Skip to main content
 

infor

Results 301 - 325 of 4381Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Zowel publieke als particuliere organisaties erkennen dat het levenscyclusbeheer van de pc ingewikkelder en duurder wordt naarmate de verscheidenheid van pc-apparaten en werkstijlen van werknemers toeneemt. Om optimaal productief te zijn hebben verschillende groepen medewerkers verschillende behoeften op het gebied van hardware, software en configuratie voor eindgebruikers. Terwijl IT-afdelingen een breder scala aan technologie voor een steeds meer verspreid en mobieler personeel willen bieden en ondersteunen, met behoud van zo min mogelijk verstoring voor de eindgebruiker, moeten ze ook aan de kosten denken. Het consolideren van processen en het inroepen van de hulp van een leverancier, zoals Dell, kan de kosten verminderen en expertise bieden voor betere werking van pc-levenscyclusbeheer. Download deze whitepaper voor meer informatie over Dell oplossingen met Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivitätstool für Mitarbeiter. IT-Führungskräfte müssen das PC-Management über den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer möglichst effektiv arbeiten können. Heute gehen IT-Führungskräfte den PC-Lebenszyklus über ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, während der Schwerpunkt der Transformation auf den geschäftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In un contesto in cui diverse organizzazioni cercano di implementare strategie basate sui dati, il personal computer in tutte le sue varietà rimane lo strumento chiave per la produttività della forza lavoro. I leader IT devono guidare la gestione dei PC attraverso l'intero ciclo di vita dei PC per consentire agli utenti di lavorare nel modo più efficace. Oggi, i leader IT affrontano il ciclo di vita dei PC attraverso un continuum che va dal controllo alla trasformazione. Il controllo è orientato all'ottimizzazione, mentre la trasformazione si concentra sull'impatto aziendale della tecnologia. Scarica questo white paper per ulteriori informazioni sulle soluzioni Dell con tecnologia Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Mientras las diversas organizaciones buscan implementar estrategias impulsadas por los datos, el ordenador personal en todas sus variantes sigue siendo la herramienta de productividad clave para el personal. Los líderes de TI deben orientar la gestión de los PC durante todo su ciclo de vida para que los usuarios trabajen de la manera más eficaz. En la actualidad, los líderes de TI abordan el ciclo de vida de los PC en un ciclo continuo, desde el control hasta la transformación. El control está orientado hacia la optimización, mientras que la transformación se centra en el impacto de la tecnología en el negocio. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
Metal 3D printing is revolutionizing the manufacturing process. Complex shapes, enhanced functional properties and lightweighting are some of the unique benefits delivered by additive manufacturing (AM). While there is plenty of information about printing techniques, materials and hardware, a critical element is rarely mentioned: the need for an integrated software solution for metal additive manufacturing. It takes more than a 3D CAD model and a good printer to get a successful print. Metal AM software handles all preparation and optimization actions that are required for a printed part to meet the desired CAD model specifications. This ebook provides an overview of the preparation and optimization process for AM, explains the importance of software to the profitability of any additive manufacturing business and suggests what to look for when researching AM software solutions.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en métal est en train de révolutionner le processus de fabrication. Parmi les avantages uniques liés à la fabrication additive (AM) figurent entre autres la réalisation de formes complexes, des propriétés fonctionnelles améliorées et un poids réduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matériaux et le matériel d’impression, un élément essentiel est rarement mentionné : la nécessité d’une solution logicielle intégrée pour la fabrication additive en métal. Il ne suffit pas de disposer d'un modèle CAO et d'une bonne imprimante pour réussir une impression. Le logiciel de fabrication additive en métal gère toutes les opérations de préparation et d'optimisation nécessaires pour qu'une pièce imprimée soit conforme aux spécifications du modèle CAO. Cet ebook offre un aperçu du processus de préparation et optimisation pour la fabrication additive, explique l’importance du logiciel pour la rentabilité d’une activité de fabrication additi
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
La stampa 3D in metallo sta rivoluzionando il processo di produzione. Forme complesse, proprietà funzionali migliorate e leggerezza sono alcuni dei vantaggi unici offerti dalla produzione additiva (PA). Sebbene vi sia una grande ricchezza di informazioni sulle tecniche di stampa, sui materiali e sull'hardware, un elemento critico che viene raramente menzionato è l'esigenza di una soluzione di software integrata per la produzione additiva in metallo. Non bastano un modello CAD 3D e una valida stampante per ottenere stampe di alta qualità. Il software di PA in metallo gestisce tutte le azioni di preparazione e ottimizzazione richieste per ottenere una parte stampata in grado di soddisfare le specifiche relative al modello CAD. Questo eBook offre una panoramica del processo di preparazione e ottimizzazione per la Produzione Additiva, spiegando l'importanza del software per la redditività di qualunque attività di produzione additiva. Suggerisce inoltre gli aspetti fondamentali di una soluz
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck mit Metall revolutioniert den Fertigungsprozess. Komplexe Formen, verbesserte Funktionseigenschaften und Gewichtseinsparung sind einige der einzigartigen Vorteile der additiven Fertigung (Additive Manufacturing, AM). Es gibt eine Menge Informationen über Drucktechniken, Materialien und Hardware. Ein wichtiges Element wird jedoch eher selten betrachtet: Die Notwendigkeit einer integrierten Softwarelösung für die additive Metallfertigung. Es braucht mehr als ein 3D-CAD-Modell und einen guten Drucker, um erfolgreich zu drucken. Die Software für die additive Metallfertigung übernimmt alle Vorbereitungs- und Optimierungsschritte, die zur Umsetzung der gewünschten CAD-Modellspezifikationen erforderlich sind. Dieses eBook gibt einen Überblick über den Vorbereitungs- und Optimierungsprozess für die additive Fertigung. Es erklärt, wie wichtig die Software für die Rentabilität eines Unternehmens ist, das in der additiven Fertigung tätig ist. Es zeigt außerdem, worauf man bei der Aus
Tags : 
    
3D Systems
Published By: Oracle EMEA     Published Date: Jul 22, 2019
How confident are you and your peers about the data and security practices you’re working with? We asked 5,000 executives globally, across 24 markets and have some interesting results to share. For example, up to half of IT leaders consider their data is manageable but struggle to gain meaningful insights from it. Yet, while AI and autonomous technology could help relieve this situation, they aren’t high on the priority list. Read our report to find out more about executives’ views about data in connection with security, ethics, and visualisation. Read the report
Tags : 
    
Oracle EMEA
Published By: Lenovo UK     Published Date: May 15, 2019
L'augmentation de la mobilité provoque partout dans les équipes informatiques un mal de tête, avec un potentiel d'augmentation des coûts et des risques. Mais avec les ThinkPad équipés de processeurs Intel® Core™ i7 vPro™, vous bénéficiez d'une sécurité à 360 degrés, d'une durabilité fiable et d'une productivité sans compromis pour chaque périphérique. En savoir plus dans notre livre blanc. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
Since 2005, The Qatar Financial Centre (QFC) has helped over 500 companies from around the world to set up their business in one of the fastest-growing economies in the world, capitalising on all that the MENA region has to offer. As an onshore business and financial centre, our model is unique in the region. We promote Qatar’s openness to foreign investment, give bespoke advice to help companies make informed decisions and establish their operations in Qatar.
Tags : 
    
Qatar Financial Centre
Published By: Box     Published Date: Jul 29, 2019
Aujourd'hui, la plupart des DSI comprennent que les initiatives de transformation numérique peuvent servir à rationaliser les processus métier, à améliorer l'ef?cacité, à accroître la compétitivité et, globalement, à permettre à leur entreprise de devenir « disruptive » sur le long terme. Cependant, certaines initiatives de transformation en cours (et même dans de nombreuses entreprises de premier plan) se confrontent à des dif?cultés liées à la gestion de l'explosion exponentielle des données non structurées, ainsi que les exigences de conformité et de sécurité accrues qui en découlent. Fort heureusement, de nouvelles solutions basées sur l'intelligence arti?cielle (IA) extraient des informations dissimulées à l'intérieur de données non structurées, telles que des documents, des images, des vidéos et des ?chiers audio. L'IA permet également d'automatiser de nombreux processus fastidieux utilisés pour classer, organiser et analyser les contenus non structurés.
Tags : 
    
Box
Published By: Box     Published Date: Jul 29, 2019
Den meisten CIOs ist heute bewusst, dass Initiativen zum digitalen Wandel dazu beitragen können, Geschäftsprozesse zu optimieren, die Ef?zienz zu steigern und die Wettbewerbsfähigkeit zu erhöhen. Auf lange Sicht initiieren sie dadurch die Modernisierung und Zukunftsorientierung des Unternehmens. Einige der laufenden Transformationsinitiativen – auch in vielen wachstumsstarken Unternehmen – haben mit der Problematik zu kämpfen, den explosionsartigen Anstieg von unstrukturierten Daten zu verwalten und den damit verbundenen höheren Compliance- und Sicherheitsanforderungen gerecht zu werden. Zum Glück können neue Lösungen, die künstliche Intelligenz (KI) einsetzen, nicht genutzte Informationen aus unstrukturierten Daten extrahieren, beispielsweise aus Dokumenten, Bildern, Videos und Audiodateien. KI trägt auch dazu bei, viele der zeitaufwendigen Prozesse zur Klassi?zierung, Organisation und Analyse unstrukturierter Daten zu automatisieren.
Tags : 
    
Box
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Siteimprove     Published Date: Sep 03, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Möglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen über die Performance Ihrer Website erhalten. Füllen Sie einfach das Formular aus!
Tags : 
    
Siteimprove
Published By: Siteimprove     Published Date: Sep 04, 2019
Sind Sie bereit, zu erfahren, wie Siteimprove Ihnen helfen kann, Ihre grobten Website-Herausforderungen zu priorisieren und zu bewältigen? Bei einer kurzen kostenlosen Analyse wird Ihnen ein Mitglied des Siteimprove-Teams helfen, Probleme auf Ihrer Website zu identifizieren und Muglichkeiten zum Steigern des Traffics zu finden. Auch werden mit Ihnen die Preisoptionen durchgesprochen. Sie erhalten darüber hinaus einen kurzen Einblick in Ihren DCI™ Score, um zu sehen, wie Ihre Website im Vergleich zu anderen in Ihrer Branche abschneidet. Ganz gleich, was herauskommt – Sie werden ein paar mehr Informationen Uber die Performance Ihrer Website erhalten. Fullen Sie einfach das Formular aus!
Tags : 
    
Siteimprove
Published By: Citibank     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
    
Citibank
Published By: Citibank     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
    
Citibank
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.