robust

Results 301 - 325 of 351Sort Results By: Published Date | Title | Company Name
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 allows any software developer to integrate automated update capabilities into their final product, providing a robust client/server framework for determining required updates, and then retrieving and applying the necessary patch or installation files using Internet or LAN protocols.
Tags : 
software development, updates, update installers, trueupdate, indigo rose
    
Indigo Rose Corporation
Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
    
Ultimus
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Network Automation     Published Date: Dec 10, 2008
The challenge of creating a robust errors database, the core of iCheck, is that information must be pulled from a multitude of disparate sources. Sometimes, the data source is a database with its unique schema and field names that must be mapped to the iCheck database. Other times, the data source is a text file which must be accessed via FTP, parsed, and loaded into iCheck. And other times, the data is in RETS (Real Estate Transaction Standard) format, a real estate data format similar to XML, which is accessed via HTTP.
Tags : 
network automation, data sources, data accuracy, database errors, networking, data management, network management, network performance management
    
Network Automation
Published By: GlobalSpec     Published Date: Nov 21, 2008
This white paper offers suppliers and manufacturers in the industrial sector the information needed to develop a robust and effective online marketing strategy – beyond the company Web site.
Tags : 
globalspec, business-to-business, online marketing, e-mail, search engine optimization, pay-per-click
    
GlobalSpec
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Software-as-a-Service (SaaS) continues to gain traction over traditional on-premise software licensing models as organizations aggressively seek more cost-effective, flexible and robust computing solutions. This paper will help you understand and calculate the true costs of SaaS to determine what benefits this important resource-maximizing approach can offer your company now and in the future.
Tags : 
symantec cloud, saas, tco, roi, software-as-a-service, enterprise application software, enterprise software, return on investment
    
Symantec.cloud
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems, business analytics, business intelligence, business management
    
SAS
Published By: Virgin Pulse     Published Date: Aug 20, 2012
Employee wellness efforts have historically been "one size fits all" -which is ineffective at improving employee health behavior. See how offering a personalized health experience for your employees based on robust data, reporting and segmentation can drive engagement and long-term healthy behavior change.
Tags : 
wellness, corporate wellness, incentives, rewards, activity, health, fitness, motivation
    
Virgin Pulse
Published By: Virgin Pulse     Published Date: Oct 03, 2013
This paper draws on a wealth of experience, external research, and Virgin Pulse's robust analysis of client data to outline the key factors within your organization that can drive your employees to enroll in, and stay engaged with, your workplace wellness programs.
Tags : 
employee wellness, sustained engagement, employee wellness initiatives, employee wellness programs, human resources
    
Virgin Pulse
Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity, disaster recovery, access control, anti spam
    
The Bunker
Published By: Red Hat     Published Date: Jan 21, 2011
Gordon Haff - Senior Cloud Product Manager, Red Hat You can build a private cloud today in an evolutionary way that makes use of and integrates with technologies that you already own. Proceed at your own pace and maintain strategic flexibility for the future using infrastructure products that provide a robust, enterprise-class environment that is consistent across bare metal, virtualized servers, private clouds, and public clouds. The steps are all thoroughly documented in a reference architecture, and can be augmented with additional Red Hat products and services as needed. In this session, Gordon Haff will take you through the steps.
Tags : 
red hat virtual tradeshow, live event, private cloud, virtualization, enterprise software, virtualized server, server virtualization, cloud computing
    
Red Hat
Published By: Adobe     Published Date: Mar 07, 2013
Download this best practice guide featuring Forrester VP and Research Director Stephen Powers to understand how to build a robust WCM strategy that improves your organisation's online customer experience, while avoiding the top seven WCM mistakes.
Tags : 
customer engagement, customer experience management, web content management, wcm, wcm strategy, online customer experience
    
Adobe
Published By: Adobe     Published Date: Aug 22, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
social marketing, social network ad, ad spending trends
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
With a staff of more than 60,000 people dispersed across the United States, U.S. Bank turned to BlackBerry® Alliance member Tenet for a robust and intuitive program that would allow it to send crucial information in the event of an emergency.
Tags : 
blackberry, communications, mobile communications, mobile computing, wireless communications, wireless messaging, wireless phones
    
BlackBerry
Published By: ServiceNow     Published Date: Apr 19, 2013
A robust configuration management database (CMDB) is the heart of a successful service knowledge management system. It is the faithful source of configuration details and relationships people rely on to manage services throughout their lifecycle. Like personal relationships, building and maintaining an effective CMDB is a commitment that requires care and attention to get the best value.
Tags : 
configuration management, database, database management, application integration, business intelligence, database security, productivity, software compliance
    
ServiceNow
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: Lenovo and Microsoft     Published Date: Oct 18, 2016
We’ve analyzed the new features in Windows 10 to provide you with this quick and easy look at how to get the most benefit from these innovations when coupled with a Lenovo ThinkPad®, ThinkCentre®, or ThinkStation® device. Key features you and your team will love include: • Seamless productivity across multiple tasks, locations, and devices • New features start tile and screen snap combined with classic Windows ease of use • Robust, integrated security that matches cutting edge bio-metrics with enterprise-grade basics Find out more now.
Tags : 
lenovo, innovation, microsoft, windows 10, thinkpad, thinkcentre, networking
    
Lenovo and Microsoft
Published By: NetApp     Published Date: Dec 08, 2014
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications.
Tags : 
netapp, flash, netapp ef550, raid levels, ssd, ef-series, it management
    
NetApp
Published By: IBM     Published Date: Feb 04, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
ibm, smarter commerce, b2b, cloud integration, optimizing chain value, cloud transformations, edi networks, increase efficiency
    
IBM
Published By: Cisco     Published Date: Aug 18, 2014
Are you looking to maximize the productivity of the workforce by shifting to the cloud? Do you have a robust Collaboration platform in place to enable the new world of work? See for yourself all the reasons companies are shifting to the cloud and lowering total cost of ownership. Gain an edge by upgrading to Cisco Unified CM Version 9.0 or higher.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Are you thinking of implementing collaboration features? 80% of businesses have deployed unified communications and collaboration from VoIP to collaboration platforms and even WebRTC clients. Download this commissioned study conducted by Forrester Consulting on behalf of Cisco. Discover how UC and Collaboration technologies have delivered real business benefits today.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Do communications really lead to a competitive advantage? Can a best-in-class unified communications platform lead to increased workforce and customer engagement? Get details in the “Unlocking the Full Potential of Collaboration with Cisco Unified Communications Manager Release 9” white paper.
Tags : 
research, customer engagement, communications, migrate, collaboration, new world, work, cloud
    
Cisco
Published By: NAVEX Global     Published Date: Mar 21, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
Tags : 
    
NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.