860 Results for:PDF
- Sort by:
How can I become an AWS Authorized Instructor?
27 Oct 2020To become an AWS Authorized Instructor, you need deep knowledge of Amazon products and services and must be able to communicate this wealth of technical information. Read More
How does Apple's Quick Look endanger user privacy?
12 Oct 2018Apple's Quick Look feature previews thumbnails that are not encrypted. Learn how this poses a security threat to enterprises from expert Michael Cobb. Read More
Collaboration key to Qlik's quest for active intelligence
05 Aug 2021Among the new capabilities Qlik recently unveiled is a tool that enables collaboration not only at the end of an analytics project, but also throughout the project lifecycle. Read More
Securing Active Directory also involves good backup practices
31 Aug 2020The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack. Read More
6 cognitive automation use cases in the enterprise
30 Jun 2020Businesses are increasingly adopting cognitive automation as the next level in process automation. These six use cases show how the technology is making its mark in the enterprise. Read More
Dropbox Extensions gives users chance to try other vendors
07 Nov 2018The new Dropbox integrations will bring APIs to other file editing and e-signature vendors, making it easier for users to update files without toggling through applications. Read More
Why isn't Adobe Reader working on Windows 10?
21 Apr 2020When Adobe Reader isn't working with Windows 10, admins can take a few troubleshooting steps to rectify the issue. Begin with Adobe's AcroMonitor tool. Read More
Microsoft strengthens Power BI security with new capabilities
17 Feb 2021The latest Power BI update features a series of new capabilities aimed at enabling organizations to secure their data as they move to the cloud and embrace remote work. Read More
NIST offers mobility best practices guide based on COPE deployments
07 Oct 2019Mobility isn’t a new concept, but it can sometimes be difficult to know where to start if you don’t have a framework in place, which is where NIST guidelines come in. Read More
Using content disarm and reconstruction for malware protection
09 Feb 2021Content disarm and reconstruction is a modern approach to removing malicious code from files, key to detecting and thwarting successful phishing and malware attacks. Read More