RecruitingBlogscom

Follow Us:

 

overview

Results 226 - 250 of 686Sort Results By: Published Date | Title | Company Name
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: Pentaho     Published Date: Aug 22, 2016
This white paper provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals.
Tags : 
big data, data integration, bi systems, hadoop
    
Pentaho
Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
A comprehensive overview of the VxRail hyper-converged appliance from Colin Gallagher, Senior Director of Product Marketing, VxRail, VCE.
Tags : 
vce, vxrail, product overview, hyper-converged, networking, software development, it management, knowledge management
    
EMC Converged Platforms
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security, networking, enterprise applications, business technology
    
F5 Networks Inc
Published By: DocuSign     Published Date: Aug 16, 2016
Introduction Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This document provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: Okta     Published Date: Jul 27, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 27, 2016
IT leaders are finding new opportunities in an era of digital disruption. Read this two page executive brief for a quick overview of how IT is driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers, distributors, and devices.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
Published By: Okta     Published Date: Jul 25, 2016
For most companies, Active Directory (AD) or LDAP and play the central role in coordinating identity and access management policies. Directory integration typically serves as a "source of truth" for user identities, and it provides access control to on-premises resources such as networks, file servers, and web applications. A byproduct of the transition to cloud applications is the proliferation of separate user stores; each cloud application typically is rolled out independently and therefore has its own unique database of user credentials. Okta's cloud-based identity and access management service solves these problems with a single integration point that provides a highly available solution for all cloud and web-based application Active Directory integrations.
Tags : 
cloud computing, cloud applications, best practices, applications, access management, business technology
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : 
okta, best practices, technology, optimization, identity governance, cloud computing, business technology
    
Okta
Published By: IBM     Published Date: Jul 22, 2016
This smartpaper presents an overview of the B2B integration landscape—its challenges, opportunities and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM cloud to excel amid escalating global complexity, demand volatility and new customer requirements.
Tags : 
ibm, b2b, b2b cloud integration, b2b integration, cloud, integration, smart paper, knowledge management
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
This webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance, hardware, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business technology, hybrid cloud, hybrid, enterprise applications
    
IBM
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: IBM     Published Date: Jul 12, 2016
This video provides an overview as to how governments can provide better services to citizens with IBM Case & Capture. Watch to learn more.
Tags : 
ibm, ecm, analytics, government, big data, ibm case and capture, knowledge management, enterprise applications
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code, enterprise applications, business technology
    
Black Duck Software
Published By: Lenovo and Nutanix     Published Date: May 18, 2016
Sponsored By Lenovo™ and Nutanix This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for NutanixTM + Lenovo as a leader in the marketplace. Start building your business case for hyperconverged today!
Tags : 
lenovo, nutanix, hyperconverge, idc, business technology
    
Lenovo and Nutanix
Published By: CradlePoint     Published Date: May 17, 2016
WHAT YOU’LL GET: An overview of emerging IT trends in retail Common challenges specific to retail networks 3 retail customer success stories The benefits of utilizing WWAN at the Network’s Edge
Tags : 
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
In this white paper you will get an overview of: The changing QSR technology landscape Cut-the-Wire solutions for ease-of-management Managing IT costs via the cloud A customer success story: Raising Cane’s Chicken Fingers
Tags : 
    
CradlePoint
Published By: Lenovo and Intel®     Published Date: May 17, 2016
This white paper from IDC provides a key resource for detailing the use cases for Hyperconverged, offering an overview of the landscape and a deep-dive into the use case for NutanixTM + Lenovo as a leader in the marketplace. Start building your business case for hyperconverged today!
Tags : 
lenovo, nutanix, hyperconverge, idc, business technology
    
Lenovo and Intel®
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: SolidFire_NetApp     Published Date: May 10, 2016
This document provides an overview of EMC’s XtremIO architecture as it compares to SolidFire. Not intended to be exhaustive, this overview covers select elements where the solutions differ and presents their impact to overall suitability for data center needs.
Tags : 
storage management, performance management, best practices, application integration, data management, data center, business intelligence
    
SolidFire_NetApp
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top