nec

Results 2951 - 2975 of 3343Sort Results By: Published Date | Title | Company Name
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Supply chain-centric organizations face unique challenges in today’s rapidly-changing marketplace. A variety of macro-industry factors, combined with the dynamic nature of their business, have made operations increasingly complex. As a result, there is an urgent need for tools that enable complete visibility into and enhanced management of inventory and related events and activities.
Tags : 
inventory, inventory control, scm, supply chain, supply chain connect, vendor managed inventory, collaboration, collaborating, erp
    
Supply Chain Connect
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Today, as more and more organizations strive to improve productivity and profitability by dedicating the bulk of their resources to their core competencies, many of them are looking for efficient and cost-effective ways to outsource ancillary and support activities. Nowhere is this trend more prominent than among supply chain-centric organizations such as retailers, wholesalers, distributors, and manufacturers.
Tags : 
supply chain, customer service, business management, inventory, vmi, vendor management, relationship management, scm, erp, supply chain connect, vendor, vendors
    
Supply Chain Connect
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Corning Cable Systems offers the broadest range of end-to-end fibre optic and copper product solutions for telecommunications networks. Corning wanted to improve their supply chain to reduce inventory levels (thereby adding to bottom line savings) and reduce overall administrative costs- all without expensive or time-consuming investments.
Tags : 
supply chain, scm, erp, collaborating, collaboration, collaborative commerce, communication, vendor communication, vendor relationship, vendor relationships, corning, supply chain management, supply chain connect
    
Supply Chain Connect
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Chase & Sons has been delivering innovative engineered products and processes to the wire and cable industry for over 50 years. They supply General Cable with specialty tapes. In the past, Chase & Sons would allocate resources for 'emergency handling' of orders which took time away from planning and other more strategic functions.
Tags : 
scm, supply chain, supply chain management, erp, inventory, inventory management, supply chain connect, reduce cost, cost control, spend management
    
Supply Chain Connect
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi, inventory, productivity, case study, general cable
    
Supply Chain Connect
Published By: Supply Chain Connect     Published Date: Apr 24, 2008
Whether you are an electrical supplies wholesaler or a manufacturer of oilfield equipment, the challenge is the same: Are you maximizing your margins by keeping your administrative processes as streamlined as possible? Or, are you wasting time and money by supporting paper-intensive processes to handle quotes, orders, ship notices, receipt documents and invoices?
Tags : 
scm, edi, erp, scc, supply chain, supply chain connect, electronic data, enterprise resource planning
    
Supply Chain Connect
Published By: Suzy Feine     Published Date: Sep 30, 2010
Press releases are no longer just a means to announce business news. Learn the five reasons why press releases can have a dramatic effect on your company's marketing strategy.
Tags : 
marketing, seo, press release, media, editors
    
Suzy Feine
Published By: Switch Video     Published Date: Jun 05, 2013
In 60 Seconds you will learn why an explainer video is the most effective way to communicate your business or organization's message and the cognitive psychology behind their success. We discuss how to simplify your company’s story, so people know what you do; how to use dual coding theory, so people relate to and remember your story; and how to better connect with your audience, so more people buy your product or service.
Tags : 
video marketing, video storytelling, online video
    
Switch Video
Published By: Swyft Media     Published Date: Jun 13, 2016
Effective marketing is all about engagement — connecting with customers and finding innovative, interesting ways to build long-term relationships. When it comes to the highly active, spend-ready millennial generation, coupling the right content with a deeply personal experience is especially important.
Tags : 
swyft, mobile messaging, millennial, audience engagement, audience engagement platform
    
Swyft Media
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless
    
Sybase
Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : 
remote control, help desk, remote access, remote network management, remote support, network security, symantec, networking
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
Tags : 
ssl, firesheep, sidejacking, http connections, tls, ssl, symantec, business technology
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : 
firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections, security, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, storage, data management, business technology
    
Symantec
Published By: Symantec     Published Date: Nov 15, 2013
Learn how to calculate the TCO of your virtualization protection solution and find out whether a virtualization-specific solution is the right fit for your organization instead of a unified solution.
Tags : 
tco, parallel backup solution, virtual environemtns, security, protection, symatnec
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections.
Tags : 
ssl, http, firesheep, side-jacking, wi-fi attacks, tls, user protection, security
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
ALWAYS ONSSLComo uma das principais fornecedoras de certificados SSL, a Symantec está aqui para ajudar você a descobrir tudo o que é preciso saber sobre os benefícios do Always On SSL e como implementá-lo com sucesso.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A confiança naqueles com quem fazíamos transações e a confiança de que as informações de compra que fornecíamos estariam seguras. Afinal, como sempre acontece, onde houver dinheiro haverá criminosos ansiosos por tirar proveito das crescentes oportunidades.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Symantec Endpoint Protection Mobile (SEP Mobile) offers the most comprehensive, highly accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s predictive technology uses a layered approach that leverages massive crowdsourced threat intelligence, in addition to both device- and server-based analysis, to proactively protect mobile devices from malware, network threats, and app/OS vulnerability exploits, with or without an Internet connection.
Tags : 
mobile, security, technology, deployment, enterprise, crow sourced, intelligence
    
Symantec
Published By: Symantec     Published Date: Jun 13, 2018
El Reglamento General de Protección de Datos (GDPR) entra en vigor el 25 de mayo de 2018. Si necesita procesar datos personales de la Unión Europea (UE), posiblemente el GDPR aplica para usted, a pesar de no estar en la Unión Europea. Esto se debe a que el reglamento realmente es global en su alcance y se aplica a cualquier organización que procesa datos personales de la UE, más allá de la ubicación de las compañías o del procesamiento de los datos. En su esencia, la legislación del GDPR está centrada en garantizar que se respete la privacidad como un derecho fundamental y que los datos personales sean guardados privada y seguramente. Elizabeth Denham, del Gabinete del Comisario de Información de la UE (ICO - Information Commissioner Office), dice: “Esta ley no es sobre multas. Se trata de poner en primer lugar al consumidor y al ciudadano” y “La emisión de multas siempre fue y seguirá siendo, el último recurso”. Sin embargo, es importante observar que los costos por incumplir el regla
Tags : 
    
Symantec
Start   Previous    112 113 114 115 116 117 118 119 120 121 122 123 124 125 126    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee