high

Results 1 - 25 of 3990Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
To compete in the digital era, organizations require a skilled and highly productive workforce, empowered by the right technology. Technology decision makers must match highly functional technology to the needs of every worker, enabling each person to have an experience that is productive and fulfilling, while taking organizational competitiveness to the next level. It’s a straightforward mandate, but is not always easy for technology decision makers to achieve.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell EMC     Published Date: May 08, 2019
ESG recently conducted a quantitative research study to assess companies’ IT Transformation maturity. ESG found that operating a modern server environment, defined as an environment in which operations tasks are more automated than manual, led to a perception of cost parity with the public cloud. Nearly half felt their cost of compute was highly competitive with CSPs and another 48% felt it was generally comparable. This compares favorably to the 19% and 47% respectively among organizations running a legacy server environment. Download this solution brief from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Like businesses of all sizes, midmarket firms are focused on reducing operational costs and improving profitability. Midmarket firms, though, have a set of unique challenges and opportunities that will shape their ability to manage expense and boost the bottom line. This Proaction Series report, commissioned by Dell, will highlight technologies to deliver the clearest cost and profitability benefits to midmarket businesses. Access this report for more information.
Tags : 
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in today’s data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Research’s “Data Security and Privacy Maturity Assessment” to gauge your brand’s competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Research’s recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
    
Akamai Technologies
Published By: Nozomi     Published Date: Jul 08, 2019
Read this document to learn: NN-OT-Risks-Costs-DOCUMENT How OT cyberattacks cause business disruption The costs of high profile industrial cyber security incidents How to reduce risk with OT visibility and cyber security technology Examples of OT cyber security incidents by industry Complete the form and download the Executive Brief. You'll be on your way to improving your knowledge of the industrial security challenge!
Tags : 
    
Nozomi
Published By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : 
water, plant, pump
    
Schneider Electric
Published By: NetApp APAC     Published Date: Jul 08, 2019
All-flash storage is on a strong growth trajectory, but the industry is not swooning naively over the blazing fast I/O speeds. Most IT managers are talking a mature, step-by-step approach to all-flash adoption. Falling per-gigabyte prices are making the technology more commonplace. Solid state drives are no longer just for specialized, high-performing tasks. Before they leap, however, storage professionals want to understand the full business picture as they formulate a winning strategy for putting all-flash storage to use for more workloads. This paper offers insights for business success with all-flash storage based on IT Central Station reviews. Real users weigh in on what it takes to get the most out of the technology. It covers such aspects of flash storage as the need for simplicity and the importance of flexibility. The paper also looks at how to build a business case for all-flash and think through the implications of issues such as integration with existing infrastructure.
Tags : 
    
NetApp APAC
Published By: HERE Technologies     Published Date: May 22, 2019
Operational readiness depends on rich location data. When managing logistics and tracking high-value assets, there is no room for error and our new data-driven world demands richer, smarter advanced mapping and navigation services. The 2018 Counterpoint Research Location Ecosystems Update compared 16 location platform vendors—including Google, TomTom and Mapbox—and it named HERE the “undisputed leader” in location based services. Counterpoint recognized HERE for its integrated analytical capability and commitment to open partnerships, allowing for custom operational requirements and a truly mobile location intelligence platform. See how HERE provides the industry leading tools and expertise to process that data—streamlining the logistics supply chain, boosting responsiveness, and guaranteeing mission success.
Tags : 
mapping, defence, location data.
    
HERE Technologies
Published By: Group M_IBM Q3'19     Published Date: Jul 15, 2019
Read why IBM was named a Leader in the Gartner Magic Quadrant for Enterprise Asset Management 2018, positioned highest for ‘Ability to execute and furthest for ‘Completeness of Vision
Tags : 
    
Group M_IBM Q3'19
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, database development, middleware, software testing, web development, linux, windows
    
Black Duck Software
Published By: Mimecast     Published Date: Jul 15, 2019
The Mimecast Supervision solution enables compliance personnel to systematically review and discover targeted data among the volume of communications organizations face today. Integrated with the industry leading Mimecast Cloud Archive, users can facilitate an auditable, managed supervision review process, flexible to meet the needs of the business while utilizing a scaleable, immutable SEC 17A-4 validated and tamper proof archive with guaranteed 7 second SLA search capabilities. To reduce the number of false positives in sampling data, targeted detection rules can focus on specific senders/recipients and to accelerate the process. In addition, queues can be configured with an upper limit upon which to be populated with email. This helps limit the amount of email a reviewer must go through while still identifying risk. Today’s supervision demands require reviewers to be highly productive.
Tags : 
    
Mimecast
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Organizations in the global industrial products industry face significant challenges: cost pressures, increased regulations, disruptive technologies and the increasingly costly delivery of raw resources. High volatility in commodity prices has put severe pressure on company margins and can quickly expose inefficient operations.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q3'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat provides the difference you seek in a data storage solution for media and entertainment organizations. New demands have everyone in the industry feeling the impact of high latency storage and its impact on efficiently delivering speed to market on new and dense workload management. The Infinidat unified storage architecture enables the scale, performance and best overall TCO required to deliver an extreme competitive advantage to media and entertainment companies.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Virtualization is the standard in enterprise IT environments for consolidating servers, enhancing businstrators that reduces their Total Cost of Ownership (TCO) and helps speed the application development process. However, as improvements have been made with server technology, storage technoless continuity, and improving business agility. VMware provides an architecture for server adminiogy has become the bottleneck. Legacy storage solutions can’t keep pace with thousands of virtual machines demanding maximum IOPS along with high bandwidth at the lowest latency. Infinidat’s InfiniBox removes the storage bottleneck for VMware environments. The InfiniBox enterprise storage array delivers faster-than-all-flash performance, high availability, and capacity density at petabyte scale. This Infinidat white paper is written for VMware and storage administrators to introduce them to the integration capabilities of the InfiniBox for VMware.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Data is the DNA of modern healthcare. As healthcare technology continues to evolve at a rapid pace, and patient data management and security evolve, emerging approaches for disease treatment and prevention—like precision medicine and healthcare content management—are becoming more necessary. Precision medicine is about moving from generic to more precise, population-focused diagnostics and treatment by factoring in data from patients’ genes, environment, lifestyle factors and family history, into clinical decision-making for earlier, more accurate diagnoses, and more effective treatment and prevention. Data is at the heart of enabling doctors and scientists to execute on this mission. Additionally, rapidly changing regulations throughout the world are affecting the management of all healthcare data. Infinidat removes data management barriers from this level of data interaction by removing isolated islands of storage and allowing much more data to reside on a single, high-performance, h
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.