ids

Results 1 - 25 of 497Sort Results By: Published Date | Title | Company Name
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en métal est en train de révolutionner le processus de fabrication. Parmi les avantages uniques liés à la fabrication additive (AM) figurent entre autres la réalisation de formes complexes, des propriétés fonctionnelles améliorées et un poids réduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matériaux et le matériel d’impression, un élément essentiel est rarement mentionné : la nécessité d’une solution logicielle intégrée pour la fabrication additive en métal. Il ne suffit pas de disposer d'un modèle CAO et d'une bonne imprimante pour réussir une impression. Le logiciel de fabrication additive en métal gère toutes les opérations de préparation et d'optimisation nécessaires pour qu'une pièce imprimée soit conforme aux spécifications du modèle CAO. Cet ebook offre un aperçu du processus de préparation et optimisation pour la fabrication additive, explique l’importance du logiciel pour la rentabilité d’une activité de fabrication additi
Tags : 
    
3D Systems
Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud
    
Aditi
Published By: Adobe     Published Date: Dec 21, 2015
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand.
Tags : 
adobe, mobile, marketing, strategy
    
Adobe
Published By: Adobe     Published Date: Feb 08, 2016
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand. And the key for achieving this is mobile maturity.
Tags : 
adobe, mobile, marketing, mobile maturity, brand loyalty, customer experience
    
Adobe
Published By: Adobe     Published Date: Oct 24, 2018
Adobe Audience Manager uses identity management tools and device graphs to tie device IDs to individuals or groups. If a customer starts using a device you don’t recognize, you can use second-party data available through a network or co-op to supplement your own, building a complete view of your customer. This allows you to send consistent messaging across devices, whether your customers log in to your site or not.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 28, 2016
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand. And the key for achieving this is mobile maturity. Our report outlines survey results from marketing and IT decision makers who share how they’re using mobile today. Read the report ‘Mobile is the strategy’ to learn: • The four components of the mobile maturity lifecycle • Why mobile apps are crucial to a successful mobile strategy • The role analytics plays in reaching mobile maturity
Tags : 
adobe, mobile, mobile strategy, marketing, mobile maturity, mobile apps, analytics
    
Adobe
Published By: Adobe     Published Date: Mar 02, 2017
Customers crave great content like kids in a candy shop. So enterprises worldwide are embracing design to give them a sweet experience across every touchpoint. Discover how to mold your content strategy to adapt to design trends and customer tastes.
Tags : 
content, content strategy, design, customer experience
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
It’s iconic. Concrete sails riding gentle waves. A million subtly textured tiles reflecting “the mood of the harbor.”1 The Sydney Opera House is recognizable by nearly everyone, a structure so loved and venerated it stands “alongside the Taj Mahal, the Acropolis, and the Great Pyramids” as a World Heritage site, “a cultural site having outstanding universal value.
Tags : 
    
Adobe
Published By: ADP     Published Date: Oct 05, 2012
In this whitepaper, ADP provides valuable insight into the past, present and future status of the economic market with regard to the specific concerns of midsized business owners today versus four years ago.
Tags : 
economy, economics, smb, midsized business owners, business concerns, compliance, government regulations, human capital management, human resources, finance
    
ADP
Published By: ADP     Published Date: Oct 10, 2012
In this whitepaper, ADP provides valuable insight into the past, present and future status of the economic market with regard to the specific concerns of midsized business owners today versus four years ago.
Tags : 
economy, economics, smb, midsized business owners, business concerns, compliance, government regulations, human capital management, human resources, finance
    
ADP
Published By: ADP     Published Date: Oct 14, 2014
In July and August 2014, the ADP Research Institute®, a specialized group within ADP®, conducted an online survey of more than 750 owners and executives at companies with 50-999 employees. The Midsized Business Owners Study is now in its third year. Midsize businesses often struggle between operating like a smaller business but having to abide by the same regulations as larger corporations. Download this case study to learn how midsize business are dealing with their three greatest concerns right now: healthcare benefit costs, the Affordable Care Act, and the level of government regulations.
Tags : 
adp, midsize business, healthcare benefit costs, affordable care act, government regulations, adp research institute, midsized business owners study, human resources
    
ADP
Published By: ADP     Published Date: May 31, 2017
Employer Perception vs. Employee Reality in the U.S. Midsized Market
Tags : 
    
ADP
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi, scalability, legacy applications
    
AMD
Published By: Appcelerator     Published Date: Aug 12, 2012
A survey synopsis from Appcelerator and IDC
Tags : 
appcelerator, app, idc, cloud services, ios
    
Appcelerator
Published By: Applause Israel     Published Date: Sep 25, 2018
In the midst of an overwhelming amount of disruption taking place in the retail banking industry, a clear path to success has emerged. Banks that want to continue to gain and retain loyal customers must make it easier to bank with them. According to a survey that included 760 different banks and credit unions, the most important priority for 2017 and beyond is the removal of friction from the customer journey.1 To clarify, today’s customer journey includes both the customer experience at local branch locations as well as their experience while interacting with websites, mobile apps, smart watches, and anything else that is connected to the Internet. The battleground for customers has shifted to the digital world, and retail banks must adapt quickly as crafty Fintech startups and tech giants like Amazon, Apple, and Google continue to push the limits of what is possible with technology. If digital channels aren’t approached correctly, they can add complexity to the customer experience in
Tags : 
    
Applause Israel
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
Marketing operations is in the midst of a major revolution. While the tools of marketing have changed dramatically over the past 25 years, the operational systems and processes have remained relatively stagnant. Most organizations use desktop productivity tools and e-mail to plan, deliver and ultimately execute their marketing activities.
Tags : 
aprimo, marketing operations, marketing tools, marketing model
    
Aprimo, Inc.
Published By: Arcserve     Published Date: Jun 11, 2014
Many small and midsized businesses are at a crossroads when it comes to selecting the right backup solution to protect their environments. Many now have a mix of physical and virtual servers to protect and when they try to use their existing backup software to protect it or, alternatively, search for new backup software that better matches their new infrastructure demands they often encounter several issues. Download to learn more!
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics
    
Arcserve
Published By: Avaya     Published Date: Jan 20, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Avaya
Published By: Avaya     Published Date: Jan 23, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Avaya
Published By: Avaya     Published Date: Jan 28, 2015
This paper explores the comprehensive collaboration solution for midsize companies as provided by Avaya.
Tags : 
collaboration for midsize companies, collaboration solutions, remote working, avaya, enagaging your workforce, improving the customer experience, collaboration technology, virtual landscape
    
Avaya
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.