practical

Results 301 - 325 of 498Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development, business technology
    
Webroot
Published By: IBM     Published Date: Jan 10, 2012
You will learn how to build a practical roadmap toward private Storage Cloud by starting with a virtualized, efficient storage environment and build a more flexible and responsive business.
Tags : 
    
IBM
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Managing people is really very simple: hire people who can do the job, and let them do it. If they do something good, tell them they did done good; if they mess up, sort it out pronto. This e-book covers off a bunch of that stuff. It shouldn't contain anything new or groundbreaking, but it does feature zombies, impractical footwear, terrible ideas for thank you cards and one really creepy monkey. And it's anice reminder that keeping things simple is usually the best way to start.
Tags : 
management fundamentals, hiring best practices
    
CSB by Cornerstone on Demand
Published By: Citrix     Published Date: Nov 20, 2012
"The best way to get better at online meetings is to participate in more of them." This brief by Gihan Perera, founder of First Step Communications, provides 10 practical tips for keeping control of your online meetings.
Tags : 
10 tips, online meeting, citrix, virtual meeting, collaboration, enterprise applications, business technology
    
Citrix
Published By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : 
database, security, mcafee, data breach
    
McAfee
Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia
Published By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : 
security, network security, cloud, mobile, nomadic users
    
OpenDNS
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails, man-in-the-middle attacks, spam, botnets, ransomware, scareware, mcafee email protection, security, it management
    
McAfee
Published By: Tripp Lite     Published Date: May 17, 2016
As wattages increase in high-density server applications, providing redundant power becomes more challenging and costly. Traditionally, the most practical solution for distributing redundant power to 208V server racks above 5 kW has been to connect dual 3-phase rack PDUs to dual power supplies in each server. Although this approach is reliable, there is a better way. Tripp Lite has developed a patent-pending high-capacity 3-phase rack ATS specifically designed to deliver efficient, reliable redundant power to high-density clustered server environments. This White Paper will: • Explain the redundancy challenges for high-density server racks • Compare traditional dual PDU and 3-phase rack ATS redundancy setups • Outline the benefits of using a Tripp Lite 3-phase rack ATS
Tags : 
server, applications, wattage, power, high density, ats, pdu, supplies, it management
    
Tripp Lite
Published By: GoodData     Published Date: Aug 02, 2013
Sales analytics is a hefty club you can wield to tighten pipeline forecasts and induce pipeline boosting behavior from your reps. This eBook presents 6 practical sales analysis strategies that can help you make it happen.
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, business technology
    
GoodData
Published By: LogMeIn     Published Date: Dec 03, 2012
This guide details the factors that impact the purchasing decision of a remote support tool and provides a checklist for use as you work through your remote support solution selection process.
Tags : 
logmein, support tool, remote support tool, help desk support, support, it help, it support
    
LogMeIn
Published By: Symantec     Published Date: Nov 12, 2015
By reading this whitepaper, you will gain insight into the following topics: The next steps in automated monitoring How automation can speed detection of attack attempts The role of automation as a key feature of the "20 security controls" or CSCs Practical guidelines for moving from manual to automated analysis
Tags : 
security automation, security breaches, automated monitoring, detect attack attempts, automated analysis, security
    
Symantec
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application
    
Lumension
Published By: Success Factors     Published Date: Jul 10, 2014
From data to intelligence in 5 simple steps. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, big data, intelligence, hr metrics, practical guidance
    
Success Factors
Published By: Success Factors     Published Date: Jul 10, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Success Factors     Published Date: Aug 19, 2014
Engaged employees perform better, stay longer, keep customers happier, and boost company revenue. That’s why it’s critical to embed employee engagement deeply into your culture. What practical steps can you take in this direction? Start with expert advice from leading, respected sources. Download these engagement resources for real-world guidance on: How to measure engagement in your organization—and use the results
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors
Published By: Jobvite     Published Date: Mar 31, 2015
Recruiting has traditionally been considered a function of Human Resources, but with new tools on the market and new strategies in the air, some are saying it belongs with the marketing team. Others are suggesting Talent Acquisition be pulled out into it’s own unique department in larger organizations. There are innovative strategies that address the changing landscape of digital relationships and networks, and powerful new tools that can seem magical when you’re trying to find the perfect candidate for the available position. Understanding these strategies and harnessing these tools will prepare you to source, screen, interview and hire the best talent for your growing organization. Read this ebook to learn more.
Tags : 
hiring, employment, jobseekers, talent acquisition, interview, sourcing, talent pools
    
Jobvite
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity
    
Lumension
Published By: IBM     Published Date: Aug 20, 2015
This report provides practical guidance on the critical 10 steps for the first 100 days of setting up an analytically enabled HR function.
Tags : 
workforce analytics, data analytics, hr function, talent management, recruitment, best practices, ibm smarter workforce, talent analytics
    
IBM
Published By: Redspire     Published Date: Sep 17, 2015
This Ultimate Guide will give you practical and concrete steps you can take right now to instil a data-driven culture in your organisation.
Tags : 
redspire, crm, sales, social driven marketing, crm system, crm data
    
Redspire
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks
Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business technology
    
Hewlett Packard Enterprise
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee