Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ppe

Results 101 - 125 of 1235Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Au fur et à mesure que les entreprises effectuent une transformation numérique, elles se tournent vers de nouveaux modèles économiques qui reconnaissent les données comme une ressource stratégique essentielle pour alimenter les applications et favoriser les décisions métiers. Pour ce faire, il est nécessaire de transformer les données collectées et gérées par les entreprises en un capital important appelé « capital de données ». L’infrastructure et les charges de travail traditionnelles des technologies de l’information ne sont pas conçues pour favoriser la création d'un capital de données. L’ampleur des données qui doivent être capturées, stockées, protégées et disponibles à l’utilisation, ainsi que les besoins des applications de nouvelle génération (NGA) que les départements informatiques développent pour stimuler la création de ce capital de données dépassent les fonctionnalités de l’infrastructure traditionnelle dans le domaine des performances, de l’évolutivité, de la disponibili
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 20, 2019
Au fur et à mesure que les entreprises effectuent une transformation numérique, elles se tournent vers de nouveaux modèles économiques qui reconnaissent les données comme une ressource stratégique essentielle pour alimenter les applications et favoriser les décisions métiers. Pour ce faire, il est nécessaire de transformer les données collectées et gérées par les entreprises en un capital important appelé « capital de données ». L’infrastructure et les charges de travail traditionnelles des technologies de l’information ne sont pas conçues pour favoriser la création d'un capital de données. L’ampleur des données qui doivent être capturées, stockées, protégées et disponibles à l’utilisation, ainsi que les besoins des applications de nouvelle génération (NGA) que les départements informatiques développent pour stimuler la création de ce capital de données dépassent les fonctionnalités de l’infrastructure traditionnelle dans le domaine des performances, de l’évolutivité, de la disponibili
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 22, 2019
Oggi le aziende hanno bisogno di un'infrastruttura di storage dei file integrata altamente scalabile, sicura emulti-cloud. Dell EMC, leader in questo ambito, ha appena presentato ilsistema operativo Dell EMC Isilon OneFS 8.2insieme a Isilon H5600, un nuovo storage nodeNAS scale-out ibrido più denso e più veloce. Con queste nuove innovazioni, Isilon consente alle organizzazionidi accelerare nuovi carichi di lavoro e creare nuove opportunità ed efficienze, avanzando in modo significativo nei loro percorsi di rinnovo dell'IT.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Öffentliche und private Organisationen sind sich der Tatsache bewusst, dass das Management des PC-Lebenszyklus komplizierter und teurer wird, wenn die PC-Geräte und Arbeitsweisen von Mitarbeitern vielfältiger werden. Verschiedene Mitarbeitergruppen haben unterschiedliche Anforderungen in den Bereichen Hardware, Software und Konfiguration von Endnutzergeräten, um wirklich produktiv sein zu können. Während IT-Abteilungen versuchen, eine breitere Palette an Technologien für eine zunehmend verteilte und mobile Belegschaft bereitzustellen und zu unterstützen und gleichzeitig die Unterbrechungen für Endnutzer möglichst gering zu halten, stehen sie auch unter einem hohen Kostendruck. Die Konsolidierung von Prozessen und Hilfe vonseiten eines Anbieterpartners wie Dell kann jedoch zu Kostensenkungen führen und dafür sorgen, dass Expertenwissen für bessere Vorgänge im PC-Lebenszyklusmanagement zur Verfügung steht. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mi
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Les organisations publiques et privées reconnaissent que la gestion du cycle de vie des PC devient plus complexe et coûteuse, à mesure que les appareils et les modes de travail des collaborateurs se diversifient. Pour être pleinement productifs, différents groupes de collaborateurs ont des besoins différents en matériel, logiciels et configuration de périphériques. Si les départements IT cherchent à fournir et à prendre en charge un large éventail de technologies pour un personnel de plus en plus dispersé et mobile, tout en assurant une faible interruption de l’activité des utilisateurs, il ne faut pas oublier qu’ils sont soumis à une pression considérable en matière de coûts. À ce titre, consolider les processus et faire appel à un partenaire fournisseur tel que Dell réduit les coûts et donne accès à l’expertise nécessaire pour améliorer les opérations de gestion du cycle de vie des PC. Téléchargez ce livre blanc pour en savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Today’s IT leaders don’t have the time nor the resources to effectively respond to the needs of their ever-demanding workforce. It’s time for CIOs to stop running the IT department and start transforming the business; only through transforming the way in which they deploy and service the workforce can CIOs accomplish this paramount task. Organizations must now embrace a future that improves the workforce experience in order to offload cumbersome and time-intensive tasks. With IT becoming more integrated and a strategic partner to the lines of business (LOBs), offloading and embracing new technologies that enable employee experience is a logical step. In September 2018, Dell commissioned Forrester Consulting to evaluate the effectiveness of PC-as-a-service (PCaaS) and the appetite of organizations to use PCaaS. Forrester conducted five interviews with IT decision makers, with knowledge of desktop infrastructure, or those who had responsibility with PC life cycle services to explore this
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA
Published By: Oracle     Published Date: Mar 04, 2019
Watch this webinar to understand exactly where AI fits within HR. Euan Semple, speaker, writer and consultant, describes how you could apply AI and ML within HR to drive meaningful change.But before that can happen, teams need to trust the technologies they’re using.
Tags : 
    
