techniques

Results 1 - 25 of 408Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
To become more effective, enterprises must fast-track projects to digitally connect their organizations. Building value and providing compelling customer experiences at lower cost requires more than a quick technology fix; it demands a business and technological commitment to a new target operating model (TOM). This operating model should offer a way of running the organization that combines digital technologies and operational capabilities to achieve improvements in revenue, customer experience and cost. Enabling digital capabilities via the TOM is an ongoing process that requires DevOps skills and agile development techniques. This is easier to achieve with partners that have the requisite capabilities to help with the creation of new digital assets
Tags : 
    
Group M_IBM Q3'19
Published By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and it’s deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, “The Triple A Threat,” we explore the Triple A Threat of anxiety, anger, and aggression. We’ll explain what impact these issues have on your workplace and your bottom line. You’ll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
    
MeQuilibrium
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: SAP Concur     Published Date: Aug 07, 2019
"Creating an expense policy can be a time-consuming process, but when you consider that almost 20% of T&E expenses fall outside of policy it makes sense to invest the time and effort. This template walks you through how to build a best-practice expense policy and also explains what each section should cover. In the template you will find: Explanations for each expense category in plain language Lists of common questions about expense policies, pitfalls 11 tips for creating a straight-forward policy that increases compliance Get started on your expense policy today."
Tags : 
    
SAP Concur
Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike
Published By: OneSource     Published Date: Dec 08, 2010
Have you received your quota for 2011 yet? Wondering how you are going to hit it?as
Tags : 
webinar, onesource, business intelligence, prospects, lead generation
    
OneSource
Published By: myStaffingPro     Published Date: Apr 19, 2012
Transform your career site into a user-friendly candidate experience with our complete Career Site Usability Guide.
Tags : 
    
myStaffingPro
Published By: Megaplan IT     Published Date: Jul 16, 2012
An in-depth overview of techniques your company can employ to reduce the scope of your cardholder environment and lower costs associated with PCI DSS Compliance.
Tags : 
    
Megaplan IT
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: SAP     Published Date: May 18, 2014
This TDWI Checklist Report presents requirements for analytic DBMSs with a focus on their use with big data. Along the way, the report also defines the many techniques and tool types involved. The requirements checklist and definitions can assist users who are currently evaluating analytic databases and/or developing strategies for big data analytics.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications, database development
    
SAP
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
A picture is worth a thousand words – especially when you are trying to find relationships and understand your data – which could include thousands or even millions of variables. To create meaningful visuals of your data, there are some basic tips and techniques you should consider. Data size and composition play an important role when selecting graphs to represent your data. This paper, filled with graphics and explanations, discusses some of the basic issues concerning data visualization and provides suggestions for addressing those issues. From there, it moves on to the topic of big data and discusses those challenges and potential solutions as well. It also includes a section on SAS® Visual Analytics, software that was created especially for quickly visualizing very large amounts of data. Autocharting and "what does it mean" balloons can help even novice users create and interact with graphics that can help them understand and derive the most value from their data.
Tags : 
    
SAS
Published By: InsideView     Published Date: Aug 17, 2015
Whether you’re a marketer, a salesperson, or otherwise contributing to revenue growth, learning a few social selling techniques will help you fill your deal funnel with more–and better–leads. But it’s not as simple as creating a few tweets and browsing through LinkedIn. Put social media at the core of your lead-to-revenue process and get real tips you can use to grow revenue in our webinar, “5 Steps to Using Social Selling to Fill Your Funnel.” This short 30 minute webinar will show you how social selling will help you: Find the best targets Recognize “I’m ready to buy” signals Uncover relevant, real-time insights
Tags : 
    
InsideView
Published By: Adobe     Published Date: Dec 07, 2017
Whether you’re a creative professional or an aspiring artist, everyone is influenced by trends. You can change them, challenge them, be inspired by them. But you can’t ignore them. Trends encourage artists to master age-old techniques and push new boundaries. As award-winning designer Paul Trani puts it, “A new design trend is no different than a new invention—inventions either make something better or reveal a need we didn’t know we had.” Download this whitepaper to take a look at current visual trends to see what’s making noise in the creative community.
Tags : 
    
Adobe
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
    
Preempt
Published By: 3D Systems     Published Date: Feb 28, 2019
Metal 3D printing is revolutionizing the manufacturing process. Complex shapes, enhanced functional properties and lightweighting are some of the unique benefits delivered by additive manufacturing (AM). While there is plenty of information about printing techniques, materials and hardware, a critical element is rarely mentioned: the need for an integrated software solution for metal additive manufacturing. It takes more than a 3D CAD model and a good printer to get a successful print. Metal AM software handles all preparation and optimization actions that are required for a printed part to meet the desired CAD model specifications. This ebook provides an overview of the preparation and optimization process for AM, explains the importance of software to the profitability of any additive manufacturing business and suggests what to look for when researching AM software solutions.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en métal est en train de révolutionner le processus de fabrication. Parmi les avantages uniques liés à la fabrication additive (AM) figurent entre autres la réalisation de formes complexes, des propriétés fonctionnelles améliorées et un poids réduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matériaux et le matériel d’impression, un élément essentiel est rarement mentionné : la nécessité d’une solution logicielle intégrée pour la fabrication additive en métal. Il ne suffit pas de disposer d'un modèle CAO et d'une bonne imprimante pour réussir une impression. Le logiciel de fabrication additive en métal gère toutes les opérations de préparation et d'optimisation nécessaires pour qu'une pièce imprimée soit conforme aux spécifications du modèle CAO. Cet ebook offre un aperçu du processus de préparation et optimisation pour la fabrication additive, explique l’importance du logiciel pour la rentabilité d’une activité de fabrication additi
Tags : 
    
3D Systems
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Dell EMC     Published Date: Oct 08, 2015
Big data can be observed, in a real sense, by computers processing it and often by humans reviewing visualizations created from it. In the past, humans had to reduce the data, often using techniques of statistical sampling, to be able to make sense of it. Now, new big data processing techniques will help us make sense of it without traditional reduction.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Aug 26, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Gradient Boosting Machine (GBM) modeling is a powerful machine learning technique for advanced root cause analysis in manufacturing. It will uncover problems that would be missed by regression-based statistical modelling techniques and single tree methods, but can easily be used by analysts with no expertise in statistics and modelling to solve complex problems. It is an excellent choice for advanced equipment commonality analysis and will detect interactions between process factors (for example, machines, recipes, process dates) that are responsible for bad product. It can also be used to identify complex nonlinear relationships and interactions between product quality measurements (for example, yield, defects, field returns) and upstream measurements from the product, process, equipment, component, material, or environment.
Tags : 
    
TIBCO Software GmbH
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.