"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

extend

Results 176 - 200 of 552Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
How can this growing acceptance of the mobile platform — across geographies, verticals, cultures and even age groups — be leveraged and extended to secure traditional digital identities in both the physical and online spaces?
Tags : 
mobile, digital identity, platform, geographies, verticals, cultures, secure, desktop pc
    
Entrust Datacard
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista includes deployment tools that help you manage your migration. Dell Services extends the reach of those tools with time-saving automated deployments based on best practices.
Tags : 
dell, automated deployment, deployment tools, dell deployment services, vista deployment enhancements, enterprise applications, platforms, windows
    
Dell
Published By: Aternity     Published Date: Jul 20, 2012
This essential resource highlights a groundbreaking end user experience (EUE) management platform that can help organizations enable unparalleled application performance and user experience across physical, virtual and mobile environments. Discover how the extensive monitoring, reporting and analysis tools included in this platform are helping organizations overcome common mobile computing challenges.
Tags : 
technology, user, experience, management, enterprise, experience management, mobile, mobile computing
    
Aternity
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation
Published By: Red Hat     Published Date: May 17, 2012
By working with users, IT can make an organization's use of public and hybrid clouds a useful complement to in-house IT rather than a renegade operation that increases an organization's risks and costs.
Tags : 
networking, virtualization, cloud computing, infrastructure
    
Red Hat
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 01, 2011
Aberdeen's research and analysis indicates that the strongest near-term growth for EV SSL Server Certificates will come from Small businesses (<$50M in annual revenue), particularly in the EMEA and Asia / Pacific geographies.
Tags : 
aberdeen, ssl server certificates, ev ssl server certificates, network security certification
    
Aberdeen Group
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition is the next generation of the Acronis True Image family of products, engineered specifically for virtualized environments. Acronis Backup & Recovery 10 Advanced Server Virtual Edition enables organizations of all sizes to extend the cost-saving benefits of virtualization by protecting virtual machines running on a single physical host for a low, fixed price.
Tags : 
acronis, backup and recovery, 10 advanced server virtual edition, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: YouSendIt     Published Date: Mar 07, 2012
This white paper examines the challenges inherent in business content collaboration and the criteria that IT professionals should consider in evaluating an effective business content collaboration solution to increase their productivity.
Tags : 
collaboration, enterprise, marketing, content, content collaboration, innovation, workflow, project
    
YouSendIt
Published By: IBM     Published Date: Apr 18, 2012
Join this webcast to learn how HealthCare specific Asset and Service Management functionality can improve uptime to support patient care and optimize procedure scheduling, control costs for procurement, maintenance, labor and materials, extend asset longevity, and Support regulatory compliance activities.
Tags : 
healthcare, cost, ibm, asset management, service management, technology
    
IBM
Published By: Intralinks     Published Date: Jan 24, 2013
In the form of a Q&A with expert IDC analysts, this white paper explores what tools and technologies are being adopted to facilitate Extended Enterprise Collaboration (such as cloud-based solutions).
Tags : 
secure, intralinks, compliant, cloud based, tools, technologies, security, compliance risks
    
Intralinks
Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases, virtualization, cloud computing
    
McAfee
Published By: Siemens     Published Date: Jun 06, 2014
Using MobileMD technology from Siemens and Intel® data center technologies, the Charlotte Hungerford Hospital (CHH) and its CHHconnect partners are demonstrating meaningful use, coordinating care, and improving efficiency across their extended community.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare, mobilemd
    
Siemens
Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices
    
Keynote
Published By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
VMware, Inc
Published By: Cisco     Published Date: May 15, 2015
Cisco has developed robust infrastructure management tools for your Cisco Unified Computing System™ (Cisco UCS™) data center that work with and extend tools you may already use to monitor, provision, configure, and orchestrate your Microsoft server and application software.
Tags : 
data center, software, networking, management, cisco, network management, network performance management, cloud computing
    
Cisco
Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services, it management, knowledge management, enterprise applications, data management
    
CenturyLink
Published By: Xangati     Published Date: Sep 01, 2015
If you are a healthcare professional, then you and your organization are caught between the horns of compliance and improving the patient experience. With the Health Information Technology for Economic and Clinical Health Act (HITECH) now in full effect, the days of lax enforcement are over. First-time penalties or violations can reach up to $250,000. The transition to EMR/EHR use, along with all of the systems and equipment upgrading that entails, will be done and done well – or else. Penalties can also extend to your organization’s business associates.
Tags : 
performance management, information technology, cloud and systems virtualization
    
Xangati
Published By: SAP     Published Date: Mar 08, 2016
The digital economy is upending all industries and processes, placing a premium on speed, customer satisfaction, personalized products, and collaboration. These dynamics require companies to adopt a digitized, extended supply chain model that can respond immediately to dynamic changes and satisfy increasingly demanding customers.
Tags : 
sap, supply chain, digital, it management, data management
    
SAP
Published By: SAP     Published Date: Mar 08, 2016
This white paper discusses the various challenges facing the manufacturing supply chain. It highlights the importance of networks, collaboration, and supply chain visibility as they pertain to the supply chain's role, relative to the external environment. The evolution must then occur within the internal supply chain environment to meet these external requirements, while meeting internal business objectives.
Tags : 
sap, idc, supply chain, manufacturing, knowledge management, data management
    
SAP
Published By: SAP     Published Date: Mar 08, 2016
An IDC Infographic sponsored by SAP on how digitizing extended supply chain benefits the business.
Tags : 
sap, supply chain, digital, idc, knowledge management, data management
    
SAP
Published By: SAP     Published Date: Mar 17, 2016
Transform your extended supply chain to place the customer at the center of value, deliver personalized demand for individual customers, collaborate with business partners for innovative products, and maximize scarce resources — so you can achieve increased responsiveness, efficiency, and competitive advantage.
Tags : 
sap, digital, supply chain, knowledge management, data management
    
SAP
Published By: SAP     Published Date: Mar 17, 2016
- Supply Chains are already complex as they are – why on earth would we want to extend them? Because it’s an end-consumer driven economy. We expect to purchase products and services through multiple channels and of course we want to have these products delivered the same day. Of course the product is individualized based on my specific requirements, and yes, it goes without saying, that the products need to be compliant to regulations and standards.
Tags : 
sap, ted talk, supply chain, digital, knowledge management, data management
    
SAP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory