dam

Results 1 - 25 of 880Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
     Dell APAC
By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Riskified     Published Date: Aug 06, 2019
The impact of chargeback rates is abundantly clear and easily measurable, but the financial impact of false declines - rejecting perfectly good customers over fear of fraud - is largely underestimated by eCommerce merchants. In reality, these mistakes, which are all too common but difficult to track, end up costing merchants significantly more than chargebacks, and are more damaging to the business’ bottom line. This guide is designed to help businesses approve more good eCommerce orders, and to put in place better tracking for ongoing improvement in order decision accuracy
Tags : 
     Riskified
By: IBC365     Published Date: Aug 08, 2019
FTP was developed in 1971, and a lot has changed in the decades since it was first created. Though the protocol has seen improvement over the years, there are some fundamental drawbacks to relying on this old technology for transferring today’s large media files.
Tags : 
     IBC365
By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : mapping, public saftey, location data
     HERE Technologies
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Die INFINIDAT® Enterprise-Storage-Lösungen basieren auf der einzigartigen und patentierten INFINIDAT Speicherarchitektur - Ein vollständig abstrahierter Satz von Software-De?ned Storage (SDS)-Funktionen wird mit der besten Standard-Hardware integriert. Mit dem Versand der Software liefert INFINIDAT eine ausgiebig getestete Hardware-Referenzplattform mit. Damit stellt INFINIDAT die ersten echten SDS-Lösungen der Enterprise-Klasse bereit.
Tags : 
     Infinidat EMEA
By: Dell EMC     Published Date: Aug 01, 2019
IT Transformation is a concept that is not synonymous with digital transformation, but the two concepts are fundamentally linked. A business that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed legacy technologies. Updating IT often yields a boost in IT operational speed, efficiency, scale, and cost effectiveness ? tasks become automated, processes streamlined, and resources freed up. These IT-level improvements fuel a larger-scale digital transformation enabling businesses to out-innovate, out-think, and out-pace its competitors in today’s digital economy. To learn more, download this report from Dell and Intel®.
Tags : 
     Dell EMC
By: Workday     Published Date: Jul 30, 2019
Aligning your workforce plan to greater business objectives doesn’t have to be a struggle—especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
     Workday
By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : health, global management service, cloud services, technology
     Virtela Communications, Inc.
By: Shell     Published Date: May 28, 2019
Contamination can have a dramatic effect on the life and effectiveness of equipment, resulting in increased wear rates and damage, loss of equipment reliability and reduced component efficiency. As equipment continues to become more complex, and manufactured with tighter clearances, system contamination is increasingly important to control maintenance costs and improve equipment reliability.
Tags : 
     Shell
By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
     SAS
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
     ASG Software Solutions
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : extensis, portfolio server, sql, asa, dam, digital asset management, business intelligence
     Extensis
By: Extensis     Published Date: May 04, 2008
With a library of thousands of on- and off-line slides growing by 1,200 new images monthly, chaos was spreading like a disease in The Pathology Department at Oregon Health & Science University. Until they found the perfect solution to help them organize, track and access their image library - Portfolio Server.
Tags : extensis, ohsu, library, dam, solutions, digital asset management', business intelligence
     Extensis
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : extensis, direct wine, portfolio server, images, dam, solutions, application integration
     Extensis
By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
     Cantaloupe
By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : napco, target marketing, customer segmentation
     TargetMarketing
By: Dell APAC     Published Date: May 30, 2019
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation
Tags : 
     Dell APAC
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : infrastructure, devops, agile, hpe, it transformation, enterprise
     HPE APAC
By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
     Cisco
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
     Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.