information

Results 201 - 225 of 3505Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesnt impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Um mit der zunehmenden geschftlichen Mobilitt Schritt halten zu knnen, ohne ihren potenziellen Risiken zum Opfer zu fallen, muss die IT komplexe Angelegenheiten effizient bewltigen knnen. Dazu gehren beispielsweise Servicebereitstellung, Gertebeschaffung und Sicherheitsberwachung. Warum? Informationsorientierte Mitarbeiter mssen mit verschiedenen Gerten auf oftmals vertrauliche Informationen aus zahlreichen Anwendungen zugreifen und das unabhngig von ihrem Aufenthaltsort. Anders ausgedrckt: Sicherheits- und Datenschutz-Policies, die die Endnutzerproduktivitt nicht behindern, befhigen Mitarbeiter und steigern ihre Leistung. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lsungen mit Intel Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Pour suivre lessor de la mobilit professionnelle sans devenir victime des risques potentiels qui en dcoulent, le dpartement IT doit tre en mesure de rsoudre efficacement des problmes complexes, allant du provisionnement des services lachat des priphriques en passant par la supervision de la scurit. Pourquoi ? Les professionnels de linformation ont besoin dun accs aux informations sensibles sur un large ventail dapplications mtiers et dappareils, o quils soient. En dautres termes, des politiques de scurit et de confidentialit qui nentravent pas la productivit des utilisateurs leur permettront doptimiser leurs performances. Tlchargez ce livre blanc pour en savoir plus sur les solutions Dell optimises par Intel.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
ffentliche und private Organisationen sind sich der Tatsache bewusst, dass das Management des PC-Lebenszyklus komplizierter und teurer wird, wenn die PC-Gerte und Arbeitsweisen von Mitarbeitern vielfltiger werden. Verschiedene Mitarbeitergruppen haben unterschiedliche Anforderungen in den Bereichen Hardware, Software und Konfiguration von Endnutzergerten, um wirklich produktiv sein zu knnen. Whrend IT-Abteilungen versuchen, eine breitere Palette an Technologien fr eine zunehmend verteilte und mobile Belegschaft bereitzustellen und zu untersttzen und gleichzeitig die Unterbrechungen fr Endnutzer mglichst gering zu halten, stehen sie auch unter einem hohen Kostendruck. Die Konsolidierung von Prozessen und Hilfe vonseiten eines Anbieterpartners wie Dell kann jedoch zu Kostensenkungen fhren und dafr sorgen, dass Expertenwissen fr bessere Vorgnge im PC-Lebenszyklusmanagement zur Verfgung steht. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lsungen mi
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivittstool fr Mitarbeiter. IT-Fhrungskrfte mssen das PC-Management ber den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer mglichst effektiv arbeiten knnen. Heute gehen IT-Fhrungskrfte den PC-Lebenszyklus ber ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, whrend der Schwerpunkt der Transformation auf den geschftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lsungen mit Intel Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
Metal 3D printing is revolutionizing the manufacturing process. Complex shapes, enhanced functional properties and lightweighting are some of the unique benefits delivered by additive manufacturing (AM). While there is plenty of information about printing techniques, materials and hardware, a critical element is rarely mentioned: the need for an integrated software solution for metal additive manufacturing. It takes more than a 3D CAD model and a good printer to get a successful print. Metal AM software handles all preparation and optimization actions that are required for a printed part to meet the desired CAD model specifications. This ebook provides an overview of the preparation and optimization process for AM, explains the importance of software to the profitability of any additive manufacturing business and suggests what to look for when researching AM software solutions.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en mtal est en train de rvolutionner le processus de fabrication. Parmi les avantages uniques lis la fabrication additive (AM) figurent entre autres la ralisation de formes complexes, des proprits fonctionnelles amliores et un poids rduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matriaux et le matriel dimpression, un lment essentiel est rarement mentionn : la ncessit dune solution logicielle intgre pour la fabrication additive en mtal. Il ne suffit pas de disposer d'un modle CAO et d'une bonne imprimante pour russir une impression. Le logiciel de fabrication additive en mtal gre toutes les oprations de prparation et d'optimisation ncessaires pour qu'une pice imprime soit conforme aux spcifications du modle CAO. Cet ebook offre un aperu du processus de prparation et optimisation pour la fabrication additive, explique limportance du logiciel pour la rentabilit dune activit de fabrication additi
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck mit Metall revolutioniert den Fertigungsprozess. Komplexe Formen, verbesserte Funktionseigenschaften und Gewichtseinsparung sind einige der einzigartigen Vorteile der additiven Fertigung (Additive Manufacturing, AM). Es gibt eine Menge Informationen ber Drucktechniken, Materialien und Hardware. Ein wichtiges Element wird jedoch eher selten betrachtet: Die Notwendigkeit einer integrierten Softwarelsung fr die additive Metallfertigung. Es braucht mehr als ein 3D-CAD-Modell und einen guten Drucker, um erfolgreich zu drucken. Die Software fr die additive Metallfertigung bernimmt alle Vorbereitungs- und Optimierungsschritte, die zur Umsetzung der gewnschten CAD-Modellspezifikationen erforderlich sind. Dieses eBook gibt einen berblick ber den Vorbereitungs- und Optimierungsprozess fr die additive Fertigung. Es erklrt, wie wichtig die Software fr die Rentabilitt eines Unternehmens ist, das in der additiven Fertigung ttig ist. Es zeigt auerdem, worauf man bei der Aus
Tags : 
    
3D Systems
Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices youre working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they arent high on the priority list. Read our report to find out more about executives views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA
Published By: Box     Published Date: Jul 29, 2019
Aujourd'hui, la plupart des DSI comprennent que les initiatives de transformation numrique peuvent servir rationaliser les processus mtier, amliorer l'ef?cacit, accrotre la comptitivit et, globalement, permettre leur entreprise de devenir disruptive sur le long terme. Cependant, certaines initiatives de transformation en cours (et mme dans de nombreuses entreprises de premier plan) se confrontent des dif?cults lies la gestion de l'explosion exponentielle des donnes non structures, ainsi que les exigences de conformit et de scurit accrues qui en dcoulent. Fort heureusement, de nouvelles solutions bases sur l'intelligence arti?cielle (IA) extraient des informations dissimules l'intrieur de donnes non structures, telles que des documents, des images, des vidos et des ?chiers audio. L'IA permet galement d'automatiser de nombreux processus fastidieux utiliss pour classer, organiser et analyser les contenus non structurs.
Tags : 
    
Box
Published By: Box     Published Date: Jul 29, 2019
Den meisten CIOs ist heute bewusst, dass Initiativen zum digitalen Wandel dazu beitragen knnen, Geschftsprozesse zu optimieren, die Ef?zienz zu steigern und die Wettbewerbsfhigkeit zu erhhen. Auf lange Sicht initiieren sie dadurch die Modernisierung und Zukunftsorientierung des Unternehmens. Einige der laufenden Transformationsinitiativen auch in vielen wachstumsstarken Unternehmen haben mit der Problematik zu kmpfen, den explosionsartigen Anstieg von unstrukturierten Daten zu verwalten und den damit verbundenen hheren Compliance- und Sicherheitsanforderungen gerecht zu werden. Zum Glck knnen neue Lsungen, die knstliche Intelligenz (KI) einsetzen, nicht genutzte Informationen aus unstrukturierten Daten extrahieren, beispielsweise aus Dokumenten, Bildern, Videos und Audiodateien. KI trgt auch dazu bei, viele der zeitaufwendigen Prozesse zur Klassi?zierung, Organisation und Analyse unstrukturierter Daten zu automatisieren.
Tags : 
    
Box
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your companys website, it has not been easy going as these notable security incidents reveal: Sabre SystemsThe reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. CIAWikiLeaks obtained and published documents detailing the intelligence agencys hacking efforts1. Virgin AmericaThousands of employees and contractors had their login information compromised1. EquifaxThe credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. Universities and Federal AgenciesMore than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Siteimprove     Published Date: Sep 03, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewltigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Mglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darber hinaus einen kurzen Einblick in Ihren DCI Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt Sie werden ein paar mehr Informationen ber die Performance Ihrer Website erhalten. Fllen Sie einfach das Formular aus!
Tags : 
    
Siteimprove
Published By: Siteimprove     Published Date: Sep 04, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewltigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Muglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darber hinaus einen kurzen Einblick in Ihren DCI Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt Sie werden ein paar mehr Informationen Uber die Performance Ihrer Website erhalten. Fullen Sie einfach das Formular aus!
Tags : 
    
Siteimprove
Published By: The Economist Group     Published Date: Oct 10, 2019
With unprecedented choice and access to information, todays customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a good experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. Whats more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
    
The Economist Group
Published By: The Economist Group     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply dont win anymore. Say youve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, its never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
    
The Economist Group
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences theyve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. Youll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences theyve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. Youll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences theyve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. Youll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences theyve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. Youll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organizations spending patterns against those of their peers while keeping an eye on current trends affecting endpoint security in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations. Starting computer and programs is 33% faster Opening/using several applications at one time is 29% faster Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : 
windows, processors, laptop, system information, intel core, project management
    
Dell
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.