860 Results for:PDF

  • Sort by: 

How can I become an AWS Authorized Instructor?

27 Oct 2020

To become an AWS Authorized Instructor, you need deep knowledge of Amazon products and services and must be able to communicate this wealth of technical information. Read More

How does Apple's Quick Look endanger user privacy?

By Michael Cobb 12 Oct 2018

Apple's Quick Look feature previews thumbnails that are not encrypted. Learn how this poses a security threat to enterprises from expert Michael Cobb. Read More

Collaboration key to Qlik's quest for active intelligence

By Eric Avidon 05 Aug 2021

Among the new capabilities Qlik recently unveiled is a tool that enables collaboration not only at the end of an analytics project, but also throughout the project lifecycle. Read More

Securing Active Directory also involves good backup practices

By Tom Walat, Packt Publishing 31 Aug 2020

The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack. Read More

6 cognitive automation use cases in the enterprise

By George Lawton 30 Jun 2020

Businesses are increasingly adopting cognitive automation as the next level in process automation. These six use cases show how the technology is making its mark in the enterprise. Read More

Dropbox Extensions gives users chance to try other vendors

By Jesse Scardina 07 Nov 2018

The new Dropbox integrations will bring APIs to other file editing and e-signature vendors, making it easier for users to update files without toggling through applications. Read More

Why isn't Adobe Reader working on Windows 10?

By Robert Sheldon 21 Apr 2020

When Adobe Reader isn't working with Windows 10, admins can take a few troubleshooting steps to rectify the issue. Begin with Adobe's AcroMonitor tool. Read More

Microsoft strengthens Power BI security with new capabilities

By Eric Avidon 17 Feb 2021

The latest Power BI update features a series of new capabilities aimed at enabling organizations to secure their data as they move to the cloud and embrace remote work. Read More

NIST offers mobility best practices guide based on COPE deployments

By Kyle Johnson 07 Oct 2019

Mobility isn’t a new concept, but it can sometimes be difficult to know where to start if you don’t have a framework in place, which is where NIST guidelines come in. Read More

Using content disarm and reconstruction for malware protection

By Michael Cobb 09 Feb 2021

Content disarm and reconstruction is a modern approach to removing malicious code from files, key to detecting and thwarting successful phishing and malware attacks. Read More