practical

Results 251 - 275 of 520Sort Results By: Published Date | Title | Company Name
Published By: Infosys     Published Date: Jun 14, 2019
The basic promise of blockchain is that it works as a global distributed ledger or database of things we value - everything from money, to creative work and votes - so these can then be managed and transacted in a trusted and secure manner. Yes, blockchain is a young technology, but well past its infancy. Today, the somewhat inflated expectations around the technology have been brought to a more realistic level and we are beginning to see practical applications across the enterprise. Although these are typically in the realm of reducing cost and/or time for transactions, improving product and system security, finding and preventing fraud and counterfeiting and increasing transparency, there are also instances of businesses relying on blockchain to create new revenue streams. Infosys recently commissioned an independent survey of senior executives worldwide. Download the report to read about their findings.
Tags : 
    
Infosys
Published By: Cloudian     Published Date: Feb 15, 2018
As the volume of unstructured data created and used continues to increase rapidly, organizations are faced with challenges around data storage. In response, many new technologies — specifically objectbased storage, software-defined storage, all-flash arrays, and cloud-based storage services — are experiencing rapid adoption. Yet object-based storage has been limited by the need to rewrite existing file-based applications — a prospect that is costly and requires more manpower than is practical for many organizations. Cloudian offers both an object storage platform and more recently an enterprise file services product. When deployed together, Cloudian's products are designed to consolidate file and object data into a single repository and can enable organizations to manage environments that span the cloud as well as on-premises.
Tags : 
    
Cloudian
Published By: Cohesity     Published Date: Aug 09, 2019
Data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide.
Tags : 
    
Cohesity
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Kenexa     Published Date: Aug 30, 2011
White paper examining the importance of accurately written job descriptions and how they affect an organization with some practical steps to writing effective job descriptions.
Tags : 
kenexa, writing job descriptions, competencies, competency, job role, position descriptions, sample job descriptions, guideline for writing job descriptions
    
Kenexa
Published By: Riverbed     Published Date: Nov 02, 2016
"Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code. However, that slowness is often not the root cause, but rather a symptom of an underlying infrastructural issue hidden from view. Examine common, yet elusive application performance problems that reveal themselves only when you look at them from the right vantage point. Get the field guide today!"
Tags : 
    
Riverbed
Published By: SafeNet     Published Date: Sep 15, 2010
This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.
Tags : 
safenet pci, pci compliance, tokenization, encryption, data masking
    
SafeNet
Published By: MuleSoft     Published Date: Jul 13, 2018
"This brief API management best practices eBook will give API strategists, architects and developers a roadmap for creating practical APIs by leveraging existing services. By following the 7 best practices outlined in this ebook, developing successful APIs is easier than you think. The best practices guide will cover: -The relationship between SOA and API management -How to think about and approach API design -A pattern for securing and managing your APIs -Things to consider when selecting an API management solution"
Tags : 
    
MuleSoft
Published By: Marketo     Published Date: Jun 04, 2018
Until now, most organizations have built their MarTech stacks piece by piece—adding technologies to meet new needs or test new delivery methods. But with so many applications available and so many competitive gains to be made by using the right combination of technologies, it is increasingly important to have a strategy to connect your stack across marketing and other revenue-driving functions. By harnessing a well-considered MarTech stack, marketers can bring order to the overwhelming volumes of data they collect from online and offline interactions with prospective and existing customers. Better yet, this technology enables you to make those insights actionable, meaning you can make informed decisions. Download this ebook for seven practical steps your organization can take to put together a high-performance MarTech stack.
Tags : 
    
Marketo
Published By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
    
NetIQ
Published By: CDW Symantec     Published Date: Sep 07, 2012
A practical guide to protecting and leveraging your virtual environment for rapid recovery.
Tags : 
cdw, symantec, disaster recovery, virtual environment
    
CDW Symantec
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software
Published By: EPiServer Inc.     Published Date: Sep 16, 2013
E-commerce is everywhere. More people are shopping for a greater variety of products than ever before. And while some countries are ahead, in all developed economies it is a matter of when, not if, e-commerce will become a significant revenue stream for every retail business. In this guide, we'll look at seven lessons today's retailers should learn if they are to gain maximum benefits from their e-commerce operations. Together, these lessons can help take your e-commerce operation forward enabling you to capture more sales, more often.
Tags : 
e-commerce solutions, customer experience management, e-commerce strategy, e-commerce success, social e-commerce, mobile e-commerce
    
EPiServer Inc.
Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats
    
Palo Alto Networks
Published By: Salesforce     Published Date: Nov 18, 2014
"A growing business needs a good Customer Relationship Management (CRM) application. It helps you manage critical customer information in one place — and gives you a complete view of your business. You’ll gain key business insights that help you close more deals, boost sales, and improve forecasting accuracy. But is now the right time for you? Read this e-book to get practical advice on: • Signs your business needs a CRM • How CRM can improve sales and productivity • Building your CRM strategy • How to maximize your ROI Download Your Complete CRM Handbook now so you can decide when your business should invest in a CRM. "
Tags : 
crm, sales and productivity, customer information, business insights, forecasting, boost sales
    
Salesforce
Published By: Corvisa LLC     Published Date: Feb 13, 2015
Growing numbers of businesses are moving their contact center operations to the cloud. What do they know that you don’t? This whitepaper provides a practical guide to assist in the decision-making process. It offers a comparison of traditional on-premise systems versus current cloud-based solutions, responds to common cloud concerns and discusses the steps needed to begin your due diligence process.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
Corvisa LLC
Published By: UPS     Published Date: Nov 09, 2017
The Role of Additive Manufacturing in Production of the Future Additive manufacturing (AM) is the process of adding layers of material — most commonly plastics or resins, and increasingly metals — to produce products according to precise digital plans. With AM, products are produced using only the material necessary, therefore minimizing scrap. Modern digital technology is transforming every industry, including manufacturing. Yet in The Rise of Smart Operations, a survey of machinery manufacturers conducted by UPS and IDC, roughly one-half of the respondents said their digital or “smart” operations were lagging the competition or were at a significant disadvantage. Manufacturers will also find practical solutions they can consider implementing today to incorporate smarter operations in their production processes of the future.
Tags : 
additive manufacturing, ups, industrial products, industrial products wholesale, smarter ops, smarter operations, industrial manufacturing
    
UPS
Published By: Microsoft     Published Date: Jul 20, 2018
Although AI research has been ongoing for decades, the past few years have seen a leap in practical innovations, catalyzed by vast amounts of digital data, online services, and enormous computing power. As a result, technologies such as natural-language understanding, sentiment analysis, speech recognition, image understanding, and machine learning have become accurate enough to power applications across a broad range of industries.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information, security breach, secure passwords, mobile risks
    
Kaspersky Lab
Published By: IBM     Published Date: Feb 25, 2008
There is increasing concern that IT investment is approaching the point of diminishing marginal returns. This white paper highlights the costs of IT asset proliferation and the advantages of the IBM view of IT optimization as a strategic, ongoing process. It describes the holistic and practical IBM approach and shows how it is helping organizations realize greater initial savings and higher returns going forward.
Tags : 
roi, it spending, ibm, opt it, ibm opt it, network management, it management
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
Virtualization provides opportunities to reduce complexity, improve service levels to the business and lower capital and operating costs to provide and maintain IT infrastructure. This paper for senior IT managers is intended as a starter guide for virtual infrastructure technical design, project planning, scoping, and implementation.
Tags : 
servers, virtual server, server virtualization, vmware, virtual, virtual machine, virtual server, ibm
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.