Skip to main content
 

san

Results 176 - 200 of 921Sort Results By: Published Date | Title | Company Name
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
Le mode de gestion traditionnel du cycle de vie des PC est inefficace autant que coûteux et chronophage pour votre entreprise. L’offre PCaaS (PC-as-a-service) de Dell EMC vous permet de transformer l’approche de gestion de l’infrastructure IT de votre entreprise. La technologie PCaaS vous donne accès à un portefeuille de périphériques clients maintes fois récompensé pour leurs performances et leur qualité. Nous avons développé pour chacun des rôles définis des composants matériels conçus pour répondre à leurs besoins spécifiques. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
gagnez, temps, l'argent
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Situé à une centaine de kilomètres au nord de Toronto dans la province de l’Ontario au Canada, le centre médical Royal Victoria Regional Health Centre (RVH) délivre des soins de santé de très haute qualité à plus de 450 000 habitants d’une vaste zone géographique. L’équipe du RVH compte plus de 380 médecins, 2 500 employés et 850 bénévoles. Elle oeuvre pour offrir des services de soins exceptionnels et spécialisés : prise en charge du cancer, des accidents vasculaires cérébraux, des problèmes orthopédiques, des troubles mentaux, radiologie interventionnelle, etc. En plus de son établissement de soins de courte situé à Barrie, d’une capacité d’accueil de 319 lits, le centre médical RVH fournit la plate-forme MEDITECH de gestion des dossiers médicaux personnels pour plusieurs autres hôpitaux situés à Midland, Orangeville et Collingwood.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America est le premier fournisseur de soins de santé haut de gamme pour les personnes souffrant de maladies rénales et autres conditions chroniques. Aux États-Unis, 640 000 personnes vivent avec une maladie rénale en phase finale. Dans le monde entier, plus de trois millions de personnes souffrent d’insuffisance rénale chronique. Fresenius Medical Care North America fournit des soins coordonnés à plus de 180 000 patients aux États-Unis, grâce à son réseau leader sur le marché de 2 200 centres de dialyse aux États-Unis, de laboratoires cardio-vasculaires externes, de centres de service d’urgence ainsi qu’à ses hôpitaux prestataires de soins aigus, les plus grands d’Amérique du Nord.
Tags : 
    
Dell PC Lifecycle
Published By: DellEMC and Toshiba SSDs     Published Date: Jul 04, 2018
Dell EMC provides VMware vSAN Ready Nodes that combine a wide range of Dell hardware and VMware vSAN software into a ready-to-order package. These include the new single-socket Dell EMC PowerEdge R7415 servers powered by the AMD EPYC 7000-series processors. These Dell EMC vSAN Ready Nodes are validated and configured to meet hyper-converged workload needs while taking advantage of lower single-socket licensing costs from VMware. Dell commissioned Demartek to evaluate the performance of the new Dell EMC PowerEdge R7415 servers that use the AMD EPYC 7000-series of processors. Mixed enterprise workloads were run in this VMware vSAN cluster using one model of the AMD EPYC processor in each of three identical nodes. Then the tests were repeated using different models of AMD EPYC processors in the vSAN cluster nodes.
Tags : 
    
DellEMC and Toshiba SSDs
Published By: Senn Delaney     Published Date: Mar 10, 2009
Senn Delaney President and CEO Jim Hart shares surprising results of a Thriving Global Leadership Study of thousands of leaders across 60 industries and 50 countries. The survey discovered a dramatic difference between those who are facing these times of crisis with what is defined as a high-thriving state of mind and those with a lower-thriving state of mind.
Tags : 
senn delaney, state of mind, high thriving, measurement, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Okta     Published Date: Aug 21, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Dell Storage     Published Date: Apr 17, 2012
Discover the top five distinctions of this solution from other hardware, and learn how it can help you reduce costs.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: Dell Storage     Published Date: Apr 23, 2012
This white paper reveals the five storage imperatives or virtualizing mission critical applications and explains how to improve performance and responsiveness, achieve reliability and availability, reduce costs and implement powerful data protection.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: Dell Storage     Published Date: May 07, 2012
Check out this brief white paper to make sure your VDI deployment isn't derailed by inadequate storage.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: Dell Storage     Published Date: May 07, 2012
Dell and VMware have teamed up to integrate the infrastructure needed to implement private cloud computing. Check out this brief white paper to learn more.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: Fortinet     Published Date: Feb 04, 2014
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions.
Tags : 
ngfw, next generation firewall, fortinet
    
Fortinet
Published By: Datto Inc.     Published Date: Jan 31, 2013
Don’t Miss the Business Continuity Sales Window. Read how one IT solutions provider is projecting to double its sales revenue growth by acting quickly after Hurricane Sandy.
Tags : 
    
Datto Inc.
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection, encryption keys, vulnerability management
    
Venafi
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: PernixData     Published Date: Jun 01, 2015
In this webinar, PernixData Product Manager, Todd Mace, is joined by Anthony Spiteri, the lead architect at Cloud provider Zettagrid, to discuss how PernixData FVP software became an integral part of Zettagrid’s infrastructure and offloaded millions of IOs from the SAN to improve application performance and user satisfaction.
Tags : 
pernixdata, storage, software
    
PernixData
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: JBoss Developer     Published Date: Feb 05, 2016
IDC analyzed the business value that six surveyed organizations are realizing through their use of Red Hat integration products based on interviews conducted from April to June 2014. Interviewees were from companies ranging in size from just hundreds of employees to several hundred thousand employees, with a mean employee base of just under 92,000. Companies interviewed included representatives from the telecommunications, IT, shipment and logistics, and document management industries. These organizations are headquartered in the United States, the United Kingdom, and Norway and several of them operate on a global scale. These organizations use JBoss Fuse for integration and development of business-critical internal and customer-facing applications
Tags : 
jboss, red hat, idc, integration, jboss fuse
    
JBoss Developer
Published By: CA Technologies     Published Date: Nov 02, 2016
Agile and Lean are built on a foundation of continuous improvement: You need to inspect, learn from and adapt your performance to keep improving. Enhancing performance begins with having accurate, comprehensive data. The multitenant architecture of CA Agile Central is uniquely positioned to provide access to anonymized industry benchmarking data from tens of thousands of agile teams. CA Agile Central Insights capabilities, part of a CA Agile Central Unlimited Edition subscription, provide performance metrics and benchmarking data for individual teams, teams of teams and even whole business units, departments and organizations.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
• Verwenden Sie CA Live API Creator, um funktionierende Prototypen in Stunden zu liefern. Konvertieren Sie Unternehmensanforderungen in eine funktionsfähige Software. • Nicht nur für Wireframes, sondern auch für funktionierende Systeme, Datenbanken, Logik und Benutzeroberflächen. Es ist so einfach wie eine Kalkulationstabelle und geht auch so schnell. • Beeindrucken Sie die Anwender im Unternehmen, indem Sie innerhalb von Stunden Ergebnisse liefern und Feedback zum Datenmodell und zur Logik einholen. Iterationen sind unmittelbar möglich. • Alles, was Sie benötigen, ist enthalten. Es muss keine IDE installiert oder konfiguriert werden. Verwenden Sie einfach Ihren Browser.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Le vol et l’exploitation des identifiants administratifs sensibles entraînent des infractions et la perturbation des opérations. CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.