info systems

Results 226 - 250 of 311Sort Results By: Published Date | Title | Company Name
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems, ips
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: IBM     Published Date: Apr 04, 2013
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm cognos, insight, guides, analysts, faster, better outcomes, better performance, business analysts
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Today’s businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in “patterns of expertise” to address complex business and operational tasks for smarter computing.
Tags : 
ibm, information technology, systems, integrated systems, expert integrated systems, ibm puresystems, platform system, infastructure system
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, ibm business analytics, business analytics solutions, ibm cognos insight, analytics, data analysis, visualization
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.
Tags : 
ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service, business users, analytic solution, share data, performance management, supply chain management, customer relationship, cognos insight
    
IBM
Published By: Polycom     Published Date: Mar 13, 2018
Create your business case for group video conferencing. Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes.
Tags : 
polycom, video collaboration, wainhouse research, enterprise technology
    
Polycom
Published By: FIBRWRAP     Published Date: Jan 08, 2016
This paper will explore the advancements made in retrofitting unreinforced masonry walls with fiber reinforced polymer (FRP) systems to withstand the lateral loading induced by a seismic event.
Tags : 
fibrwrap, fiber reinforcedpolymer, frp, urm, unreinforced masonry, structure, engineering
    
FIBRWRAP
Published By: DocuSign     Published Date: Jul 12, 2019
As you know, HR plays a critical role in recruiting, hiring, training, and retaining the lifeblood of your business: people. But despite HR’s strategic role, it has traditionally lagged behind other departments in terms of adopting user-friendly, employee-focused technology investments. Legacy tools and reams of paper are still often used to prepare, sign, act upon, and manage the overwhelming document load, from recruitment and onboarding to performance management and off-boarding.1 The combination of outdated processes and additional paperwork limits HR staff’s ability to do their most important job: hire and support employees. That’s changing as HR turns to the cloud to digitize the agreement process. According to a 2018 PwC survey of HR executives, 75 percent of respondents said that they’ve moved at least one HR process to the cloud, while 40 percent have core systems (talent and acquisition management and HR information systems, for example) in the cloud.2 And those efforts are
Tags : 
    
DocuSign
Published By: IBM     Published Date: Oct 16, 2015
The core principles of retailing may remain the same but the methods by which retailers must reach out to customers are constantly evolving. As the need for real-time analytics and customer information grows more important, retailers need robust systems to manage the ever-expanding volumes of data.
Tags : 
customer experience, transaction processing, omnichannel banking, consumer demands, customer interaction, shopper experience, retail
    
IBM
Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis
    
Attivio
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality
    
SpectorSoft
Published By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : 
hewlett packard, storeonce, data protector, catalyst software
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : 
application systems, application services, it solutions, application complexity
    
IBM
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
The Symantec Website Security Threat Report gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.