Skip to main content
 

esc

Results 1 - 25 of 1450Sort Results By: Published Date | Title | Company Name
Published By: Boston Software Systems, Inc.     Published Date: May 25, 2016
If you are migrating to a new EHR or are considering a migration, there are five myths that will cause chaos throughout your organization. This white paper describes these myths, the chaos they cause and what can be done to eliminate it.
Tags : 
    
Boston Software Systems, Inc.
Published By: Red Hat     Published Date: Feb 22, 2019
Geschäftskritische Anwendungen erfordern eine nachweislich stabile Plattform. Mithilfe von Red Hat Enterprise Linux erzielen Sie deutliche Geschäftsergebnisse, und zwar dank einer außergewöhnlichen Zuverlässigkeit und Sicherheit nach Militärstandards. Mit einer Red Hat Enterprise Linux Server Subskription sind Sie mit dem branchenweit größten Ökosystem aus Partnern, Kunden und Experten vernetzt und haben dadurch beste Erfolgsaussichten. Weitere Informationen erhalten Sie in diesem Datenblatt.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
Dieser Analysten-Bericht von IDC befasst sich mit der Herausforderung, vor der Kunden heute stehen: Sie müssen ein Gleichgewicht zwischen ihren Investitionen in die bestehende Infrastruktur sowie dem Ziel der Effizienzsteigerung und Modernisierung ihres Rechenzentrums finden. Gleichzeitig müssen sie neue technologische Entwicklungen und Bereitstellungstechniken nutzen, die erhebliche Verbesserungen der Entwicklerproduktivität und der betrieblichen Agilität sowie ein kostengünstigeres Lebenszyklusmanagement versprechen. IDC beschreibt die Möglichkeiten, die Kunden im Hinblick auf beide Ziele offenstehen: die Nutzung einer Infrastruktur, die bestehende und zukünftige Workloads unterstützt, und die Rolle, die Standardisierung und Modernisierung bei der erfolgreichen Betriebsoptimierung spielen.
Tags : 
    
Red Hat
Published By: Schneider Electric     Published Date: Mar 28, 2019
Latest generation high density and variable density IT equipment create conditions that traditional data center cooling was never intended to address, resulting in cooling systems that are oversized, inefficient, and unpredictable. Room, row, and rack-based cooling methods have been developed to address these problems. This paper describes these improved cooling methods and provides guidance on when to use each type for most next generation data centers.
Tags : 
variable density, schneider electric, data center cooling
    
Schneider Electric
Published By: Intel     Published Date: Apr 11, 2019
To remain competitive, manufacturers must focus on achieving new growth while driving down costs. Key to achieving this is greater flexibility and a dramatic upturn in operational efficiency across the manufacturing process. One area ripe for improvement is intralogistics transportation. Many manufacturers still rely on autonomous guide vehicles (AGVs) to undertake repetitive transport tasks; but, rigid in nature, they do not support today’s demand-driven, dynamic manufacturing environments. Intelligent autonomous mobile robots (AMRs), like SEIT* from Milvus Robotics, offer a viable and cost-effective alternative. This solution brief describes how to solve business challenges through investment in innovative technologies.
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: SAS     Published Date: Apr 10, 2019
El cómputo en la nube es una tendencia importante que ofrece ventajas en flexibilidad, escalabilidad y agilidad. Aun así, ha habido un gran despliegue publicitario. La realidad es que, hasta hace poco, la nube ha tardado en despegar para desplegar soluciones de inteligencia empresarial y analítica. Las organizaciones están preocupadas por la seguridad, el rendimiento, la funcionalidad y otros problemas críticos. TDWI Research está experimentando un cambio significativo a medida que las organizaciones muestran voluntad de experimentar con la nube. Este informe expone las experiencias de las organizaciones con la inteligencia de negocios, la analítica y la nube, así como lo que debe tomarse en cuenta respecto a este tipo de plataformas.
Tags : 
    
SAS
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Anaplan     Published Date: Apr 02, 2019
What should the sales planning process look like? A poor sales planning process can severely reduce the effectiveness of your sales team and keep high-level business goals from being implemented in the field. In this paper, SiriusDecisions describes how to take a structured approach to the yearly sales planning process and ensure that your sales goals inform your territories, quotas, account segments, and other sales planning deliverables. In this SiriusDecisions paper, you’ll learn: • The three crucial stages of the annual sales planning process • How to ensure that all relevant stakeholders participate in the sales planning process • How sales ops can help sales leaders set realistic goals for the year
Tags : 
    
Anaplan
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : 
bell micro, sap application, best practices, ibm xiv, storage system
    
Bell Micro
Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Recorded Future     Published Date: Apr 18, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Underwriter's Laboratory     Published Date: Nov 14, 2011
As a result of ever-advancing technology and product obsolescence in this market, it is estimated that some 300,000 mobile phones are sent to the tras
Tags : 
    
Underwriter's Laboratory
Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce, e-commerce, order management, load time
    
Ability Commerce
Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research describing the role and importance of partnerships between business and IT in MDM strategy
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm
    
Zynapse
Published By: Dell EMC     Published Date: Aug 23, 2018
“Während 3D-Designtools schon lange verfügbar sind, eröffnet die Konsumerisierung der virtuellen Realität (VR) Visualisierungsoptionen in einem noch nie dagewesenen Umfang. Visualisierung hat sich dahingehend entwickelt, das Designer fotorealistische Bilder zu Produkten in natürlichen Umgebungen schneller und exakter erstellen können. So wird die Markteinführung beschleunigt, und Kunden können das Produkt selbst testen, und das alles ohne echte Kosten für Prototypenentwicklung und Modellierung. Dieser Leitfaden soll Ihnen einen Überblick über die neuesten Entwicklungen im Bereich Visualisierung verschaffen und die neuen VR Center of Excellence in Limerick, Santa Clara und Austin vorstellen, wo Sie die Vorteile selbst erleben können.” Rahul Tikoo Executive Director und General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 23, 2018
“3D-ontwerphulpmiddelen bestaan al een tijd, maar sinds VR steeds meer zijn weg vindt naar de consumentenmarkt, worden visualisatie-opties met ongekende snelheid beschikbaar. Visualisatie heeft zich ontwikkeld tot een niveau waarop ontwerpers sneller en nauwkeuriger fotorealistische afbeeldingen van producten kunnen maken in natuurlijke omgevingen waardoor producten sneller op de markt kunnen worden gebracht en klanten het product zelf kunnen uitproberen. Dit alles zonder de kosten van prototypes en vormgeving. In deze handleiding krijgt u een overzicht van de nieuwste ontwikkelingen in visualisatie en maakt u kennis met onze nieuwe VR Centres of Excellence in Limerick, Cork, Parijs, Frankfurt, Dubai, Santa Clara en Austin waar u de voordelen van VR zelf kunt ontdekken.” Rahul Tikoo Executive Director en General Manager Dell Precision
Tags : 
    
Dell EMC
Published By: Cisco     Published Date: Jan 04, 2016
Software-defined Networking (SDN) im WAN bietet die Möglichkeit, durch höhere Betriebseffizienz, schnellere Erstellung von Services sowie differenzierte und personalisierte Netzwerk-Services die Kosten zu senken
Tags : 
cisco, virtualization, sdn, wan, cloud
    
Cisco
Published By: Akamai Technologies     Published Date: May 24, 2017
Nutzer von Mobilgeräten sind heutzutage verwöhnt. Sie erwarten, dass ihnen ansprechende Inhalte blitzschnell und optimiert auf ihrem Mobilgerät bereitgestellt werden – und das noch in der gleichen Qualität wie auf dem Desktop-PC. Einerseits stellen diese permanent mit dem Internet verbundenen Nutzer eine hervorragende Geschäftschance dar. Andererseits müssen Unternehmen komplexe Herausforderungen meistern, um solch hohen Nutzererwartungen bei der mobilen Bereitstellung gerecht zu werden. In diesem E-Book werden wir drei dieser Herausforderungen näher beleuchten und Wege aufzeigen, wie Sie diese durch Optimierungen für schnelle APIs, Apps und mobile Websites meistern. So lassen sich Umsätze sowie die Kundeninteraktion und Kundenbindung steigern. Laden Sie das E-Book heute noch herunter, um zu erfahren, wie Ihr Unternehmen die heutigen Anforderungen im Mobilbereich erfüllen kann.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.