Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

costs

Results 201 - 225 of 2972Sort Results By: Published Date | Title | Company Name
Published By: 3D Systems     Published Date: Mar 07, 2019
To stay competitive, manufacturers have to meet the rapidly changing needs of customers while retaining high quality products, at the same time as controlling costs. Product lifetimes are shrinking and customers are expecting more customization and innovation. Agility is the key to staying ahead of the competition and meeting the needs of customers. The FabPro 1000 entry-level industrial 3D printer delivers production-grade parts, at high speed, with six sigma repeatability, and can be used across a distributed manufacturing and engineering enterprise. With a low cost of entry, FabPro 1000 enables agile manufacturing operations to meet customer needs rapidly and effectively empowers engineers to deliver more value and quality in the product development process. To find out more download this whitepaper today!
Tags : 
    
3D Systems
Published By: Lenovo UK     Published Date: May 15, 2019
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Shell U.K. Limited     Published Date: Jul 18, 2019
The way we produce and consume energy globally is changing. Over the next decade, the energy mix will undergo a significant shift at both a supranational and domestic level as we work towards a cleaner future. By 2030, the offshore wind power market is expected to be worth £30 billion per year. Fast forward to 2050 and the industry is projected to contribute to at least a third of the total global electricity supply. While this is great news for power generation companies, recent research has showed that the costs associated with maintaining wind farms will double between 2015 and 2020. To secure its place in the future energy mix, protecting a wind turbines value and output through effective maintenance will prove critical to achieving a competitive edge. There are steps that can be taken now, to reduce maintenance costs today and keep them lower in the future. Shell Omala S5 Wind 320 – advanced synthetic wind turbine gear oil that can help to ensure your wind turbines work harde
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 28, 2019
Effective lubrication is vital in the manufacturing industry, helping to reduce total cost of ownership (TCO) through lower maintenance costs and greater productivity. However, 6 in10 companies are unclear on how lubrication can influence unplanned down time or equipment availability. With this in mind, Shell Corena S3 RX is designed to offer companies a straightforward solution to the most pressing concerns experienced in manufacturing operations. Marking it the first gas-to-liquids compressor oil to enter the market, Shell Corena S3 RX offers: longer oil life; reduced oil carryover; and improved efficiency, driving your equipment to become more productive over the long-term and subsequently reducing TCO. Created in collaboration with OEMs and customers, Shell’s range of lubrication products are designed with manufacturers in mind and have resulted in at least £139 million savings to customers worldwide. Read the Shell Corena S3 RX brochure Read our General Manufacturing Total Co
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 29, 2019
Effective lubrication is vital in the manufacturing industry, helping to reduce total cost of ownership (TCO) through lower maintenance costs and greater productivity. However, 6 in10 companies are unclear on how lubrication can influence unplanned down time or equipment availability. With this in mind, Shell Corena S3 RX is designed to offer companies a straightforward solution to the most pressing concerns experienced in manufacturing operations. Marking it the first gas-to-liquids compressor oil to enter the market, Shell Corena S3 RX offers: longer oil life; reduced oil carryover; and improved efficiency, driving your equipment to become more productive over the long-term and subsequently reducing TCO. Created in collaboration with OEMs and customers, Shell’s range of lubrication products are designed with manufacturers in mind and have resulted in at least £139 million savings to customers worldwide. Read the Shell Corena S3 RX brochure Read our General Manufacturing Total Co
Tags : 
    
Shell U.K. Limited
Published By: PWC EMEA     Published Date: Nov 14, 2019
To help our clients unlock long-term value from the deals they are doing, we surveyed 100 private equity (PE) partners, globally, to uncover their experiences of value creation through M&A. Cutting costs just won’t cut it in PE Our Creating value beyond the deal: private equity report found that more value can be driven by revenue enhancement, rather than just cost-cutting. Only 45% of the 100 private equity partners we interviewed say they realise deal value through revenue enhancement. Cost cutting is no longer enough; dealmakers need to look at how to optimise revenue, even if this is often challenging to achieve. We found that PE houses are typically more focused on driving cost benefits, leaving scope to enhance benefits to the topline. Realising revenue benefits plays a key role in deals, with 75% of the most successful deals achieving topline growth. Mastering the journey of creating value in deals has never been so important and this report will detail how dealmakers can
Tags : 
    
PWC EMEA
Published By: CA Technologies     Published Date: Dec 27, 2011
This whitepaper looks at the need for IT to develop a new model for communicating with the business, how IT dollars are being spent, and how unnecessary IT costs can be avoided.
Tags : 
ca technologies, technology, applications, costs, business services
    
CA Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 17, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations.
Tags : 
technology, best practices, productivity, data, competitive advantage, data center
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel® Core™ i5-6300U processor performed compared to previous generations. • Starting computer and programs is 33% faster • Opening/using several applications at one time is 29% faster • Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : 
windows, processors, laptop, system information, intel core
    
Dell
Published By: Dell     Published Date: Feb 23, 2017
Managing the PC lifecycle can be a complicated and expensive process. Organizations with outdated systems require increased support, have higher maintenance costs, and experience a loss of end user productivity. However, Dell commissioned Forrester® Consulting to study the trends and challenges for global IT decision makers in order to identify opportunities for optimizing the PC Lifecycle.
Tags : 
    
Dell
Published By: Dell     Published Date: Aug 10, 2015
This study provides a framework to evaluate the potential financial impact of an on-premises private cloud deployment. Download this study (commissioned by Dell and delivered by Forrester Consulting) to better understand the benefits on your organization and to understand how leveraging private cloud can help your organization win, serve and retain customers. Costs, flexibility, risks and ROI associated with a private cloud deployment.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Nov 05, 2015
IT organizations are aggressively virtualizing their data centers, creating private cloud environments that help them reduce capital infrastructure and data center costs, improve security, and simplify management. However, potential hurdles, if left unaddressed, can get in the way of fully benefiting from a private cloud. Download this summary to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 11, 2016
No matter your line of business, technology implemented four years ago is likely near its end of life and may be underperforming as more users and more strenuous workloads stretch your resources thin. Adding memory and upgrading processors won't provide the same benefits to your infrastructure as a consolidation and upgrade can. Read this research report to learn how upgrading to Dell's PowerEdge VRTX with Hyper-V virtualization, Microsoft Windows Server 2012 R2, and Microsoft SQL Server 2014 could reduce costs while delivering better performance than trying to maintain aging hardware and software.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
data, software-defined, hyper-convergence, hdd, sddc
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
VCE VxRail Appliances enable organizations to create IT certainty by eliminating complexity and collapsing cost structures while leveraging their existing VMware investments. Based on VMware's market-leading Hyper-Converged Software, VxRail delivers a known and proven building block for the software defined data center. It provides IT organizations with a full range of options to create a flexible, optimized infrastructure that dramatically simplifies their IT operations while reducing costs.
Tags : 
storage, vmware, protection, hyper-convergence, ssd, hdd
    
Dell EMC
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.