online tech

Results 176 - 200 of 218Sort Results By: Published Date | Title | Company Name
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility, security
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : 
security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions, security
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Phishing scams are a serious problem around the world. The number of attacks – and their level of sophistication – has skyrocketed in recent years. If you have a website and do business online, you are probably at risk. Fortunately, there is an effective way to protect your customers, your company and your brand from phishing: SSL and Extended Validation (EV) SSL. In this guide, you’ll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.
Tags : 
phishing scams, web protection, customer protection, attacks, ssl, ev ssl, security
    
GeoTrust
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Silverpop     Published Date: Jan 20, 2007
In the early days of email, online marketers would happily shoot a thousand arrows in the hopes of hitting a lone bull’s eye. But in a channel long since overrun by spam and irrelevant marketing messages, marketers have turned to advanced techniques and technology to ensure their messages are delivered, anticipated and welcomed by recipients.
Tags : 
email vendors, vendors, email marketing, email management, vendor selection
    
Silverpop
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards
    
Aladdin
Published By: Schneider Electric     Published Date: Feb 12, 2018
Technology is infiltrating K-12 classrooms at a rapid clip as educators find new ways to employ computing devices and online resources to improve education and learning. Overall, the global market for education-related technology, services and content is expected to grow from $193 billion in 2016 to $586 billion in 2021, a compound annual growth rate of nearly 25%, according to the market research firm Research and Markets.
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Feb 08, 2008
Appropriately sizing and hosting your online game project’s infrastructure can improve your bottom line. In this white paper, IBM describes the current state and direction of key technological trends and how they impact the business of games, focusing on what online game companies need to know to more rapidly and efficiently build a better game.
Tags : 
game, online games, video games, ibm, game project, software development
    
IBM
Published By: Online Insight     Published Date: Dec 12, 2006
This white paper describes the technologies underpinning the enterprise software solution suite that OnlineInsight offers today in its Fourth Generation products, and explains how our enterprise-class software systems take software "abilities" to new levels.
Tags : 
enterprise software, software deployment, scalable software, future of software, online insight, enterprise applications
    
Online Insight
Published By: Concentra     Published Date: Mar 31, 2008
There is a lot of interest at the moment in Web 2.0, a catch-all term for ways of making websites much more dynamic and socially interactive. What is a pity is that all the jargon about mash-ups and social media might suggest opening up your online presence this way will require lots of investment in arcane or unproven technology.
Tags : 
concentra, sharepoint, intranet, 2.0, collaboration, knowledge management
    
Concentra
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords
    
Godfrey
Published By: RisingMedia     Published Date: Oct 14, 2008
Starting in 2002, the first few years of the eMetrics Marketing Optimization Summit were formative for an those interested in measuring the ROI of online marketing. Technologies were revealed, processes suggested, partnerships formed and an industry found its voice.
Tags : 
emetrics, risingmedia, roi, online marketing, marketing optimization, wasp
    
RisingMedia
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional
    
Kaplan, Inc.
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional
    
Kaplan, Inc.
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
Published By: SAS     Published Date: Dec 20, 2018
There’s no shortage of data scientist interview questions available online. You can find lists and lists of questions to ask data scientist recruits in an interview, but most of the questions focus on the technical and quantitative aspects of the job without considering the softer skills. Our list takes a different approach. If you’re hiring a data scientist, we recommend focusing on more than technical skills, and your interview questions should reflect that. Data scientists have a unique blend of skills; not only do they solve problems by squeezing information out of data, they also communicate results and persuade others to apply that information to their decisions. Remember that data scientists aren’t just ninja quantitative analysts, says Wayne Thompson, Chief Data Scientist at SAS. “You’re looking for more than technical skills. Logical reasoning agility, along with storyboarding skills are critical because these scientists must be able to solve problems iteratively in collabo
Tags : 
    
SAS
Published By: iCims     Published Date: Apr 03, 2014
Read iCIMS’ proprietary research on today’s job seeker behavior to understand where job seekers are looking for new opportunities and who is doing the looking. Learn how iCIMS’ applicant tracking system can help your company attract and hire the best talent.
Tags : 
applicant tracking systems (ats), candidate sourcing, employee engagement, external recruiting, hr strategy, job posting, online recruiting, recruitment technology
    
iCims
Published By: Online Tech     Published Date: Jan 18, 2011
Characteristics of Co-location for Small to Medium Sized Businesses ©
Tags : 
colocation, michigan colocation, small business colocation, michigan data centers
    
Online Tech
Published By: MySmartPlans     Published Date: May 04, 2011
How implementing online collaboration and project management technology can revolutionize the architecture, engineering and construction industry's communication, efficiency and overall project completion
Tags : 
construction, architect, engineer, aec, closeout
    
MySmartPlans
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Adobe     Published Date: Oct 30, 2014
The Best of the Best Benchmark report compares the overall average versus websites in the top 20% on 6 key performance indicators across six regions — United Kingdom, France, Germany, BeNeLux, Nordics and United States.
Tags : 
measuring your online presence, best of the best benchmark report, evaluating marketing techniques, increasing marketing trending
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee