events

Results 51 - 75 of 243Sort Results By: Published Date | Title | Company Name
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper considers the use of email archives for compliance. It will also review how archives are trusted and look at what has to be done to ensure that integrity is maintained throughout the chain of events that take place within an email archive environment.
Tags : 
compliance, email archiving, data quality, records management, personal email, enterprise email, email security, c2c
    
C2C Systems, Inc.
Published By: FORA.tv     Published Date: Oct 09, 2012
The conference and event industry is booming. Audiences everywhere are rediscovering the value of face-to-face networking, the importance of professional education, and the plain thrill of hearing a dynamic speaker firsthand.
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos, pay-per-view videos, broadcast event, video services, non-profit, video marketing, not-for-profit, cmp, certified meeting planners, cmp's, cmps, association, associations
    
FORA.tv
Published By: FORA.tv     Published Date: Jun 11, 2012
The conference and event industry is booming. An online video strategy can help conference and event organizers benefit from various trends. Download your complimentary white paper now and find out more!
Tags : 
conferences, events, series, live events, video programs, online videos, on-demand videos, free videos, pay-per-view videos, broadcast event, video services, non-profit, video marketing, not-for-profit, cmp, certified meeting planners, cmp's, cmps, association, associations
    
FORA.tv
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking, security
    
Cisco
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: Zoom     Published Date: Mar 29, 2016
Web conferencing can be used in many meeting scenarios, from internal collaboration to presentations, training and large events. IT leaders must examine the use cases that will drive their requirements for a portfolio of online meeting technologies.
Tags : 
zoom, gartner report, web conferencing, office collaboration, video conferencing, learning management systems, collaboration tools, webinars, networking, it management, wireless, business technology
    
Zoom
Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats, real-time insights, critical infrastructure, ids, ips
    
Vectra Networks
Published By: Cylance     Published Date: Aug 22, 2018
According to Forrester, traditional approaches to endpoint security have become outdated and less effective as cyberthreats have increased in both number and complexity. To battle the ever-increasing threats, security professionals are now turning to new endpoint security technologies to either augment or replace their failing antimalware solutions. Below are the key trends in endpoint security, and the strategies that companies are using to address them.
Tags : 
cylance, proactively, security, threats, cyberthreats, cylance
    
Cylance
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: NAVEX Global     Published Date: Jul 31, 2018
Your code of conduct is the single most important and visible tool for creating an ethical culture. Creating your code of conduct is just the beginning – a truly exceptional code requires frequent revisiting and revising to ensure the expectations shared are the most up to date for your organisation. Download this guide to learn: How to plan and build your new code of conduct What should and shouldn’t be included in your code of conduct How to promote and train employees on your code of conduct Which events might necessitate a code of conduct update
Tags : 
    
NAVEX Global
Published By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
There are a number of factors contributing to the growing popularity of streaming live events or offering content on demand, from anywhere, any time, on any device. Live streaming major sporting events such as the Superbowl or the Olympics is now a viable alternative to broadcast TV. And as Limelight’s 2017 State of Online Video report reveals, the average number of online viewing hours is almost six per week. However, as viewer expectations continue to rise, keeping audiences happy and engaged isn’t easy. In this white paper we discuss current trends and what to expect in 2018. We examine the role Content Delivery Networks (CDN) can play in optimizing the delivery of online video content at global scale, and the technologies available to ensure the lowest latency delivery possible. You’ll learn: Why sports leagues are enthusiastic about live streaming their events How content distributers can differentiate their services The apparent challenges of delivering live and on demand v
Tags : 
cdn, live video streaming, ott, over the top (ott) content delivery, video on demand, global content delivery, streaming video, content delivery network, video delivery, content publishing, content publishing workflow
    
Limelight Networks
Published By: Demand Frontier     Published Date: Mar 03, 2016
A vigorous demand generation program and digital strategy can help a company identify new buyers, distinguish itself from competitors, drive efficiencies, and generate thousands of leads at a fraction of the cost of traditional marketing efforts like trade shows and events.
Tags : 
demand frontier, demand gen, marketing, digital strategy, digital, advantage
    
Demand Frontier
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : 
event manager, events manager, events management, log management, security event, event log, gfi
    
GFI
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: SpectorSoft     Published Date: Dec 12, 2013
Detect Critical Network Events with Proactive Server Monitoring
Tags : 
spectorsoft, free trial, event logs, critical network events
    
SpectorSoft
Published By: Dynatrace     Published Date: May 20, 2016
For all Development Managers, Operations Managers and DevOps Managers, this eBook by DevOps advocate and author Gene Kim will clearly outline: - How leaders are 2.5x more likely to exceed profitability, market share and productivity goals through DevOps - Why your IT delivery model needs to be continuous and collaborative to meet demands for more features faster - Which Milestones to have in mind when plugging performance into the four pillars - culture, automation, measurement and sharing - How identifying bad patterns earlier in development prevents them from making it into production Start accelerating your own results; read this eBook now.
Tags : 
dynatrace, software development, devops, results, productivity, development, it management, enterprise applications
    
Dynatrace
Published By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases, storage, data management, virtualization, cloud computing, infrastructure
    
VMware
Published By: Oracle Primavera     Published Date: Oct 09, 2015
This solution brief explores how companies can transform the efficiency of their STO and solve business challenges in six key areas with Oracle’s Primavera Shutdown, Turnaround and Outage Solution. Understanding STO events are a core part of business. Oracle’s Primavera Shutdown, Turnaround and Outage Solution has been developed to support the transformation of your customers/prospects STO business by providing a predictable solution that supports scope, cost, schedule, risk and change throughout the STO event lifecycle.
Tags : 
oracle, sto, sto business, sto event cycle, shutdown turnaround outage, sto solution, project management, portfolio management
    
Oracle Primavera
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
    
eDataSource
Published By: VMware     Published Date: Mar 08, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth, virtualization, infrastructure
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept