block

Results 326 - 350 of 431Sort Results By: Published Date | Title | Company Name
Published By: Litmos     Published Date: Apr 23, 2015
This guide outlines the foundational building blocks of a Rockstar Customer Training Department. This guide applies to everyone tasked with customer training, regardless of company size.
Tags : 
customer training, scaling, litmos, curriculum design, content creation, digital media creation, learning management system, human resources
    
Litmos
Published By: Emarsys     Published Date: May 21, 2015
Die meisten Händler werden von unstrukturierten Daten blockiert und verlieren wertvolles Potential. Userfreundliche Technologien können Daten benutzerdefiniert strukturieren und somit einen Schwerpunkt setzen, der für wertvolle Einblicke in diese Daten notwendig ist. Aber dafür ist der richtige Mix an technologischen Ressourcen notwendig.
Tags : 
retention, automation, ecommerce, marketing, insight, customer interaction service, customer relationship management, ebusiness
    
Emarsys
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
    
Lenovo and Intel®
Published By: IBM     Published Date: Sep 08, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : 
ibm, commerce, b2c, b2c ecommerce, ecommerce, omnichannel, retail success, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 12, 2016
With the holiday season right around the corner, it's time for retailers to take a closer look at the strategies that can ensure success to uncover any potenital roadblocks on the horizon. Read the report to get the latest online shopping trends and best practices to maximize holiday returns.
Tags : 
mobile traffic, trends, best practices
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM     Published Date: Apr 09, 2015
Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.
Tags : 
ibm, nss labs, product testing, network security, computer security, application security, anti spyware, firewalls
    
IBM
Published By: IBM     Published Date: Jul 01, 2015
This webcast talks about decentralizing the IoT by leveraging the “block chain”-- the technology platform underlying Bitcoin.
Tags : 
internet of things, iot, cloud computing, data security, blockchain, big data, app infrastructure, data analytics
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection, intrusion prevention, enterprise applications
    
IBM
Published By: Group M_IBM Q3'19     Published Date: Jul 30, 2019
The world as we know it runs on and depends on EDI. But the world is changing, and with it the future of EDI.  IBM believes that while EDI will remain highly useful and widely used for years to come, emerging technologies like blockchain, IoT, and AI will drive those investments, with EDI working alongside. Read our point-of-view to discover how you can modernize your B2B network by complementing EDI with IoT, blockchain, and AI.
Tags : 
    
Group M_IBM Q3'19
Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: Unitrends     Published Date: May 12, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of each of these techniques and explain why incremental forever when combined with byte-level deduplication is the superior methodology for reducing redundant data in the most efficient manner possible.
Tags : 
unitrends, redundant data, backup solution, data deduplication, olsen twins, mark kate olsen, ashley olsen, content awareness
    
Unitrends
Published By: Unitrends     Published Date: Dec 16, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of various deduplication techniques.
Tags : 
deduplication, techniques, incremental, data, duplicate data, file-level, block-level, byte-level
    
Unitrends
Published By: IBM     Published Date: Apr 17, 2013
In June 2011, IBM commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) that enterprises may realize by deploying Storwize V7000. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Storwize V7000 on their organizations. Storwize V7000 is a virtualized storage system designed to consolidate block and file workloads into a single storage system for simplicity of management, reduced cost, highly scalable capacity, performance, and high availability.
Tags : 
forrester, economic, impact, v7000, impact, storwize, performance, management
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Your users are ready for multigigabit wireless. The real question is: Is your network? Don’t miss this opportunity to get a first-hand look at the solutions you’ll need to achieve data rates that make it easier for your people to share, stay informed, and make smart decisions. • Join hosts Robb, Jimmy Ray, and networking experts as they dive deep into the technical details of delivering exponentially faster 802.11ac Wave 2 access through the current Cat5 cable you already have. • Hear all about Cisco’s founding membership and participation in the NBASE-T Alliance, the team that’s driving the standardization of 2.5 Gb/s and 5 Gb/s Ethernet speeds in campus access. • Discover the access point and switch technology you’ll need to ensure that your wired access layer does not become a stumbling block for your continued mobile growth.
Tags : 
cisco, techwise, routers, wan, productivity, performance, 802.11ac, wireless
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
Today, many businesses fall short in realizing the full potential of their virtualization and private cloud strategies. Rigid infrastructure and architectural complexity are key blockers that must be overcome.
Tags : 
management, network, cloud, server, data center, infrastructure, application integration, analytical applications
    
Cisco
Published By: McAfee     Published Date: Jul 10, 2013
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
traditional security, detection, blocking, protection, security model, threat landscape, cybercrime, networking
    
Cisco
Published By: Internap     Published Date: Nov 11, 2015
This benchmark analysis examines the relative performance of major VM components including virtual cores, memory, block storage, and internal network for Internap AgileCLOUD and Amazon Web Services (AWS) ECS/EBS.
Tags : 
internap, virtual machine, public cloud, servers, server hardware, storage virtualization, sales automation, cloud computing
    
Internap
Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges
    
IBM
Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce
    
Act-On
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.