measure

Results 876 - 900 of 911Sort Results By: Published Date | Title | Company Name
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement
    
Shavlik Technologies
Published By: Schneider Electric     Published Date: Mar 03, 2015
This white paper helps explain the differences between watts and VA and explains how the terms are correctly and incorrectly used in specifying power protection equipment.
Tags : 
measures for ups load sizing, how to avoid sizing errors, specifying power protection equipment, business technology, research
    
Schneider Electric
Published By: TrendMicro     Published Date: May 09, 2011
The most effective approach for fighting Web threats will employ multiple layers of protection and incorporate a range of protective measures. Download this paper to learn more.
Tags : 
trendmicro, trend micro, web threat, protection
    
TrendMicro
Published By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media
    
Flimp Media
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Health O Meter     Published Date: Mar 08, 2016
When was the last time you really thought about your hospital’s scales? Most patients will step on a scale as part of their hospital visit. Caregivers record weight to track health, measure fluid retention, or calculate medication dosages. While many scales function well, overlooking your hospital’s scales can be costly.
Tags : 
asset management, hospital products, cost optimization, product management
    
Health O Meter
Published By: Syncapse Corp.     Published Date: Jul 15, 2011
Since the advent of Facebook Places, organizations have been unable to technically link local ('Child') Places to a corporate ('Parent') Page on Facebook's backend. It has also been a challenge to create different Check-in Deals across multiple physical locations (commonly referred to as Places). Facebook is now endeavoring to solve these pain points through this week's "Parent-Child" and "Check-in Deals API" feature releases.
Tags : 
facebook, facebook parent child, social media management, social media measurement, enterprise social media
    
Syncapse Corp.
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: CollabNet     Published Date: Jan 11, 2013
Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.
Tags : 
performance management, it operations, productivity, measurement
    
CollabNet
Published By: Return Path     Published Date: Jan 29, 2013
The need for marketers to improve their optimization practices has led Return Path and the Relevancy Group to explore the state of email marketing measurement and analysis, as well as its role and impact on marketing performance.
Tags : 
email marketing optimization practices, audience segmentation, inbox placement, email program results, email marketing performance, competitive benchmarking tools, competitor email programs
    
Return Path
Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech
    
CopiaTECH
Published By: BetterUp     Published Date: Aug 14, 2018
"As HR investments become more data-driven, coaching must deliver on its ROI evidence gap. At BetterUp, we’ve created a model that can effectively measure the impact of coaching on the bottom line. Download our paper to learn: - How coaching ROI has been measured in the past, and why these methods are flawed - Which inputs are factored into our ROI algorithm - How we map the ROI of coaching to tangible business results"
Tags : 
human resource technology
    
BetterUp
Published By: BetterUp     Published Date: Dec 05, 2018
"As HR investments become more data-driven, coaching must deliver on its ROI evidence gap. At BetterUp, we’ve created a model that can effectively measure the impact of coaching on the bottom line. Download our paper to learn: - How coaching ROI has been measured in the past, and why these methods are flawed - Which inputs are factored into our ROI algorithm - How we map the ROI of coaching to tangible business results"
Tags : 
    
BetterUp
Published By: 3D Systems     Published Date: Feb 28, 2019
Rewrite the rules of injection molding with 3D Systems thermoplastic additive manufacturing printers and materials. Selective Laser Sintering (SLS) technology is at the heart of a growing trend in mass custom manufacturing as well as functional prototyping. The right additive technologies, materials and finishes are transforming manufacturing. Digital-direct thermoplastic manufacturing offers exceptional quality while opening the door to novel design parameters not possible with injection molding. Thermoplastic additive manufacturing also bypasses the long lead time and up-front investment in injection molding tooling. If you measure your finished parts on the three dimensions: quality, time to market, and cost per cubic inch, in many situations industrial SLS offers a better total value proposition. 3D Systems offers a wide variety of 3D printable thermoplastics, engineered for a range of applications. Materials specialists, designers, and manufacturing engineers can collaborate on
Tags : 
    
3D Systems
Published By: TIBCO Software     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
    
Citrix Systems
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: IBM     Published Date: Jul 06, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, networking
    
IBM
Published By: MeQuilibrium     Published Date: Jul 25, 2018
In today’s competitive work environment, attracting and retaining top talent is paramount and expensive. Companies recruit high performing employees with deep experience, invest in training, and reward outcomes. Yet while talent and experience are critical, new evidence suggests those attributes may not be enough. It’s not simply how well a person can perform in a typical situation, but how quickly they can return to high performance after an inevitable setback. Resilience is the ability to become strong, healthy or successful again after something bad happens. It includes (learnable) cognitive and emotional skills that reduce the degree and duration of episodes of discouragement, reluctance or defeat that often follow negative events. A resilient worker will quickly put the event in perspective and search for alternative solutions while their less-resilient colleagues experience a letdown or assign blame. This paper describes how resilience, measured by the meQ Score, corresponds to w
Tags : 
    
MeQuilibrium
Published By: Senn Delaney     Published Date: Mar 10, 2009
Senn Delaney President and CEO Jim Hart shares surprising results of a Thriving Global Leadership Study of thousands of leaders across 60 industries and 50 countries. The survey discovered a dramatic difference between those who are facing these times of crisis with what is defined as a high-thriving state of mind and those with a lower-thriving state of mind.
Tags : 
senn delaney, state of mind, high thriving, measurement, customer focused, brand management, customer-centric, employee management
    
Senn Delaney
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
mcafee, intel, security, windows, server, support, networking, knowledge management
    
Intel Security
Published By: IBM     Published Date: Aug 28, 2014
The paybacks from paper-free processes can be dramatic: much improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office workflows. Yet the progress being made towards paper-free processes is very slow. In this report, AIIM looks at the reasons for this poor progress, measure the adoption of digital mailrooms, chart the progress of mobile capture, and show which paper-free processes are the most effective. It helps you build a business case for the battle against paper, and make recommendations on how to move the business forward on all fronts.
Tags : 
paper-free processes, digital mailrooms, mobile capture, business technology, research
    
IBM
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com