asics

Results 76 - 100 of 162Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Feb 03, 2012
Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible.
Tags : 
ibm, operations, productivity, maintenance, operations, manufacturing, technology
    
IBM Software
Published By: Black Box Corporation     Published Date: Feb 22, 2011
This white paper explains the basics of NAC and simplifies the many confusing NAC options available in the marketplace.
Tags : 
lack box, black box network black box network, security, black box security, network security, access control, network access control, nac
    
Black Box Corporation
Published By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper
    
IBM
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security, it management
    
McAfee
Published By: Paycor     Published Date: Dec 04, 2013
Disengaged employees present a challenge to today’s organizations. But as Chief Human Resources Officer Karen Crone explains in this 30-minute webinar, “Employee engagement is not magic.” Learn about the basics of employee engagement and how to drive higher engagement and productivity at your organization with her five recommended best practices.
Tags : 
employee engagement, talent management, human resources, employee, performance, productivity
    
Paycor
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity, it management
    
Box
Published By: IntelliCorp     Published Date: May 31, 2012
Need to implement a pre-employment screening solution for your organization or want to evaluate your current program? Download this free whitepaper to receive a clear explanation of what you should consider to help mitigate risk.
Tags : 
intellicorp, background check, pre-employment screening, background screening company, fcra, consumer report, criminal search, sex offender registry
    
IntelliCorp
Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign
Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform
    
Acquia
Published By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : 
rsa, rsa security, data breach, data protection, gdpr
    
RSA
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) technologies are rapidly moving beyond the realms of academia and speculative fiction to enter the commercial mainstream, with innovative products that utilize AI transforming how we access and leverage information. AI is also becoming strategically important to national defense and in securing our critical financial, energy, intelligence, and communications infrastructures against state-sponsored cyberattacks. According to an October 2016 report issued by the federal government’s National Science and Technology Council Committee on Technology (NSTCC), “AI has important applications in cybersecurity, and is expected to play an increasing role for both defensive and offensive cyber measures.” Based on this projection, the NSTCC has issued a National Artificial Intelligence Research and Development Strategic Plan to guide federally-funded research and development. The era of AI has most definitely arrived, but many still don’t understand the basics of this im
Tags : 
artificial, intelligence, cybersecurity, machine
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn about some common “data encryption myths” and the risks they pose.
Tags : 
protecting, student, institutional, privacy, data, encryption, education
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
This eBook will review the basics of data encryption; data concerns specific to ESS; how data encryption addresses the unique data security challenges facing ESS, and key points to consider when building the case for data encryption.
Tags : 
pii, protect, data encryption, ess
    
WinMagic Inc.
Published By: SAS     Published Date: Mar 19, 2013
From Basics to Big Data with SAS® Visual Analytics
Tags : 
big data, visualization, interactive, data, data visualization
    
SAS
Published By: Intel Corp.     Published Date: Apr 26, 2012
Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : 
voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip
    
Tripp Lite
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara
Published By: HP     Published Date: Jul 22, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized.
Tags : 
tier-1, storage, data, flash, storage system, data center, data management, business technology
    
HP
Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia
Published By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : 
eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions, it management, knowledge management, enterprise applications
    
Eaton
Published By: Eaton     Published Date: Feb 09, 2017
In this white paper, Eaton experts give you an introductory overview of what a UPS is, and what kinds of UPSs are available, along with a comprehensive guide to matching the right UPS and accessories to your needs.
Tags : 
uninterrubtible power systems, electicity, eaton, dependability, it power supply, ups accessories, it management, storage
    
Eaton
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions
    
Tripwire
Published By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : 
ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee