Skip to main content
 

infor

Results 226 - 250 of 4103Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Étant donné qu'il doit composer avec le coût et la complexité liés à la gestion des ordinateurs, le service IT n'a que peu de temps à consacrer à l'innovation. Ainsi, l'évolution rapide des technologies et des besoins professionnels signifie généralement moins d'occasions de tirer profit des nouvelles tendances qui modifient la manière de fournir et de consommer la technologie. De plus, les technologies matérielles ne durent pas éternellement. Elles ont un cycle de vie mesurable, un début et une fin à leur productivité, donc à leur valeur. Il incombe au département informatique d'optimiser le cycle de vie de l'ordinateur tout en gérant les avancées stratégiques pour leur entreprise. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
IDC, la agencia de inteligencia de mercados de TI, realizó un estudio global entre más de 3500 líderes de TI de todo el mundo y descubrió que empresas de todos los niveles están planteándose modelos de PC Lifecycle as a Service para reducir costes, acortar los ciclos de renovación y adquirir mejores equipos para sus empleados. Dell PC as a Service (PCaaS) combina hardware, software, servicios durante el ciclo de vida y financiación en una única solución todo en uno, a un único precio predecible por puesto al mes, proporcionada por Dell Financial Services. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Une enquête menée par le groupe mondial d'études sur les marchés des technologies de l'information IDC auprès de 3 500 grands noms de l'informatique à travers le monde montre l'unanimité des entreprises au sujet de PC Lifecycle as a Service qui s'avère économique, rapide et mieux adapté aux employés. Dell PC as a Service (PCaaS) intègre le matériel, les logiciels, les services pour le cycle de vie et le financement dans une solution globale qui propose un prix unique et prévisible par mois et par siège, fourni par le Service financier de Dell. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Los patrones de compra de ordenadores personales para empresas están cambiando, pues los compradores buscan mejorar la seguridad y la experiencia de los empleados al mismo tiempo. Con el aumento global en la movilidad de los empleados y la tendencia de las empresas a dirigir sus inversiones hacia las tabletas y los ordenadores portátiles, las organizaciones están evaluando su inversión constante en los ordenadores de sobremesa . Queda claro que los compradores de ordenadores personales para empresas siguen valorando la seguridad y el rendimiento que ofrecen los equipos de sobremesa. También dicen que los nuevos formatos de sobremesa, como el formato Micro , les permiten ofrecer una mejor experiencia para los empleados, lo que para ellos es casi tan importante como la seguridad. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
En décembre2017, Dell a demandé à ForresterConsulting de mener une étude pour déterminer comment les organisations d'entreprises sont structurées en termes de services informatiques. L'étude a exploré deux types de profils technologiques, les contrôleurs numériques et les transformateurs numériques, ainsi que les tendances et défis rencontrés dans l'approvisionnement en ordinateurs. Les contrôleurs numériques sont souvent associés à l'approche descendante, la structure linéaire, et mettent l'accent sur la sécurité et l'exactitude. En revanche, les transformateurs numériques mettent l'accent sur l'innovation, s'orientent vers l'employé et le client, et donnent la priorité à la rapidité et la souplesse. En comprenant les deux groupes, les entreprises peuvent surmonter les défis qui découlent de la gestion du cycle de vie des ordinateurs. En investissant dans les outils de gestion des ordinateurs existants et en s'associant avec une entreprise spécialisée dans le déploiement et la gestion
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Afin de tenir le rythme de la croissance de la mobilité des entreprises, en évitant ses risques potentiels, le service informatique doit être capable de traiter efficacement les problèmes complexes, allant de la prestation de services, à l'acquisition d'appareils, en passant par la surveillance de la sécurité. Pourquoi cela ? Les travailleurs de l'information ont besoin d'accéder à des informations souvent sensibles sur une grande diversité d'applications métier et d'appareils, où qu'ils soient. En d'autres termes, les politiques de sécurité et de confidentialité qui ne nuisent pas à la productivité des utilisateurs finaux permettront d'habiliter les employés, tout en optimisant leurs performances. En savoir plus sur les solutions Dell en collaboration avec Intel®
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Les organismes des secteurs public et privé reconnaissent que la gestiondu cycle de vie des PCdevient plus complexe et coûteuse à mesure queles gammes de PC et les modes de travail des collaborateurssediversifient. Pour optimiser leur productivité, chaque groupe decollaborateurs a des besoins spécifiques en termesde matériel, de logicielet de configuration. Tandis que les services informatiques s’efforcent defournir et de soutenir un plus large éventail de technologies à un personneltoujours plusdispersé et mobile, tout en veillant à limiter les risques deperturbation de l’utilisateur, ils sont également soumis à une intensepression en termes de coûts. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
Metal 3D printing is revolutionizing the manufacturing process. Complex shapes, enhanced functional properties and lightweighting are some of the unique benefits delivered by additive manufacturing (AM). While there is plenty of information about printing techniques, materials and hardware, a critical element is rarely mentioned: the need for an integrated software solution for metal additive manufacturing. It takes more than a 3D CAD model and a good printer to get a successful print. Metal AM software handles all preparation and optimization actions that are required for a printed part to meet the desired CAD model specifications. This ebook provides an overview of the preparation and optimization process for AM, explains the importance of software to the profitability of any additive manufacturing business and suggests what to look for when researching AM software solutions.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en métal est en train de révolutionner le processus de fabrication. Parmi les avantages uniques liés à la fabrication additive (AM) figurent entre autres la réalisation de formes complexes, des propriétés fonctionnelles améliorées et un poids réduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matériaux et le matériel d’impression, un élément essentiel est rarement mentionné : la nécessité d’une solution logicielle intégrée pour la fabrication additive en métal. Il ne suffit pas de disposer d'un modèle CAO et d'une bonne imprimante pour réussir une impression. Le logiciel de fabrication additive en métal gère toutes les opérations de préparation et d'optimisation nécessaires pour qu'une pièce imprimée soit conforme aux spécifications du modèle CAO. Cet ebook offre un aperçu du processus de préparation et optimisation pour la fabrication additive, explique l’importance du logiciel pour la rentabilité d’une activité de fabrication additi
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
La stampa 3D in metallo sta rivoluzionando il processo di produzione. Forme complesse, proprietà funzionali migliorate e leggerezza sono alcuni dei vantaggi unici offerti dalla produzione additiva (PA). Sebbene vi sia una grande ricchezza di informazioni sulle tecniche di stampa, sui materiali e sull'hardware, un elemento critico che viene raramente menzionato è l'esigenza di una soluzione di software integrata per la produzione additiva in metallo. Non bastano un modello CAD 3D e una valida stampante per ottenere stampe di alta qualità. Il software di PA in metallo gestisce tutte le azioni di preparazione e ottimizzazione richieste per ottenere una parte stampata in grado di soddisfare le specifiche relative al modello CAD. Questo eBook offre una panoramica del processo di preparazione e ottimizzazione per la Produzione Additiva, spiegando l'importanza del software per la redditività di qualunque attività di produzione additiva. Suggerisce inoltre gli aspetti fondamentali di una soluz
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck mit Metall revolutioniert den Fertigungsprozess. Komplexe Formen, verbesserte Funktionseigenschaften und Gewichtseinsparung sind einige der einzigartigen Vorteile der additiven Fertigung (Additive Manufacturing, AM). Es gibt eine Menge Informationen über Drucktechniken, Materialien und Hardware. Ein wichtiges Element wird jedoch eher selten betrachtet: Die Notwendigkeit einer integrierten Softwarelösung für die additive Metallfertigung. Es braucht mehr als ein 3D-CAD-Modell und einen guten Drucker, um erfolgreich zu drucken. Die Software für die additive Metallfertigung übernimmt alle Vorbereitungs- und Optimierungsschritte, die zur Umsetzung der gewünschten CAD-Modellspezifikationen erforderlich sind. Dieses eBook gibt einen Überblick über den Vorbereitungs- und Optimierungsprozess für die additive Fertigung. Es erklärt, wie wichtig die Software für die Rentabilität eines Unternehmens ist, das in der additiven Fertigung tätig ist. Es zeigt außerdem, worauf man bei der Aus
Tags : 
    
3D Systems
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel® Core™ i5-6300U processor performed compared to previous generations. • Starting computer and programs is 33% faster • Opening/using several applications at one time is 29% faster • Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : 
windows, processors, laptop, system information, intel core
    
Dell
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.