Search: practices

More Results

Sort by: Relevance | Date
  • Why customer service automation goes awry

    Customer service automation is increasingly becoming non-negotiable for companies today. Without it, contact centers would be overwhelmed with calls, emails and social media posts, with no way to filter and sort them so they get answered quickly....

  • Government of Maharashtra to clean up electoral data

    The government of Maharashtra is cleaning up voter lists using IT tools, to minimize duplications in voter ID cards and correct errors.

    Face-recognition algorithm and geographic information system (GIS) technology are examples of the...

  • Building a big data practice

    For IT solution providers, there's big money in big data. That's because data volumes are growing at staggering rates, and SMBs are discovering use cases for big data. Perhaps even better for the channel, many SMBs don't have the skills needed to...

  • Best practices for AWS disaster recovery

    Dan Sullivan reviews best practices for AWS disaster recovery to help users identify and plan for unexpected problems related to a disaster.

  • CISSP quiz: Cryptography CISSP certification practice test

    Test your knowledge of the CISSP exam's Cryptography Domain by taking this practice quiz, which covers topics including public and private keys, encryption algorithms, digital certificates and more.

  • Best practices for mobile healthcare security

    The flexibility in care workflows, improved productivity for practitioners, and timely access to data are encouraging many providers to continue to give patients mobile access to their health records. On the flipside, opening mobile access poses...

  • Practical Data Migration: PDMv2

    In this chapter from the second edition of his book, Morris outlines PDMv2 and show how it overcomes common data migration problems by using a set of integrated modules that cover the whole scope of a data migration from project start-up to legacy...

  • Best practices for authentication options on AWS

    This tip reviews authentication options on AWS and best practices for using them to ensure accounts and information are well protected.

  • GMP (good manufacturing practice)

    A good manufacturing practice (GMP) is one that conforms to the guidelines set by the regulatory agencies that control authorization and licensing for the production and sale of food, beverages and active pharmaceutical products.

  • Best practices for security data breach reporting

    I've seen two separate approaches taken to data breach remediation recently. On the one hand, Target's CEO at the time of the breach had been very forthright and the company has been actively communicating with affected customers since the...

Search Again: