taxonomy

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Mar 13, 2009
Read this Whitepaper to learn about the practices and technology related to business process management (BPM). This Whitepaper includes explanation of basic concepts, examines the transformational effect on the enterprise, and analyzes the value that BPM can create.
Tags : 
sap, business transformation, enterprise applications, market leadership, business value, roi, roit, bpm, business process management
    
SAP
Published By: Arcserve     Published Date: May 29, 2015
The traditional taxonomy of data protection appliances – also known as Purpose Built Backup Appliances (PBBAs) – covers two primary categories: • Backup Appliances • Deduplication Appliances Let’s explore this taxonomy and market dynamics.
Tags : 
data protection appliances, purpose built backup appliances, deduplication, market dynamics, security, it management, knowledge management, data management
    
Arcserve
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.
Tags : 
distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks, business logic attacks, security, protections, data loss prevention, attack tools, network reconnaissance, low-bandwith asymmetric attacks, anti-attack technology
    
F5 Networks Inc
Published By: IBM Business Analytics     Published Date: Jun 23, 2011
Companies globally must determine the approach to compliance with mandated use of XBRL and significantly accelerating financial reporting. Here are 23 reasons to why an integrated approach towards external reporting is required by organizations today.
Tags : 
ibm business analytics, integrated xbrl tagging, extensible business reporting language, bolt-on, tag once, taxonomy collaboration, validation, xhtml, analytical applications
    
IBM Business Analytics
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept