, Satan, and many more from executing, with machine learning models dating back to September 2015, long before the ransomware first appeared in the wild.
Tags : 
    
BlackBerry Cylance
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Découvrez ce à quoi ressemblent les aujour cybermenaces aJectant les PME d'hui aKn d'aider votre entreprise à survivre, à réduire ses dé coûts d'exploitation et à se velopper en limitant l'exposition aux risques.Faites de la sécurité une priorité pour tous et protégez votre entreprise grâce à Cisco.
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Learn why replacing servers is often delayed. Confronted with competing business priorities, limited budgets and personnel, and a sense of comfort as current servers reliably hum along, delay is easy to rationalize. Yet, delays are not without risk and trade-offs. Cases in point are two circumstances that small and midsized enterprises should seriously consider and, in our opinion, initiate action now. Discover why the new era of cyber warfare aimed at exploiting hardware vulnerabilities and the End-of-Support for Windows Server 2008/2008 R2 means delaying server replacement leaves SMB IT open to risk.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La transformation numérique est incontournable pour les entreprises de taille moyenne (de 100 à 999 salariés) si elles veulent prospérer dans l’économie numérique. La transformation numérique permet aux entreprises d’augmenter leur avantage concurrentiel au travers d’initiatives telles que l’automatisation des processus métier, l’amélioration de l’efficacité opérationnelle, le renforcement des relations client, et la création de nouvelles sources de revenus basées sur des produits et des services reposant sur la technologie. La transformation numérique est un parcours. Ce parcours commence avec des entreprises qui adoptent une vision centrée sur l’informatique pour favoriser une stratégie elle-même centrée sur les données et les analyses. Le résultat des initiatives de transformation numérique dépend de la capacité d’une entreprise à exploiter efficacement les talents, les processus, les plates- formes et la gestion pour atteindre les objectifs commerciaux de l’entreprise.
Tags : 
    
Hewlett Packard Enterprise
Published By: SAP     Published Date: May 18, 2014
Forrester conducted in-depth surveys with 330 global BI decision-makers and found strong correlations between overall company success and adoption of innovative BI, analytics, and big data tools. In this paper, you will learn what separates the leading companies from the rest when it comes to exploiting innovative technologies in BI and analytics, and what steps you can take to either stay a leader or join their ranks.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Over the past several years, the IT industry has seen solid-state (or flash) technology evolve at a record pace. Early on, the high cost and relative newness of flash meant that it was mainly relegated to accelerating niche workloads. More recently, however, flash storage has “gone mainstream” thanks to maturing media technology. Lower media cost has resulted from memory innovations that have enabled greater density and new architectures such as 3D NAND. Simultaneously, flash vendors have refined how to exploit flash storage’s idiosyncrasies—for example, they can extend the flash media lifespan through data reduction and other technique
Tags : 
    
Hewlett Packard Enterprise
Published By: SAS     Published Date: Jan 17, 2018
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
    
SAS
Published By: Adobe     Published Date: Mar 21, 2017
Il suffit de se promener en ville ou de se rendre dans une entreprise pour constater que le mobile est devenu le nouveau système d’exploitation de l’humanité. Le téléphone envahit nos vies. Il nous réveille le matin, nous propose des itinéraires de remplacement pour éviter les bouchons ou nous permet d’obtenir un bon de réduction dans la queue d’un fast?food.
Tags : 
    
Adobe
Published By: Cisco     Published Date: Jun 21, 2016
En adoptant de nouvelles technologies, telles que le cloud, la mobilité, le Big Data et l'Internet des objets, vous améliorez les interactions entre les personnes, les processus, les données et les objets, et tirez le meilleur parti des connexions réseau et des ressources disponibles. L'IT prend également une nouvelle dimension dans l'entreprise. Pour rester en phase avec les objectifs de l'entreprise, le département IT doit innover et offrir des solutions performantes encore plus rapidement. L'infrastructure intégrée Cisco UCS® (Cisco Unified Computing System™) vous permet de migrer vers le Fast IT, un nouveau modèle IT qui transforme votre infrastructure de data center en un environnement rapide, agile, intelligent et sécurisé. Faites tomber les barrières informatiques qui freinent votre croissance et créez des solutions qui exploitent tout le potentiel des nouvelles connexions et informations.
Tags : 
    
Cisco
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Dell EMC     Published Date: Nov 26, 2018
La technologie Dell EMC pour l’industrie exploite le stockage, les stations de travail et le calcul hautes performances en combinant leurs fonctionnalités pour améliorer les produits, développer des processus de conception et de production plus efficaces et répondre aux préférences en constante évolution des clients. La collecte, l’assemblage et l’intégration d’un nombre croissant de données dans l’ensemble de l’écosystéme, de la modélisation du produit aux tendances d’aprés-vente, font de l’usine numérique une réalité puissante et nécessaire dans l’environnement de production. En savoir plus sur les solutions Dell en collaboration Intel® Xeon® processors
Tags : 
    
Dell EMC
Published By: KPMG     Published Date: Nov 06, 2019
Political uncertainty, potential trade wars and digital technologies continue to reshape our world, begging the question: Is your supply chain fit for the future? Listen to this webinar now to find out: • How to build an agile, responsive operational network that supports growth • The importance of knowing your customer and suppliers in an end-to-end supply chain • How to use data and insight to gain effective control and improve performance across operations • How to exploit simple, pragmatic digital steps to improve your supply chain performance, today • How to leverage emerging technology to future-proof your supply chain • How to develop new skillsets to help execute your digital roadmap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Nov 06, 2019
Successful supply chain organisations of the future will adopt a technology-enabled, data-powered, insight-driven approach, and invest in recruiting top talent. If yesterday’s supply chains were rigid and reactive, tomorrow’s supply chains will be nimble and predictive. Begin now to jump start your supply chain transformation journey. Read the following article to explore these key insights: • Putting the customer first • Utilising platforms correctly • Winning the war for talent • Investing in future-ready capabilities • Leveraging cross-functional data • Exploiting micro supply chains.
Tags : 
    
KPMG
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top