networks

Results 1751 - 1775 of 1881Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 24, 2012
This paper will outline why social recruiting is becoming an imperative for companies today and how you can get started in reaching highly qualified candidates and passive job seekers while building brand recognition and reducing sourcing costs.
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
Your company may see the potential for social recruiting or may be using tools today, but a social recruiting strategy needs to be part of overall company goals and objectives to deliver true return on investment (ROI).
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle
Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor Networks
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
This paper will introduce you to the necessary steps you should take to employ HootSuite social media best practices.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Nov 08, 2012
Social media has grown out of it's infancy and is no longer an optional task for brands. Emerging with audiences on established social networks is now a key part of business interaction. Learn to tap into social leads with hootsuite.
Tags : 
hootsuite, social media, interaction, social media leads, tips and tactics
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Donít look far. Your best potential social advocates are actually your own employees.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
Todayís B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: CDW     Published Date: Nov 12, 2012
When data center technology such as servers or storage area networks are aligned with specific applications or organizational departments, the result is often inefficiency. Through data center convergence, IT resources can be managed more easily.
Tags : 
data center convergence, it infrastructure, converged data center, server consolidation, virtualization
    
CDW
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: Juniper Networks     Published Date: Sep 10, 2014
To understand how to improve business agility with a virtualized data center, get our Infographic. Find out the top reasons for investing in data center virtualization, the challenges and the opportunities for success.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Understand the changing threat landscape and how to secure your business against Distributed Denial of Service attacks with our Whitepaper. Read about the latest detection and mitigation strategies to ensure always-on protection.
Tags : 
security, ddos attacks, detection, prevention, mitigation strategy, always on-protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : 
next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDCís Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Discover how a dynamic, intelligent firewall can improve your security with our Webinar. Learn about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall.
Tags : 
next generation firewall, intelligent firewall, security, intelligent protection, active defense, active management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Watch our Webinar to find out more about the capabilities offered by connecting networks to IT automation tools as well as capabilities offered by SDN solutions. Find out if you need to employ just one or both of these technologies.
Tags : 
sdn, network automation, it automation, network connection, sdn solutions, automation tools, it capabilities
    
Juniper Networks
Published By: SocialChorus     Published Date: Mar 28, 2014
Employee advocates are your brandís best resource to expand existing marketing programs. In fact, content shared by employees on social networks receives 8x the engagement of content on a brandís own channel. By powering employees to experience, create and share authentic content, brands can increase social engagement, reach new customers, and drive more web traffic. Hear DeShelia Spann, Digital Marketing Strategist at Eaton, share how Eaton is mobilizing their employees to promote marketing initiatives and share brand content.
Tags : 
socialchorus, employee advocate channel, marketing, branding, marketing strategy, marketing programs, social networking, social engagement
    
SocialChorus
Published By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
    
Oracle
Published By: Oracle     Published Date: Jul 05, 2017
Your companyís website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Todayís slightly sluggish network could become tomorrowís downtime disaster. No matter what challenge may arise, you donít get extra time, staff, or budget to deal with it. Plus, since the whole company relies on IT, everyone notices when youíre underwater.
Tags : 
revenue loss, tarnish brand, consumer confidence, dns services, high performing networks, workflow, dns
    
Oracle
Published By: IBM     Published Date: Feb 04, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
ibm, smarter commerce, b2b, cloud integration, optimizing chain value, cloud transformations, edi networks, increase efficiency
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
IBM Global Financing can help firms in the retail industry adopt the solutions, technology and consulting to deliver a smarter shopping experience, build smarter merchandising and supply networks solutions, and drive smarter operations solutions.
Tags : 
ibm, ibm global financing, retail technology, merchandising, supply networks, solution, operations solutions, retail industry solutions
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats todayís advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco vision for the internet is one that is entering into the next generation. Connecting enterprises through rapid adoption of digital infrastructure: 5X faster than electricity and telephony. The agenda includes: Understanding the Connected Factory and its benefits to the organization's overall profitability, case studies: reducing costs, increasing quality, and maximizing productivity, the building blocks of an IoT network: unique design considerations for environments with rigid requirements.
Tags : 
technology, digital infrastructure, productivity, networks
    
Cisco
Start   Previous    62 63 64 65 66 67 68 69 70 71 72 73 74 75 76    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.