RecruitingBlogscom

Follow Us:

 

rdi

Results 1 - 25 of 1682Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: May 08, 2019
Greater performance, agility and security are the new imperatives of the modern data center, and according to the Edison Group, Dell EMC PowerEdge servers outperform HPE servers. PowerEdge servers?with Intel® Xeon® Scalable processors? have customer-centrice innovation that is better able to meet the advance demands of IT Transformation, today and tomorrow. Download this infographic to learn the 5 reasons why.
Tags : 
    
Dell EMC
Published By: Pure Storage     Published Date: Jul 03, 2019
Apache® Spark™ has become one of the most rapidly adopted open source platforms in history. Demand is predicted to grow at a compound annual rate of 67% per year between 2017 and 2020, with the cumulative Spark market valued at more than $9 billion during that period, according to the research firm MarketAnalysis.com.
Tags : 
    
Pure Storage
Published By: Infinidat EMEA     Published Date: May 15, 2019
La disrupción digital, la inestabilidad económica, las convulsiones políticas y la escasez de talentos han sido señalados en algún momento de los dos últimos años como los culpables del fracaso empresarial o, al menos, de la pérdida de rentabilidad y ganancias.
Tags : 
    
Infinidat EMEA
Published By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
    
ETQ
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
La rivoluzione digitale, l'instabilità economica, i cambiamenti politici e la carenza di competenze professionali sono tutti stati fattori, negli ultimi 24 mesi, del fallimento di aziende o, quantomeno, di perdite di redditività e profitti.
Tags : 
    
Infinidat EMEA
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
According to Gallup, 1/3 of employees could be lured away by the possibility of work flexibility. And the best way to securely deliver that flexibility is to move beyond virtualizing desktops and into the secure digital workspace. Read the white paper to see why making the move — with the help of a trusted partner —can help you: • Improve user productivity • Empower your IT organization to be more agile • Better protect your company data
Tags : 
    
Citrix ShareFile
Published By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
    
HP Inc.
Published By: Entrust Datacard     Published Date: Jul 12, 2019
In this whitepaper you will find frequently asked questions regarding the qualified website authentication certificate.
Tags : 
    
Entrust Datacard
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Adobe     Published Date: Jun 26, 2019
It’s your first cruise vacation and you’re ready to board. You check one last time to be sure the smart wristband the cruise line sent you last week is securely fastened. Then you join the rest of the crowd on the dock. As you calculate which boarding line is shortest, a crew member glances at your wristband and directs you to a special entrance. No waiting. Once at your room, a sensor verifies the ID in your device and the door opens automatically, saving you from having to juggle bags to find a key.
Tags : 
    
Adobe
Published By: Eaton     Published Date: Jul 12, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June. What follows is a preview of what are, in my opinion, the most significant code changes on track to pass. In this blog, I’ll explore the reasoning for each change and the future steps the NEC may take beyond 2020 regarding: Ground fault circuit interrupter (GFCI) protection Service entrance equipment Reconditioned equipment Performance testing Load calculations Available fault current and temporary power This is a high-level overview. In the coming months, my Eaton colleagues and I will dig deeper into each topic as part of a continuing series on the 2020 code review cycle.
Tags : 
    
Eaton
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: LSSiDATA     Published Date: Feb 05, 2010
New movers are ideal targets for Direct Marketers. New homeowners and renters invariably purchase a wide range of products and services. According to moving.com "People who are moving spend more during the 3 months surrounding their move than non-movers spend in 5 years."
Tags : 
lssidata, data, direct marketers, marketing, super consumers, new mover, clv, clec, firstconnex, line
    
LSSiDATA
Published By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management, odm, mmdm, material
    
Zynapse
Published By: Advertise.com     Published Date: Nov 15, 2010
According to The Fireclick Index, a comprehensive web analytics solution, over 96% of the people who visit a website leave without completing any action, like a purchase.
Tags : 
advertise.com, sales, boost, remarketing, analytics, web analytics, abandonment
    
Advertise.com
Published By: Campaigner     Published Date: May 26, 2010
Email marketing is one of the best performing marketing channels online. According to the DMA, for every dollar spent on email marketing, you can expect a return on investment of $43. But it's not as simple as sending an email to a list to get this sort of result.
Tags : 
campaigner, opt-in, email marketing, emarketing, roi, email, newsletter
    
Campaigner
Published By: Magic Logix     Published Date: Oct 20, 2012
According to Buzz Marketing, 85% of business buyers believe companies shouldn't just present information - they should engage with prospective buyers.
Tags : 
    
Magic Logix
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top