Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

absolute

Results 1 - 25 of 95Sort Results By: Published Date | Title | Company Name
Published By: Anixter     Published Date: Nov 23, 2015
This report tackles the challenges, standards and best approaches to thermal efficiency in existing facilities largely due to them being more prevalent when compared to a new facility. You will be introduced to four best practices that are absolutely critical to achieving an optimal thermal environment. The report also explores the future of datacenter cooling and introduces emerging technologies.
Tags : 
thermal efficiency, data centers, anixter, data center
    
Anixter
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: Feb 23, 2017
During the course of research efforts in the all-flash array (AFA) space, IDC is still encountering IT executives, particularly CIOs and CFOs, who have an outdated perspective on relevant cost metrics for comparing all-flash solutions with legacy hard disk drive (HDD)–based systems. In IDC's view, flash is an absolute requirement for performance reasons in any 3rd Platform computing environment. While most understand the need for flash performance, there is still a subset that does not view the broader use of flash in the enterprise as cost effective
Tags : 
    
Dell EMC
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : 
data, security, mobility, mobile computing, best practices
    
Absolute Software
Published By: Oracle     Published Date: May 30, 2017
In this document you’ll discover 1) 6 ways you’re letting your customers down 2) The 4 things you absolutely have to measure 3) The secret to optimisation 4) The proof: How OSN turned around its field service performance
Tags : 
customer service, field service performance, optimisation, digital transformation, customer experience management
    
Oracle
Published By: Juniper Networks     Published Date: Jan 23, 2018
Bringing your vision to life is no small undertaking. So the last thing you need are network security threats looming over head. That’s why our security products and services build an unprecedented level of security into the DNA of your network. That way, you can focus on your dreams with absolute confidence.
Tags : 
    
Juniper Networks
Published By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : 
security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources, resource allocation, configuration, software, hardware, requirements
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 10, 2012
The story of val Verde will help schools innovate better, streamline purchasing, increase cost-efficiencies, and ultimately, provide staff and students with a fleet of optimally running devices.
Tags : 
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Committed to providing a first class education for the "whole child", Bensalem Township School District's technology team has innovated the learning experience with "technology infused instruction". Read this case study to find out how!
Tags : 
bensalem, power management, innovation, interactive, engaging, education
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Chicago Public Schools (CPS) pursues a leading approach to integrating technology into the learning experience and provides students with access to computers throughout their education..
Tags : 
education, absolute, cps, chicago, integration
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : 
kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Dysart Unified School District (DUSD) is Arizona's fastest-growing school district. Despite the district's extremely rapid expansion, it remains focused on its mission of "Increasing in Excellence" - or, preparing students for life in the new century.
Tags : 
laptop learning, dysart, dusd, arizona, students
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Start   Previous   1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.