tec

Results 26 - 50 of 14809Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs.
Tags : 
    
Dell APAC
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand.
Tags : 
    
Cisco EMEA
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: 3D Systems     Published Date: May 15, 2019
La tecnologia di sinterizzazione laser selettiva (SLS) è al centro dell'attenzione e in forte crescita nella produzione di massa personalizzata e nella prototipazione funzionale. Le giuste tecnologie additive, i materiali e le finiture stanno trasformando il modo di produrre. La manifattura termoplastica diretta digitale offre una qualità eccezionale che apre la porta a nuovi parametri di design non attuabili con il tradizionale stampaggio a iniezione. La produzione additiva di termoplastici evita anche i lunghi tempi di consegna e gli investimenti iniziali negli stampi e nelle attrezzature per lo stampaggio a iniezione. Se si misurano i pezzi finiti sui tre parametri: qualità, "time to market" e costo per metro cubo, in molte situazioni l'SLS industriale porta a una soluzione globalmente migliore.
Tags : 
    
3D Systems
Published By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
    
CyberSource
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Intapp     Published Date: May 20, 2019
Pricing matters and engagements accurately and profitably poses a challenge to many firms. However, developing effective pricing strategies has become more important than ever, as clients demand more transparency and alternative fee arrangements become more popular. Technology can help law firms develop both tactical and strategic approaches to pricing. Download this ebook from Intapp, a leading provider of business applications for professional services firms, to learn how an AI-enabled approach to pricing can help your firm: • Price matters more accurately and profitably • Scope and resource matters to ensure better margins • Monitor engagements as they proceed and track budget to actuals • Improve client relationships with more transparency, accountability, and success
Tags : 
pricing, profitability, alternative fees, artificial intelligence, engagement monitoring, professional services, legal
    
Intapp
Published By: Dell EMC     Published Date: Jun 05, 2019
Keine Frage: Der deutsche Mittelstand ist Meister seines Fachs. Als Inno vations- und Technologiemotor erfreut er sich zu Recht internationaler Wertschätzung, und so wundert es nicht, dass die mittelständische Wirtschaft boomt. Das Potenzial der Digitalisierung schöpfen die Unter nehmen allerdings noch lange nicht aus. Ulrike Rüger, Chefin des PC-Geschäfts von Dell Deutschland, spricht im Interview über die Trans formation der IT und den Arbeitsplatz der Zukunft. Windows 10 Pro ist genau das Richtige für Unternehmen
Tags : 
    
Dell EMC
Published By: Schneider Electric     Published Date: Jun 07, 2019
Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
refrigeración, construcción de centro de datos, colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
El montaje del marco de pod proporciona ganancias más rápido. Acumule ahorros de CapEx. Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
colocación, de centro de datos
    
Schneider Electric
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE has made a significant investment into AI and ML techniques that are embedded into its core workforce management solution, NICE WFM. Recent advancements include learning models that find hidden patterns in the historical data used to generate forecasts for volume and work time. NICE WFM also has an AI tool that determines, from a series of more than 40 models, which single model will produce the best results for each work type being forecasted. NICE has also included machine learning in its scheduling processes which are discussed at length in the white paper.
Tags : 
    
Nice Systems
Published By: Sage EMEA     Published Date: May 13, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
Published By: Bluecore     Published Date: May 07, 2019
Personalization runs through every retail interaction, and it has the potential to make or break consumers’ relationship with your brand. But we don’t need to tell you about the importance of personalization. What we do need to talk about is how to get it right. And why email is the best place to start. Creating a personalized experience in the league of retail pacesetters like Stitch Fix and Sephora is all about bringing together an intimate knowledge of both your customers and your products. This eBook explores what it takes to make that happen, including how to parness product data for retail personalization, what truly relevant experiences look like and how to remove common technology roadblocks to achieving retail relevance.
Tags : 
    
Bluecore
Published By: Bluecore     Published Date: May 07, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most retail marketers use email technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your retail marketing program with the next generation of email marketing technology. This guide explores how to identify when it's time for a change, exactly what your team needs to know to prepare for a successful change and how to best evaluate modern email marketing technology for retail.
Tags : 
    
Bluecore
Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycles.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee