Skip to main content
 

tag

Results 201 - 225 of 2769Sort Results By: Published Date | Title | Company Name
Published By: Lenovo UK     Published Date: May 15, 2019
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core™ i7 vPro™ Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
Published By: HP Inc.     Published Date: May 20, 2019
With a couple of swipes, a like and a share, what’s in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fastspreading global pop culture that determines what’s hot, and what’s not, almost instantly. By creating unique printed and digital assets that engage consumers and drive social media posts (and a whole lot of likes and shares), brands can leverage the “Instagram effect” to attract customers. Start with these trends, and keep reinventing!
Tags : 
    
HP Inc.
Published By: Dell EMEA     Published Date: Jun 14, 2019
The manufacturing industry has always been at the forefront of embracing new ways of doing things faster, smarter and better. Today, we’re at a fascinating inflection point. Industry 4.0 — a long-used term in manufacturing — has become increasingly mainstream, due to the availability of affordable IoT infrastructure, the desire to gain new business insights from data plus the arrival of advanced connectivity technologies, such as 5G. As a solution builder, you can help your manufacturing customers realize benefits in the era of new industrial revolution. We can help you manage data across the entire manufacturing process and supply chain, from the edge to the core to the cloud, speeding up you application development and compressing time to market. Our team of engineers and project managers are ready to help you design and build solutions on Tier 1 infrastructure to meet your unique requirements. Download this eBook to learn how to take advantage of Industry 4.0 and deliver Next Gen
Tags : 
    
Dell EMEA
Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
In terms of growth and profitability, Qatar is set to go from strength to strength with the government’s US$200 billion investment programme underlining their commitment to developing infrastructure, which is in line with the Qatar National Vision 2030 objectives for economic, human, social and environmental development. Part of Qatar’s 30-year vision is to attract foreign investment and an international talent pool, and businesses can take advantage of a compelling tax environment. Plus, they maintain 100% ownership of their business. Top all this off with a high standard of living in a multicultural environment with recognised academic opportunities, including full sponsorship for free study and an infrastructure that supports businesses to succeed. It’s easy to see why Qatar businesses has firmly put itself on the map as a leading financial centre where business go to grow within a diverse nation that is home to over 85 different nationalities.
Tags : 
    
Qatar Financial Centre
Published By: Shell U.K. Limited     Published Date: Aug 08, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage
Tags : 
shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure, volatility, colourless, colorless, odourless, odorless, viscosity index
    
Shell U.K. Limited
Published By: Virgin Media Business     Published Date: Aug 05, 2019
The world is now digital. From the explosive expansion in data-driven service delivery to digitally disruptive business models such as Uber and Netflix that have fundamentally changed the way we consume products, the digital evolution is unavoidable. As digital continues to advance, it’s crucial that UK businesses can be confident in their ability to keep up to date with the latest trends and technologies. But enhancing existing tools and models is just the beginning. Digital transformation is about taking advantage of new innovations that completely change the way businesses work, the experiences they offer their customers and the value they deliver within their market. To find out more download this whitepaper today.
Tags : 
    
Virgin Media Business
Published By: IBM APAC     Published Date: Nov 22, 2017
It is imperative that organizations start looking now for smarter solutions to the problems associated with unstructured data. There are many issues related to unstructured data that need to be readily addressed such as storage, discovery, organization, tagging and deduplication. One of the most important issues related to unstructured data is finding and discovering key business insights as quickly as possible, preferably in near real time, to gain a significant competitive advantage.
Tags : 
storage, discovery, organization, tagging, deduplication, competitive, advantage
    
IBM APAC
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Trimble     Published Date: May 02, 2019
Involvement in early-stage construction projects can deliver big wins for savvy contractors. By helping to materialize the vision for the project, you can position yourself as the best team to bring that vision to life. But for some estimators, developing a conceptual construction estimate is more labor-intensive than producing a final one. You could spend days or weeks working on it, yet have very low confidence in the numbers you present. If your conceptual estimates are: ? Too time-consuming to produce.. ? Based more on guesswork than actual data... ? Not helping you win more projects… You’re making things harder than they need to be. Claim your FREE eBook to learn how you can produce fast and accurate conceptual estimates.
Tags : 
    
Trimble
Published By: Dell     Published Date: Aug 17, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations.
Tags : 
technology, best practices, productivity, data, competitive advantage
    
Dell
Published By: Dell     Published Date: Aug 17, 2016
Windows 10 is the OS of the future and fundamentally changes how PCs and other devices will be used and supported in organizations. However, with different support periods set by Microsoft for Windows 7, each IT and procurement organization need to evaluate what hardware and software combination will best support their workforce if they are not ready to move to Windows 10 right away. Even purchasing new PCs to take advantage of performance improvements and new form factors while downgrading the OS may not be an optimal strategy going forward.
Tags : 
dell, windows 7, procurement
    
Dell
Published By: Dell EMC     Published Date: Nov 02, 2015
A new IDG Research study reveals that IT professionals are already seriously considering converged systems. The advantages of converged systems are clear. Still, some reticence remains due to concerns about cost and ROI. Learn how converged systems bring value to the enterprise today and tomorrow. And see how Dell PowerEdge FX solutions smooth the road to convergence.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Plus, Dell EMC VxRail is more than 30% lower TCO compared to a build-your-own solution. A few of the advantages include: • Deploy Dell EMC 4.6 times faster than build-your-own • 30% Lower TCO - Total cost of ownership compared to Build Your Own • 8.5% LOWER TCA - Total cost of acquisition compared to Build Your Own This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments.
Tags : 
hyperconverged infrastructure, data organization, data management, datacenter
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
While there are significant potential benefits to migrating to a hyper-converged system, true cost and real life experience are critical decision factors. To accurately establish a case for going to one platform or another, you need a strong fact-based analytical methodology and approach. Download this Edison Group white paper to better understand the cost and measureable effort benefits of hyper-converged appliances. Dive into the details for the VCE VxRail Appliance from Dell EMC, including total cost of ownership, total cost of acquisition and relative work efforts to install, initialize and maintain as compared to building your own system.
Tags : 
storage, software, network, hardware, facilities
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 10, 2015
Download this whitepaper to learn more about the advantages of SDS in the Data Center.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell® and its partners Cloudera® and Intel®.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Jan 17, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
data, virtualization, manufacturers, customer, supply, products, optimization, product
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jan 17, 2019
In an industry driven to deliver alpha, where might financial services firms find opportunities when investing in application innovation? The answer is data. Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. That’s how data delivers alpha.
Tags : 
virtualization, data, client, firms, application, liquidity, access, management, applications
    
TIBCO Software
Published By: Zebra     Published Date: Oct 12, 2011
Retailers face enormous pressure to gain ROI from their business processes. Achieve the most value with RFID technology by ensuring accuracy, while shrinking the reoccurring costs of label media. This document from Zebra Technologies discusses the benefits of item-level tagging, and how on-pitch printing and encoding solutions can boost RFID's value beyond the supply chain.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions, retail
    
Zebra
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.