RecruitingBlogscom

Follow Us:

 

overview

Results 351 - 375 of 680Sort Results By: Published Date | Title | Company Name
Published By: Intel Corp.     Published Date: Nov 21, 2017
this Whitepaper will provide an overview on personalizing customer experiences to pinpointing undetected fraud, to identifying business efficiencies, Intel's Saffron Natural Intelligence Platform helps financial institutions increase revenue and prevent loss.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will provide an overview on how powerful computing and software technologies enable real time fraud detection to cut losses and reduce risks.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This white paper provides an overview how banks seek to stop fraud in its tracks with simpler, stronger authentication.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will provide an overview into Artificial Intelligence, as the next big wave in computing.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper provides an overview on technology dominated discussions at Sibos 2016 to an extent we have not seen previously.
Tags : 
    
Intel Corp.
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: Intermec     Published Date: Sep 07, 2011
This is a guide to 2D bar code imaging technology, including an overview of capabilities and performance in traditional applications.
Tags : 
intermec, 2d imagers, laser scanners, bar code, qr code, digital imagining, document processing
    
Intermec
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security
    
Intermedia
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Published By: Jamf     Published Date: Nov 05, 2018
There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills by providing you with: • An introduction to iPhone, iPad and iOS management • Explanation of Apple services and programs available • Outline of lifecycle management stages • Insight for infrastructure planning • Overview of the industry-leading Apple management solution
Tags : 
    
Jamf
Published By: JBoss Developer     Published Date: Jan 25, 2016
The ability to integrate systems and share data across the enterprise is a common datacenter need. The needs of an integration bus, the technology used for middleware-based integration, can varyin complexity, data volume, and required performance. Both Red Hat and MuleSoft offer multiple products that can help customers develop and deploy middleware integration solutions. This competitive overview compares Red Hat® JBoss® Fuse to Mule ESB Enterprise.
Tags : 
red hat jboss fuse, middleware-based integrations, data volume, integration performance, soa, integration solutions, open source licensing, it management
    
JBoss Developer
Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises’ increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
    
Juniper Networks
Published By: K2     Published Date: Jan 07, 2016
BPM platforms help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments. This research provides an overview of many of the products used to address these needs.
Tags : 
gartner market, business process management, bpm, networking, security, software development, it management
    
K2
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
Published By: Konnetic     Published Date: Aug 05, 2010
A technical overview of the Session Initiation Protocol standard.
Tags : 
sip, session initiation protocol, konnetic
    
Konnetic
Published By: Konnetic     Published Date: Aug 08, 2010
A technical overview of the Session Description Protocol standard.
Tags : 
sdp, session description protocol, konnetic
    
Konnetic
Published By: KPMG     Published Date: Jun 06, 2019
As rising consumer expectations ramp up reputational risk, retailers need to keep up to date with regulatory developments. This report provides a comprehensive overview. Read the report to find out: • what customers care about that could affect your reputation • which regulations you must comply with to manage reputational and financial risk • why brand and reputation is a top concern for UK CEOs.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 15, 2019
Welcome to the latest edition of KPMG’s The Pulse of Fintech — a biannual report showcasing key activities and trends within the fintech market globally and in key regions around the world. This edition provides a global overview of key investment trends and highlights in the wealthtech and proptech sectors in H1-2019. Read now.
Tags : 
    
KPMG
Published By: Landslide Technologies     Published Date: Apr 21, 2008
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part whitepaper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
Landslide Technologies
Published By: LandslideCRM     Published Date: May 17, 2012
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part white paper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
LandslideCRM
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
Nordics based financial company had challenges in migrating the old legacy network design to Cisco ACI for a new Datacentre. Also it did not had service overview and CMDB to support 150 business services transition. LTI leveraged and implemented several ServiceNow modules, customised 100 odd patterns for 150 business services and executed extensive integration of 25 legacy systems. These transactions and implementation helped in easy cost computation for new business expansions ii. Benefits 1. 25% reduction in DC migration time by creating business service oriented move groups 2. Accurate costing of each business service for replication in new regions/geographies
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: Lenovo and Intel®     Published Date: May 17, 2016
This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for NutanixTM + Lenovo as a leader in the marketplace. Start building your business case for hyperconverged today!
Tags : 
lenovo, nutanix, hyperconverge, idc, business technology
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Software-defined infrastructure is no longer the future. It is now. In this hyperconvergence overview, we provide a quick overview of what hyperconvergence is and how data center architectures benefit. You will also see some systems, software examples, and recommendations to get you on your way!
Tags : 
hyperconvergence, it infrastructure, storage computing, network storage, data efficiency
    
Lenovo and Intel®
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Nutanix + Lenovo = Hyperconverged Leaders This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for Nutanix™ + Lenovo as a leader in the marketplace. Get the whitepaper and start building your business case for Hyperconverged
Tags : 
hyperconverged infrastructure, data organization, data management, datacenter
    
Lenovo and Intel®
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top