it best practices

Results 1 - 25 of 1137Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google
Published By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Jamf     Published Date: Nov 05, 2018
Let’s take a look at the “who needs access to what and when” scenario that often leaves schools wondering what to do with the apps once a student graduates or drops a class, or how to get new students the resources they need the minute they turn on their device. If you’ve ever wanted a tutorial on best practices for app management, download this e-book for guidance on quickly going from app purchase to deployment.
Tags : 
    
Jamf
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
By processing real-time data from machine sensors using artificial intelligence and machine learning, it’s possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield. Read about our top data science best practices for becoming a smart manufacturer.
Tags : 
inter-company connectivity, real-time tracking, automate analytic models, efficient analytics, collaboration
    
TIBCO Software EMEA
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system, storage management, sap
    
Bell Micro
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Great Bay Software     Published Date: Jul 16, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
123Together
Published By: Zynapse     Published Date: Sep 10, 2010
A 26-page information rich whitepaper on the business benefits, challenges and best practices of Material Master Data Management
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, mmdm, material, application integration, business intelligence, database development
    
Zynapse
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: SAP     Published Date: Mar 02, 2017
Deploying a performance management system is a powerful catalyst for increasing employee and organizational performance. If not handled properly, however, organizations risk creating unnecessary administrative work which can diminish some of the benefits. A key challenge is to balance the tension between creating a fair and consistent evaluation process across the organization and measuring employee performance based on individual needs. What best practices should you follow to help strike the right balance? How have other leading organizations designed effective review forms and processes?
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: HPE & Intel®     Published Date: Oct 10, 2016
Download this whitepaper now to find out more about the best practices for setting the right disaster recovery strategy for your organisation.
Tags : 
    
HPE & Intel®
Published By: HPE Intel     Published Date: Jan 11, 2016
The world of storage is being transformed by the maturing of flash arrays, an approach to storage that uses multiple, solid state flash memory drives instead of spinning hard disk drives. An all-flash array performs the same functions as traditional spinning disks but in a fraction of the time required and in more compact form factors. Given its superior performance in certain contexts, all-flash arrays are experiencing strong industry adoption. However, best practices and a true understanding of key success factors for all- flash storage are still emerging. This paper is intended to educate you on best practices based on real user experience drawn from ITCentralStation.com. We offer all-flash user advice in selecting and building the business case for a flash array storage solution.
Tags : 
    
HPE Intel
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
This document will explore the challenges SMB IT faces today, how industry peers are addressing these challenges, best practices for these issues, and how IT professionals may be able to leverage HPE to achieve their goals.
Tags : 
    
Hewlett Packard Enterprise
Published By: HPE     Published Date: Dec 23, 2015
This document will explore the challenges SMB IT faces today, how industry peers are addressing these challenges, best practices for these issues, and how IT professionals may be able to leverage HPE to achieve their goals
Tags : 
    
HPE
Published By: Broadsoft     Published Date: May 25, 2017
This eBook is for contact center management and business executives looking for ways to increase the efficiency and productivity of their contact center. • If yours is an existing contact center with infrastructure that has been built up over the years, this eBook provides best practice steps to break down the resulting application silos, unify them, and improve the operational efficiency of your contact center. • If yours is a new contact center and you have the opportunity to build your infrastructure from the ground up using modern technologies, this eBook will provide best practices to prevent building application silos.
Tags : 
    
Broadsoft
Published By: Broadsoft     Published Date: May 25, 2017
This whitepaper is for contact center management and business executives looking for ways to optimize the business performance of their contact center. • If yours is an existing contact center with infrastructure that has been built up over the years, this whitepaper provides bestpractice steps to break down the resulting data silos, unify them, and optimize your contact center for business performance. • If yours is a new contact center and you have the opportunity to build your infrastructure from the ground up using modern technologies, this whitepaper will provide best practices to prevent building data silos.
Tags : 
    
Broadsoft
Published By: Cisco     Published Date: Jul 30, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 03, 2015
Building mobile strategy.
Tags : 
    
Cisco
Published By: Avaya     Published Date: Jun 15, 2016
Engage everywhere to improve everywhere Two out of three executives under the age of 35 are frustrated by technology at work, but believe they can be more productive with information sharing, and that better communications will positively impact business growth. Find out how else the digital revolution is impacting midsize businesses.
Tags : 
technology, productivity, communications, best practices, digital, business intelligence
    
Avaya
Published By: Samsung     Published Date: Dec 18, 2015
This paper will outline the value of the Internet of Things, highlight several key use cases, address the issues of privacy and security, and offer best practices for achieving success.
Tags : 
    
Samsung
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.