work solutions

Results 76 - 100 of 846Sort Results By: Published Date | Title | Company Name
Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider
    
Arbor Networks
Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
    
Arbor Networks
Published By: Arbor     Published Date: Mar 13, 2014
For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.
Tags : 
arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
    
Arbor
Published By: IBM     Published Date: May 02, 2014
These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse.
Tags : 
ibm, big data platform, architecting big data, analytics, intelligent business strategies, data complexity, data types, workload growth
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
ForeScout
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how AsureForceT Time & Labor Management offered a comprehensive solution to all of Security First Bank's needs.
Tags : 
workforce management, human resources, payroll management, time and labor management, web-based solutions
    
Asure Software
Published By: SAP     Published Date: Feb 26, 2016
Get better results by driving alignment, optimizing performance, and accelerating growth. Is your business prepared for the way we'll work in the future? To stay ahead of the competition you need a proactive, integrated approach to your entire talent management lifecycle. SuccessFactors offers a full suite of talent solutions to help you. • Attract, engage, select, and hire the right talent • Get your new hires up to speed in record time • Provide continuous performance management • Reward and retain your top talent • Identify and anticipate talent gaps • Provide learning anywhere, any time • Get content as a service • Harness the power of collaboration
Tags : 
sap, talent management
    
SAP
Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management
    
Tidal Software
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Enterprises understand that greater efficiency, improved time-to value, and new opportunities can be gained by using cloud platforms; automating and accelerating their IT delivery; and putting technology to work in new ways to digitally transform their business. The difficult question is how to create an organization that is able to deliver these innovations. Skilled resources do exist, but they command high salaries and are in short supply. In fact, 70% of respondents to a recent Computing survey stated that their companies face a shortage of cloud skills. While bringing in experienced staff who can guide and lead new initiatives is often a necessity, it’s vital to concurrently train your existing staff and adopt solutions that narrow the gap between the realities of the present and the hopes for the future.
Tags : 
netops, skills, automation, enterprises, cloud, delivery, resources
    
F5 Networks Inc
Published By: Red Hat     Published Date: Nov 08, 2017
With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster..
Tags : 
system migration, proprietary imaging, bond management workflow system, enterprise solutions, open source technology
    
Red Hat
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network
    
Noction
Published By: Bright Horizons     Published Date: Dec 14, 2016
Dependent-care breakdowns are a serious risk to business continuity. With child care already a challenge for much of the workforce, and elder care responsibilities on the upswing due to the aging population, smart organizations are moving toward a response strategy.
Tags : 
business continuity, employee well-being, workforce productivity, retention, engagement, recruitment, child care, back-up child care
    
Bright Horizons
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
Adobe
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions
    
E-SignLive by Silanis
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: ThousandEyes     Published Date: Nov 17, 2016
Traditional performance management solutions were built for applications owned by the enterprise and run inside the corporate network. The explosive adoption of Software-as-a-Service (SaaS) and cloud applications have brought new performance management challenges that push the limits of the enterprise infrastructure and break these traditional approaches. In this white paper, we examine why existing solutions don’t work for the modern enterprise and discuss a fundamentally different approach that is needed to address the new challenges. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Aug 04, 2017
Traditional enterprise performance management solutions were designed for applications running inside the corporate network and are unable to provide visibility beyond the corporate network perimeter. With the rapid adoption of Software-as-a-Service (SaaS) applications by enterprises, these performance management solutions that are completely blind to issues outside the enterprise, are unable to help IT teams troubleshoot performance problems with the SaaS applications.
Tags : 
information technology, software as a service, management solutions, corporate network
    
ThousandEyes
Published By: ConnectWise     Published Date: Aug 22, 2019
There is a better way to master your client’s network, and it all begins with better network management strategies and tools that go beyond endpoint management alone. With these new solutions, you can drive down wait times through dynamic self-help options, see all of the device connections to take action before something goes wrong, and script out solutions for common problems—all from information in one easy and convenient place.
Tags : 
    
ConnectWise
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat
    
IBM
Published By: IBM     Published Date: May 07, 2013
This book brings a practitioner’s view to Big Data Analytics. Download this ebook to read a practical viewpoint into leveraging analytics for Big Data. This book also draws material from a large number of workshops and interviews with business and IT leaders. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
practical viewpoint, analytics, big data, interviews, business
    
IBM
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: BlackBerry     Published Date: Oct 03, 2012
Many businesses are tasked with the challenge of getting the most current collateral to their mobile workforce, efficiently and securely. That's why Box Inc. developed Box for the BlackBerry PlayBook tablet (Box App).
Tags : 
file management, blackberry, tablet, cloud computing, mobile computing, application development, cloud based content management system, cms
    
BlackBerry
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.