dam

Results 1 - 25 of 729Sort Results By: Published Date | Title | Company Name
Published By: RJO Futures     Published Date: Mar 01, 2012
This complimentary guide from RJO Futures includes fundamental steps in the process to managing risk within your trading plan. Features information on understanding the market plus leverage, money management, strategies and more.
Tags : 
    
RJO Futures
Published By: Daniels Trading     Published Date: Mar 02, 2012
This comprehensive eBook is designed to help you understand and master the fundamentals of futures spread trading. The book covers the three basic strategies that all professional futures spread traders know and use.
Tags : 
    
Daniels Trading
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Continuous testing is the practice of testing across every activity in the SDLC to uncover and fix unexpected behaviors as soon as they are injected. Continuous testing is the embedding of testing as a fundamental and ongoing aspect of every activity through the application lifecycle, from requirements through production, to ensure the business value is being achieved as expected. As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a six- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Download this whitepaper to find out how CA Technologies can help with your Continuous Testing.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Die Anwendungscontainerisierung wird bei Unternehmen immer beliebter, da sie damit ihre Entwicklungsgeschwindigkeit und -effizienz steigern können. Entwickler können jede Anwendung leicht als schlanken, eigenständigen Container verpacken, ausliefern und ausführen, der so gut wie überall eingesetzt werden kann. Dies führt zu einer sofortigen Portierbarkeit der Anwendung. Um den aktuellen Stand des Container-Monitorings besser zu verstehen, haben wir 100 Führungskräfte befragt und die wichtigsten Trends für Container identifiziert. In diesem eBook beschreiben wir jeden einzelnen Trend und bieten handlungsrelevante Anleitungen und nächste Schritte, mit denen Sie das Monitoring Ihrer Container-Umgebung beherrschen können.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
DevOps ist nicht mehr topaktuell. Auch Continuous Delivery oder sogar das „Shift-Left“-Paradigma ist nicht mehr als innovativ zu bezeichnen. Dieses White Paper zeigt auf, wie Sie DevOps-Tools und -Verfahren kundenorientiert einsetzen können, um einen geschäftlichen Nutzen zu erzielen. Dabei wird auf die aktuellen Herausforderungen für Unternehmen eingegangen, wenn sie versuchen, durch DevOps-Innovationen mehr als nur technische Vorteile zu realisieren. Zudem werden die Lücken aufgezeigt, die die Unternehmen in den Continuous Delivery-Ketten schließen müssen, um erfolgreich zu sein. Schließlich befasst sich dieses White Paper auch damit, wie die Themen Anwendereinbindung und Customer Experience in allen Phasen der Bereitstellungspipeline als wichtige Überlegung einbezogen werden.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Qualsiasi elemento che entra in contatto con l'applicazione migliora o peggiora le performance. Stabilire se ciò sia attribuibile all'infrastruttura, a una variazione del codice, a un'API, alla rete, all'architettura applicativa o a un servizio connesso è estremamente complesso.In questo eBook, descriveremo i nuovi ambienti estremamente articolati e complessi necessari per supportare un business digitale moderno e analizzeremo come un modello inedito di APM (Application Performance Management) possa fornire informazioni fruibili fondamentali per massimizzare le prestazioni.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At the most fundamental level an organization only does two things: operations and changes to operations. Regardless of the industry an organization is part of, or whether it is private or public sector, large or small, there is a constant drive to protect and improve operational aspects. Whether it is launching a new product or service, decreasing costs, protecting infrastructure from failure or preventing regulatory noncompliance, there are numerous areas where an organization wants to change something about how it operates. That’s where projects come in. In this whitepaper we look at what causes projects to fail so regularly and offer a sustainable approach for improving performance consistently.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Reconstructing resource management tools to simplify tasks, drive collaboration and facilitate action. People who use technologies at home expect the same ease of use and intuitiveness for the tools they use in the workplace. But enterprise tools aren’t keeping up with the pace of change. Many product and portfolio management (PPM) solutions force resource managers to create entire workflows or navigate through multiple screens just to see the fundamental component of resource management—what their people are working on. Resource managers also cite shortcomings such as no simple way to perform everyday tasks, communicate in context with others, drill down into key information, narrow the field of resources and forecast financials and model outcomes.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
Plötzlich ist das Netzwerk wieder angesagt. Technische Trends wie das Internet of Things, softwaredefiniertes Networking und wachsende End User-Erwartungen führen zu einer Nachfrage nach ungestörter Performance und Zuverlässigkeit des Netzwerks. Die Datenmengen werden zunehmend größer, und Unternehmen können ihre geschäftlichen Ziele nur noch mit mehreren Clouds erreichen. Wie kann das Netzwerk in dieser Situation Schritt halten und auch noch die künftigen Anforderungen erfüllen? In diesem eBook werden die Trends analysiert, die das Unternehmensnetzwerk beeinflussen – das moderne Netzwerk. Zudem werden die damit für NetOps-Experten verbundenen Probleme und Maßnahmen von Unternehmen zur Vorbereitung auf die Zukunft behandelt.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Mehr als 400.000 Mitarbeiter in etwa 400 Unternehmen – darunter Polycom, Qantas und Toyota – verwenden bereits CA Project & Portfolio Management SaaS (CA PPM SaaS) und erreichen damit Kostensenkungen, eine bessere Akzeptanz und intelligentere Geschäftsentscheidungen.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mit dem neuen CA Project & Portfolio Management (CA PPM) 15.3 können Sie Projekte für beliebige Geschäftsbereiche ganz einfach per Drag-and-drop maßschneidern. Ob komplexe Workflows für die Personalabteilung oder einfaches Aufgabenmanagement für den Vertrieb – Projekte sind nun statt erst nach Tagen innerhalb weniger Minuten eingerichtet. Mit der In-App-Kooperation eliminieren Sie überflüssige Meetings, Budgets verwalten Sie mit einem vertrauten Raster ähnlich wie in Microsoft Excel®, und dank der neuen Verknüpfung mit Business Intelligence (BI) Tools von Drittanbietern lassen sich versteckte Antworten aufspüren. Sie verfügen damit über die modernste Projektportfoliomanagement-App, die derzeit am Markt verfügbar ist.
Tags : 
    
