Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

oss

Results 1 - 25 of 4384Sort Results By: Published Date | Title | Company Name
Published By: Server Technology     Published Date: Jan 24, 2018
What role does power infrastructure play in enabling these hyperscale data centers to operate as reliably and efficiently as possible?
Tags : 
hyperscale, datacenter, power, infrastructure, pdu, servertech_series
    
Server Technology
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten. Uninterruptible Power Supplies and Power Distribution - Power Distribution + UPS
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten Uninterruptible Power Supplies and Power Distribution - Power Distribution + UPS - Part 2
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: Eaton     Published Date: Sep 29, 2017
The possible “outages” that might have been forgotten - Power Distribution
Tags : 
datacenter, power, outage, energy, network, series_of_eaton_white_papers
    
Eaton
Published By: DCD Cooling Supplement     Published Date: Jun 26, 2017
In this DCD Supplement we focus on the possibilities and difficulties of data center cooling. Over recent years, data center cooling has evolved from a simplistic model of top-down control, to demand-led systems where the cooling is provided where and when it is needed.
Tags : 
dcd, stulz, data center, cooling
    
DCD Cooling Supplement
Published By: Citrix     Published Date: Oct 07, 2016
Digital transformation is creating disruptive change across every major industry, with customer expectation driving rapid innovation. Using the case of a typical online retailer as an example, we demonstrate how technology enables enterprises to turn disruptive change into operational and competitive advantage.
Tags : 
networking, it management, telecom, data center
    
Citrix
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: HP Inc.     Published Date: May 29, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
It’s time to look ahead. We have outlined 5 predictions that we believe marketers should be preparing for in the next 5 years. In this whitepaper, we’ll cover how: • Blockchain will become a greater core component of marketing. • Display advertising as we know it will finally die. • Cross-device identification will become a necessary part of omnichannel marketing. • Voice re-emerges as a distinct channel and internet interface. • All marketing will be done in real time.
Tags : 
    
Emarsys - APAC
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
Omnichannel isn’t just another buzzword you can ignore. In fact, today’s most successful marketing strategies all take an omnichannel track that puts customers at the center of a diverse network of interactions and engagements. In this white paper, you’ll learn: • How email can serve as the foundation of your omnichannel strategy • How Artificial intelligence marketing (AIM) can make it possible to not only achieve true 1:1 personalization, but also scale it • How to apply a step-by-step roadmap to your brand’s pursuit of omnichannel excellence
Tags : 
    
Emarsys - APAC
Published By: Schneider Electric     Published Date: Jun 03, 2019
Leveraging IIoT advancements, learn how to break traditional barriers between your power and process control systems to solve challenges across the full lifecycle of the plant. Download the white paper to learn more.
Tags : 
power, digital transformation, industrial internal of things, smart control, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, defence in depth, industrial automation, process control, process systems, power and process
    
Schneider Electric
Published By: 3D Systems     Published Date: May 14, 2019
For more than two centuries, industrial factory production has excelled in four key aspects: repeatability of the process, durability of parts produced, productivity of the workflow, and an economical total cost of operation. Factory workflows have been optimized to produce the best possible parts in volume, as inexpensively as possible. Any new production method or workflow process that hopes to be accepted alongside this standard process must meet or improve on these time-tested elements. To learn more, download this whitepaper today.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 17, 2019
This new world is not only delivering better quality components at lower cost but is offering whole new design possibilities, new business models and new markets. The key is to know when to use metal additive manufacturing instead of or complementing conventional milling or casting. Read this executive brief to learn about the transformative value of the fifth wave of metal 3D printing, as well as compelling use cases for direct metal printing from the aerospace, automotive and industrial sectors.
Tags : 
    
3D Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.