article

Results 76 - 100 of 282Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
Nachdem die größte Fusion der Geschichte zweier privater Technologieunternehmen abgeschlossen war, wurde Dell EMC klar, dass das neu geschaffene Unternehmen flexibler werden und Innovationen schneller umsetzen musste. Als Teil der digitalen Transformations- und Modernisierungsbemühungen sahen die Dell EMC Innovatoren es als notwendig an, mehr wie ein Softwareunternehmen zu denken und zu handeln.
Tags : 
    
Dell EMC & Intel
Published By: Dice     Published Date: Oct 07, 2013
Put up a job listing and you’ll get a number of resumes. Is that success? Quantity is never the goal. Quality is. So, what does it take to attract the best talent? If it were as simple as free meals, this article would be very short.
Tags : 
dice, top tech talent, job posting, talent
    
Dice
Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Published By: Diligent     Published Date: Aug 05, 2016
This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.
Tags : 
cybersecurity, security management, security
    
Diligent
Published By: dinCloud     Published Date: Jun 19, 2018
As a professional in the legal industry, you may have been reading articles and hearing from colleagues about the traction and momentum for cloud services. Deciphering cloud solutions for your particular needs is still convoluted. A common use case is cloud backup and in many cases, multiple, redundant copies of legal files. Whether it is misplacing or losing data or in the case of a natural disaster, backups are a necessary part of this business.
Tags : 
cloud, trends, legal, industry
    
dinCloud
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data
    
Discovery Corps, Inc
Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.
Published By: Drillinginfo     Published Date: Nov 18, 2015
The Bakken is a very large hydrocarbon-bearing subsurface rock formation underneath a large portion of the Williston Basin in North Dakota, Montana, Saskatchewan and Winnepeg. The Bakken has been the scene of many advancements in drilling technology – horizontal drilling, pad drilling and downspacing, to name a few. This first Edition of the DI Expert eBook by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, is a collection of articles posted by our staff of engineers, analysts and geologists about the Bakken over the past year.
Tags : 
geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: Drillinginfo     Published Date: Nov 18, 2015
This second edition of the DI Expert eBook provides a collection of articles written by staff analysts from Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions. These articles focus on the Eagle Ford Shale play in south central Texas. The Eagle Ford Shale boom began in 2008 and has transformed the lives of mineral rights owners, communities and E&P operators throughout Texas and the United States. The Eagle Ford Shale is a cretaceous formation with a favorable brittleness index, which makes the formation ideal for hydraulic fracturing and economical unconventional production.
Tags : 
exploration, best practices, hydraulic fracturing, geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: Drillinginfo     Published Date: Nov 06, 2015
In the DI Expert series, we cover a broad range of topics to appeal to the working interests of oil and gas professionals around the globe. From a piece inspired by a Mud Logger’s “Ask Me Anything” on Reddit, to an article that explores the frustrations and issues surrounding most oil and gas software, this edition introduces analyses that are sure to stimulate great discussion points among colleagues in all disciplines of the industry. We also reveal the greatest driver of oilfield innovation and value in the 21st Century, and highlight the prolific counties that account for over half of all oil and natural gas production in the U.S.
Tags : 
oil and gas, oil and gas software, oilfield innovation, drillinginfo
    
Drillinginfo
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, information technology
    
E-SignLive by Silanis
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
What is the best or ideal type of electronic signature? There is no one-size-fits-all answer. It all depends on the process being automated. In this 7-page article, we start out by defining the steps in a typical e-signature process and identify what options there are for each step. Download your complimentary copy now.
Tags : 
    
E-SignLive by Silanis
Published By: Eaton     Published Date: Jul 09, 2018
Code updates happen for one main reason: safety improvement. NEC (National Electrical Code) Article 408.3 helps take electrical safety for service entrance panels to a new level. The code, updated in 2017, includes provisions to provide shock protection via panelboard barriers. The barriers protect from energized conductors on the line terminals of the main overcurrent protection device (OCPD) in a panelboard. When the main circuit breaker in a panel is turned off, line side terminals and conductors remain energized from upstream via the utility or another panelboard. With these barriers in place and the main OCPD turned off, installers are better protected when pulling wires into the panelboard. Today, all panelboards are shipped with shock-protective barriers. However, barriers are new to installation procedures, so contractors may not recognize them and accidentally throw them out—easily and often.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Oct 04, 2019
Safety has always been Eaton’s highest priority and we work closely with the NEC (National Electric Code) to ensure new policies continue to protect our most valuable resources, people. Eaton, the NEC, NEMA, and other organizations have long maintained that molded case circuit breakers are not suitable for repair or refurbishment. While changes to the code for 2020 do not change that position, they do provide clarity on what it means to be refurbished and what is now required when a suitable product is refurbished, including clearly marking the item as refurbished and removing the original manufacturer’s listing mark. The new code distinguishes between general maintenance like replacing a breaker, and refurbishment, altering a piece of equipment to a once again operational state. Because a refurbished unit cannot be tested to the manufacturer’s test protocol, it cannot continue to carry the original listing mark. Read the article below and learn about "reconditioned", and what the NEC is doing to reinforce that UL489 molded case circuit breakers are not suitable for refurbishment or repair.
Tags : 
    
Eaton
Published By: Encore Consulting     Published Date: Dec 09, 2010
A Simple, Practical Article on How to Sell Value Over Price
Tags : 
selling skills, sales training, sales trainers, selling techniques, selling tips, sales workshops, sales seminars, brain tracy, sales, selling, how to sell, consultative selling, strategic selling
    
Encore Consulting
Published By: Engineering360 Media Solutions     Published Date: Jul 07, 2016
Engineering360 is pleased to bring you this selection of marketing articles compiled from recent editions of the Marketing Maven, our monthly e-newsletter created exclusively for business-to-business sales and marketing professionals in the industrial sector.
Tags : 
marketing, engineering360, sales, b2b marketing, marketing strategy, social media
    
Engineering360 Media Solutions
Published By: ESADE     Published Date: Jan 20, 2019
Read the latest articles on the most relevant management research topics such as Artificial intelligence collaborations for society.
Tags : 
esade, executive education, business training
    
ESADE
Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun, win32/conficker, win32/psw.onlinegames, win32/sality, bflient, autoit, tifaut.c, spy.ursnif.a
    
ESET, LLC.
Published By: Evariant     Published Date: Sep 07, 2016
Many hospital Chief Marketing Officers continue to debate whether their institution should transform their traditional marketing campaigns and embrace digital marketing. If you are in doubt as to whether digital marketing is important to your success and the success of your hospital, look at the countless articles, white papers, and blogs that have been published over the past several years that talk to the use of the internet and web-based services by patients and consumers. Here are a few of the latest examples from Pew Research Center’s Health Fact Sheet (
Tags : 
evariant, hospital, patient engagement, digital marketing
    
Evariant
Published By: F5 Networks Inc     Published Date: Jul 21, 2014
Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.
Tags : 
web app, acceleration, implementation, data, performance
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
In this article, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve when it comes to securing apps in a mobility-focused world.
Tags : 
application security, mobility-focused world, application solutions
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
According to the 2018 Global DNS Performance Benchmark Report, the state of DNS resiliency among enterprises and top SaaS providers is poor, with 60% relying on a single source for their authoritative nameservers. In this article, we’ll explore the necessity of having a secondary DNS service.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: FICO     Published Date: Mar 02, 2018
The role of analytics in managing, improving and ultimately transforming supply chains cannot be understated. But what about the analytics themselves? FICO’s Zahir Balaporia and renowned author Tom Davenport use the term “The Analytics Supply Chain” to reflect that the actual analytics themselves parallel supply chains, with inherent challenges and problems if things “get stuck.” Rethinking analytics in these terms can not only improve supply chain performance, but also any other business problems you seek to solve. This article targets: · Steps in the analytics supply chain and the vital role of data and analytic models · How your predictions, recommendations and insights need to rely on similar attributes to finished manufactured products; · Key questions to ask yourself in determining where you need to fix your analytics supply chain.
Tags : 
supply, chain, analytics, employee, optimization, organisations, productivity
    
FICO
Published By: FICO - APAC     Published Date: Jul 10, 2017
To Learn more, read this IndustryWeek eBook, sponsored by FICO, includes four articles about how a variety of manufacturers are using advanced analytics to "get ahead" in areas such as Big Data, supply chain and logistics, and other specific applications.
Tags : 
    
FICO - APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.