aca

Results 1 - 25 of 288Sort Results By: Published Date | Title | Company Name
Published By: Crowdstrike     Published Date: Jul 01, 2020
The declaration of a global pandemic by the World Health Organization (WHO) underscores what we are all coming to realize: that the COVID-19 disease, caused by a new variation of the coronavirus, has caused a level of social and economic upheaval that is unprecedented in modern times. Organizations are facing sudden and profound challenges as they seek ways to quickly support corporate directives for employees to vacate offices and corporate campuses and start working from home. Maintaining security in the face of this global office exodus presents significant risks for most organizations.
Tags : 
    
Crowdstrike
Published By: Entrust Datacard     Published Date: Jun 23, 2020
Consumers love instant everything, especially when it comes to making purchases. And with instant issuance, there’s no reason for your customers to wait more than three minutes to get their debit or credit cards. Whether it’s for new accounts, replacement of lost or expired cards, or reissuance after a security incident or breach, issuing cards instantly creates a positive customer experience that ONLY 23 PERCENT of banks are providing. Instead of waiting for cards in the mail, consumers get the payment products they want on demand — and the issuer becomes the hero.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard APAC     Published Date: Mar 19, 2020
Customer-driven strategies based on Instant Issuance technologies are allowing financial institutes to provide a better customer experience, increase their brand loyalty and enjoy a greater market share. Their customers are enjoying instant gratification with Instant Issuance, regardless if it is for new accounts, replacement of lost or expired cards, or reissuance after a security incident or breach. Instant Issuance is not limited to branch locations – cards can be issued in retail stores, remote locations, airports, casinos, and even cruise ships. In fact, some forward-thinking financial institutions are using self-service kiosks, which allow consumers to assume even greater control over the process. For the past 25 years, Entrust Datacard has been working with financial institutions to produce high-quality cards that appeals to even the most demanding consumers. Access to the E-Book to understand how you can grow into a better, stronger, more sought-after brand.
Tags : 
    
Entrust Datacard APAC
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 17, 2016
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 17, 2016
Download your eBook today to learn more about optimizing your online presence, securing your website, and other unexpected ways to boost website engagement and increase sales opportunities.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality reshaping the enterprise. This white paper is the third in a three-part series on enabling the mobile enterprise while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 25, 2016
Download this infographic to discover how to build a successful launch plan for your digital business.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Mar 20, 2017
Microsoft® Office 365™ continues to lengthen its lead as the world’s top enterprise cloud service. Nearly one-in-four employees in Fortune 500 companies are active on Office 365 — and more than 90% of those large enterprises currently have more than 100 active users. Users are clearly becoming more reliant on Office 365, as usage grew at a rate of more than 300% in 2016.
Tags : 
    
Entrust Datacard
Published By: Workplace by Facebook     Published Date: Jun 20, 2019
Valet Living is an amenity services company that supports the multifamily housing industry in over 40 states across the US. From in-home services such as cleaning, package delivery, laundry and pet care, to maintenance and grounds keeping work around apartment communities. Valet Living wanted to address the difficulties that arise when working with a dispersed and unconnected workforce. Since the implementation of Workplace by Facebook, Valet Living have seen great internal results such as: • 20% increase in employee retention • 50% increase in filling vacancies with internal candidates • Thousands of dispersed workers connecting by sharing tips, goals and inspirations via team groups Download this case study to find out more about the amazing results.
Tags : 
    
Workplace by Facebook
Published By: AON     Published Date: Dec 07, 2017
While the Affordable Care Act (ACA) increased the number of Americans with access to health insurance, U.S. employers and employees continue to struggle with rising health care costs and changing workforce demands. Recent Aon research shows that 20% of health care consumers cite high health care costs as the major reason they have either declined health care coverage, stopped taking medications, or avoided care altogether. If the U.S. health care system is to succeed, stakeholders across the health ecosystem must influence change in each market—employer, individual, and government (Medicare, Medicaid, and Tricare). While each part of the three-legged stool is important, this paper focuses on five strategies Aon believes will strengthen the employer-based system—a system that provides health care coverage to well over half of Americans (61%, or 177 million).
Tags : 
health insurance, employer – provided health benefits, aon hewitt, health ecosystem, well – being initiatives
    
AON
Published By: Nextgen     Published Date: May 25, 2017
As the Northwest Ohio area’s only academic medical center, the University of Toledo Medical Center (UTMC) delivers high-level physician education, while managing a 233-bed hospital for patients as well as 34 specialty clinics. This broad, complex level of responsibility needs a comprehensive, robust interoperability system to connect its different EHR systems so residents, physicians, and technicians can access data whenever, wherever they are. With more than a half-dozen disparate systems, UTMC needs a reliable, robust system to tie everyone together so providers have critical access to patient data from the classroom to the operating theatre. Read this case study to learn how the Mirth® solution has delivered to all of these requirements and enabled University of Toledo.
Tags : 
    
Nextgen
Published By: Dell EMC Storage     Published Date: Aug 22, 2019
Hoy en día, las empresas necesitan una infraestructura de almacenamiento de archivos altamente escalable, segura e integrada a múltiples nubes. Dell EMC, un líder en este ámbito, acaba de presentar elsistemaoperativo Dell EMC Isilon OneFS 8.2 junto con Isilon H5600, un nuevo nodo de almacenamiento NAS deescalamientohorizontal híbrido más denso y más rápido. Con estas innovaciones recientes, Isilon permite quelasorganizacionesaceleren las nuevas cargas de trabajo, creen nuevas oportunidades y eficiencias, y avancen considerablemente en sus viajes hacia la modernización de la TI.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Feb 18, 2020
La administración de PC basada en la nube, la PC como servicio (PCaaS) y los espacios de trabajo digitales están ganando fuerza como enfoques modernos para la informática de usuario final. ¿Por qué? Estos enfoques permiten que las organizaciones admitan una excelente experiencia de los empleados (EX), alivien la presión de la administración de TI y mejoren la postura de seguridad de la empresa. Pero ante todo, la administración basada en la nube se destaca como el eje de todas estas innovaciones, ya que permite una actualización más rápida de los dispositivos, un mejor acceso a las aplicaciones y los datos, y un proceso más automatizado de incorporación de los empleados.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 18, 2020
Todos estamos familiarizados con el proceso de encendido de una computadora. Muchos de nosotros hacemos esto todos los días: presionamos el botón de encendido, escuchamos el sonido de inicio y vemos cómo aparece la pantalla de inicio. Sin embargo, es posible que algunos profesionales de tecnología no estén al tanto de lo que se sucede debajo de la superficie de sus computadoras. Cuando se inicia la CPU de cualquier computadora, se comunica con un chip de firmware interno denominado BIOS (sistema básico de entrada y salida). Este BIOS, que es un pequeño microchip de hardware oculto dentro de la placa base de la computadora, actúa como la puerta a todo el hardware de la computadora y brinda los comandos relativos a la forma en se supone que cada pieza de hardware debe comportarse e interactuar. El BIOS se considera una de las partes más valiosas de un sistema informático debido a su función fundamental para el sistema operativo en general. Sin el chip de firmware del BIOS, su computadora
Tags : 
    
Dell EMC EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.