CA Technologies EMEA
Published By: Forcepoint     Published Date: Aug 31, 2018
Die Vernetzung und der Schutz von Unternehmen im Zuge einer immer weitergehenden dezentralen Streuung der Mitarbeiter, die Zugriff auf Ressourcen innerhalb und außerhalb des Unternehmensnetzwerks benötigten, führt zu einer neuen Schwerpunktsetzung auf betriebliche Effizienz und wirksamen Schutz. Während die fundamentalen Anliegen der Vertraulichkeit, Integrität und Verfügbarkeit von Daten unverändert bestehen bleiben, steigen die Kosten und potentiellen Schäden für Unternehmen immer weiter an, was die Rolle der Führungsebene und der Sicherheitsfachleute komplexer macht als je zuvor. Eine vor Kurzem von IDC durchgeführte Befragung von CISOs hat ergeben, dass die folgenden fünf Szenarien am meisten Besorgnis erregen: • Preisgabe vertraulicher Informationen auf der Titelseite bedeutender Veröffentlichungen (WSJ etc.) • Abfluss von 50 % der HR-Mitarbeiterdaten • IT-Systeme als Angriffsvektor gegen Partner • Gezielte Angriffe • Abfluss von 10 % der personen- und gesundheitsbezogenen Mitarbe
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Hybride Netzwerke können stabil, schnell und sicher sein - auch in großen, dezentralen Umgebungen. Nachdem Netzwerke zunehmend komplex werden, müssen IT-Sicherheitsteams die Mittel kennen, um das Netzwerk trotz Unternehmenswachstums sicher und verfügbar zu machen. Hybriden Netzwerken kommt eine zentrale Rolle zu beim Anpassen des Netzwerks an diese neuen Anforderungen und die damit einhergehende Komplexität. Wir erläutern Ihnen, wie Sie hybride Netzwerke mit Firewalls der nächsten Generation absichern können.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Indipendentemente dal settore industriale, , le imprese di oggi lottano costantemente per migliorare la propria produttività e per ridurre i costi. I software e le connessioni internet ora giocano un ruolo fondamentale nel raggiungere: SD-WAN (abbreviazione per rete ad ampio raggio definita da un software) rappresenta un’idea rivoluzionaria su come connettere diversi siti.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Sep 04, 2018
Connecting and protecting organizations as their people disperse to more locations and need access to resources inside and outside the enterprise are driving a renewed focus on operational efficiency and security efficacy. While the fundamental concerns of confidentiality, integrity, and accessibility are unchanged, the cost and potential losses to organizations continue to increase, making the role of C-level infrastructure and security executives more complex than ever before. A recent IDC survey of CISOs ranked the following as the top 5 scenarios keeping them up at night: • Breach disclosure on the front page of WSJ and so forth • Leak of 50% of employee HR records • IT systems to be a source of major attack against partner • Target-style breach • Leak of 10% of PHI/PII customer records
Tags : 
    
Forcepoint
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM
Published By: TIBCO Software APAC     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
    
TIBCO Software APAC
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la economía digital, las interfaces de programación de aplicaciones (API) son esenciales para ejecutar ideas con rapidez y aprovechar nuevas oportunidades de negocio. Constituyen los pilares fundamentales de la transformación digital, ya que permiten a las organizaciones ofrecer experiencias de cliente excepcionales, crear flujos de ingresos nuevos y conectar a los empleados, los partners, las aplicaciones y los dispositivos con los datos en cualquier momento y lugar.Las API no son necesariamente una tecnología nueva, pero en el mundo digital actual, han adquirido mayor relevancia y se han vuelto importantes para todas las facetas de la empresa. A su vez, esto ha aumentado la demanda de una gestión de API eficaz. Ahora bien, ¿cómo es una solución eficaz?
Tags : 
    
CA Technologies EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.