asic

Results 26 - 50 of 441Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: SAP     Published Date: Sep 19, 2017
In today’s digital economy, consumer products (CP) companies face pressures from all sides. Consumers wield great power based on easy access to information about products, pricing, and availability. The barriers of entry for new players with the “next big product idea” are lower than ever. At the same time, channel partners, from big retailers to Amazon, are expanding their own private-label businesses. Added to all that, tremendous volatility persists in the basic costs of doing business, from raw materials, to labor, to shipping, and beyond.
Tags : 
sap, 4hana, real time supply, digitized sales, software portfolio, value proposition, customer
    
SAP
Published By: SAP     Published Date: Sep 28, 2017
In today’s digital economy, consumer products (CP) companies face pressures from all sides. Consumers wield great power based on easy access to information about products, pricing, and availability. The barriers of entry for new players with the “next big product idea” are lower than ever. At the same time, channel partners, from big retailers to Amazon, are expanding their own private-label businesses. Added to all that, tremendous volatility persists in the basic costs of doing business, from raw materials, to labor, to shipping, and beyond.
Tags : 
sap, 4hana, real time supply, digitized sales, software portfolio, value proposition, customer
    
SAP
Published By: ServiceNow     Published Date: Nov 05, 2012
When IT organizations utilize social media, it can efficiently help more people inside and outside the data center quickly access more services and knowledge. Combined people's knowledge and good will and the essence of information technology service management (ITSM) can be more fully realized.
Tags : 
servicenow, social media, social it, it environment
    
ServiceNow
Published By: Dell     Published Date: Nov 12, 2018
Today, IT leaders address the PC lifecycle across a continuum from control to transformation. Control is geared to optimization, while transformation focuses on the business impact of technology. Though the two approaches differ, they are not in opposition. They strive for the same goals and face similar challenges. As IT leaders provide their workforce with the tools to carry out the corporate mission, they should develop a PC lifecycle strategy that encompasses the key organizational needs of systems management, end-user productivity, business innovation and data-centric security. Read this Dell whitepaper to learn more about the findings of a recent Forrester Consulting study, “Digital Transformers Innovate, Digital Controllers Optimize”. This paper will help clarify the PC lifecycle continuum, from the basics of control to the advanced levels of transformation, so you will be better equipped to determine the needs of your organization on that spectrum.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs
    
Box
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: RSM US     Published Date: Feb 08, 2019
The Center For Literacy (CFL) is a Philadelphia, Pennsylvania based nonprofit organization that disrupts cyde of poverty by providing basic math, reading and English language skills to nearly 1,5000 adults,so they can succeed in the workplace in post secondary education.
Tags : 
    
RSM US
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Allscripts     Published Date: Sep 16, 2014
Download this ebook to understand the basic foundation that every practice needs in an EHR moving in to 2015 and beyond. Use the easy to follow checklist of criteria to ensure the vendor meets your individual practice’s needs as well.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice, ehr strategy, ehr needs, ehr, practice management, practice management solution, icd-10, meaningful use, mu2, improved outcomes, measuring quality outcomes, population health, fqhc ehr
    
Allscripts
Published By: Workforce Software     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : 
time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping, human resources
    
Workforce Software
Published By: WFS Australia     Published Date: Dec 02, 2015
This paper provides a guide to large employers to help you identify and describe product capabilities—and corresponding process improvements—that separate a basic timekeeping system from an enterprise-grade time and attendance solution. In addition, the paper will equip you with questions to ask potential providers to uncover whether they have the resources, expertise, and products capable of optimising your time and attendance processes.
Tags : 
time and attendance system, automation, pay rate, absence, understaffing, worker performance, payroll, timekeeping, human resources
    
WFS Australia
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
Business models are less durable than they used to be… [they] are subject to rapid displacement, disruption, and, in extreme cases, outright destruction. The basic rules of creating and capturing economic value were once very rigid. Companies tried to execute the same business models better than their competitors did. That doesn’t have to be the case anymore. Unlike product and service innovations, business-model innovations travel well from industry to industry
Tags : 
    
Oracle Commerce Cloud
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: TigerConnect     Published Date: May 02, 2018
t’s stunning really, that something as basic as communication among your care team members is such a significant factor in your success as a health delivery organization. And yet, it’s proven every day in hospitals and other patient care settings throughout the nation. Every one of these either affects or reflects your ability to complete tasks effectively. At right is a list of metrics that are affected by communications among clinical staff.
Tags : 
    
TigerConnect
Published By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
This paper discusses the need to own and and use basic fiber test solutions in the datacenter.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.