RecruitingBlogscom

Follow Us:

 

shared

Results 1 - 25 of 271Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache
    
BitGravity
Published By: Microsoft Office 365     Published Date: Nov 03, 2016
Going with a single-vendor collaboration platform is an easy call, right? Employees can communicate clearly, information is shared easily, and processes are streamlined. When improving collaboration in your enterprise, here are five core areas to focus on: Saving time and increasing productivity Lowering costs and complexity Ensuring end-to-end security compliance Scaling at your own pace Having administrative control In this free eBook, learn how a single-vendor platform helps you achieve these goals.
Tags : 
    
Microsoft Office 365
Published By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco
Published By: Automation Anywhere APAC     Published Date: May 17, 2019
Much has already been said and written about the infiltration of robotic process automation (RPA) and intelligent automation (IA) technologies into the workforce. In truth, it’s taken the corporate world a while to test, trust and commit to automation at work. To understand how far APAC/ANZ markets have advanced towards acting on these opportunities, the Shared Services and Outsourcing Network (SSON) surveyed the market and found that across the region corporations were forward thinking in building for scale, trusting technology and recognising the need to incorporate robotics into both IT infrastructure and enterprise strategy. This report explains how enterprises across APAC/ANZ are staying ahead of the global wave of RPA, the most popular solutions they are choosing, who the preferred consultants or 'integrators' are, the challenges, and how the digital workforce is being integrated into the human one.
Tags : 
    
Automation Anywhere APAC
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
While there are many security concerns in the cloud, this report focuses on 12 specifically related to the shared, on-demand nature of cloud computing. To identify the top concerns, CSA conducted a survey of industry experts to compile professional opinions on the greatest security issues within cloud computing. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Jul 08, 2016
Dell Virtual SAN Ready Nodes with Horizon abstract and aggregate compute and memory resources into logical pools of compute capacity, while Virtual SAN pools server-attached storage to create a high-performance, shared datastore for virtual machines.
Tags : 
technology, best practices, poweredge, hyper converged, networking, mobile computing, business technology
    
Dell
Published By: Dell     Published Date: Jul 08, 2016
In a Hyper-Converged Infrastructure, compute, networking, and shared storage are delivered from Dell 13G PowerEdge servers powered by Intel Xeon processors, which enables a pay-as-you-go, aff?ordable model to cost-effectively operate at high performance.
Tags : 
best practices, technology, data, infrastructure, networking, poweredge, storage, business technology
    
Dell
Published By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
2017 Trends in Financial Services and Insurance: Customer is Priority The FSI sector is progressing with a digital, data-driven, marketing mentality, all centered around prioritizing customer experience and taking a more personal approach. The 2017 Digital Trends in Financial Services and Insurance compiles the information shared by over 800 FSI respondents to see what opportunities and obstacles are shaping the future of FSI. Read this report and find out: How data and personalization drive digital transformation How fintech is leading the FSI chase Tips to help future-proof your FSI business
Tags : 
    
Adobe
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere
Published By: Delphix     Published Date: May 03, 2016
Today's test data management (TDM) solutions force teams to work with compromised data sets, and push testing to too late in the software development lifecycle. The end result is rework, delayed releases, and costly bugs that cripple production systems. Furthermore, prevailing approaches to test data management - including subsetting, synthetic data, shared environments, and standalone masking--represent flawed solutions that fail across one or more key dimensions.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 02, 2015
To help users achieve these goals and attain greater simplicity, efficiency and versatility in ROBO sites, Dell engineered the PowerEdge VRTX shared infrastructure platform. Download this white paper to learn more about Dell PowerEdge VRTX.
Tags : 
    
Dell EMC
Published By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : 
server configuration, role configuration, virtual disks, server installation
    
Dell
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
A start up guide to Paul Marquardt Building Microsoft Windows Server 2012 Clusters on the Dell PowerEdge VRTX.
Tags : 
dell, vrtx, paul marquardt, microsoft windows server, windows server®, cluster shared volumes, csv, software development, it management
    
Dell Brought to you by Intel
Published By: SAS     Published Date: Nov 04, 2015
In a panel discussion at the 12th annual SAS Health Analytics Executive Forum in May 2015, leaders from Dignity Health, Horizon Blue Cross Blue Shield of New Jersey, Janssen Pharmaceuticals and SAS shared what they have done to prove the value of analytics to their business leaders – and what has worked for them as they developed an analytic culture in their organizations and put analytic insights to work.
Tags : 
sas, healthcare, healthcare models, episode analytics, analytics, data management, information technology, practice management
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top