Oracle
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Es wird erwartet, dass der Offshore-Windenergie-Markt im Jahr 2030 jährlich 30 Milliarden Britische Pfund Wert sein wird. Schauen wir in das Jahr 2050, so wird die Windbranche dann mindestens ein Drittel der globalen Stromversorgung abdecken. Während das für die Stormerzeuger gute Nachrichten sind, zeigt sich aber auch, dass sich die mit der Wartung von Windfarmen einhergehenden Kosten zwischen 2015 und 2020 verdoppeln werden. Damit sich die Windturbinen ihren Platz im Energiemix der Zukunft sichern können, wird es für das Erreichen eines Wettbewerbsvorteils entscheidend sein, ihren Wert und Output mittels effektiver Wartung langfristig zu erhalten. Es gibt Möglichkeiten, die schon heute unternommen werden können, um Wartungskosten zu verringern und in der Zukunft zu senken. Shell Omala S5 Wind 320 ist ein synthetisches Gertriebeöl das speziell für den Einsatz in Windturbinen entwickelt wurde und sie dabei unterstützt , dass Ihre Windturbinen auch unter rauesten Bedingungen län
Tags : 
    
Shell U.K. Limited
Published By: IBM APAC     Published Date: Nov 22, 2017
A user initiates the call and selects the source language, such as Spanish. (In this example, assume that the target language is set to English.) As the user is talking to the support representative, the audio is converted to text using the Speech to Text service. Then using Language Translator, the text is translated to English. English language text is then sent to the Text to Speech service as input. The output audio message is what the support representative hears. All of this happens in near real time. The text from Speech to Text and the Language Translator service also can be stored in a database for analytics. The same process is repeated in reverse for the audio message sent by support personnel.
Tags : 
source, language, english, spanish, speech to text, database, analytics, audio message
    
IBM APAC
Published By: Aventri     Published Date: Apr 29, 2019
"Quite a lot has happened since the first edition of The Future of Event Marketing. The second edition of The Future of Event Marketing will help you navigate through the overarching trends in our industry today. We are introducing a new wealth of quantitative and qualitative research as well as an update on our tools section, looking back at what is still relevant in 2019 and what will be relevant going forward. Download the latest guide today!"
Tags : 
    
Aventri
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 02, 2015
Remote offices, branch offices and small businesses have dramatically stepped up their adoption of new technology to help them run everything from typical business applications to cutting-edge solutions that differentiate their organizations. But that rapid run-up in new technology deployments has often come with a cost: increased infrastructure complexity that has become harder and more expensive to manage.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Converged solutions are being widely adopted by large enterprises where infrastructure sprawl has chewed up budgets and made scalability a challenge, and as a method to speed delivery of IT services. They are also proving to be beneficial to IT-strapped small and mid-sized organizations, which often lack the skills and resources to keep up with increased business demands for IT services.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue. The impact of hyper-converged infrastructures on IT has been profound. In fact, 85% of respondents to a recent ESG survey already use or plan to use a hyper-converged solution in the coming months. Though that number appears high, it is not all that surprising. ESG also asked organizations to identify which factors drove them to deploy or considering deploying a hyper-conv
Tags : 
ubuntu, performance, windows, hyper-convergence, infrastructure
    
Dell EMC
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : 
mobile performance, mobile app, customer engagement, channeling
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Dem sprunghaften Anstieg von Mobilgeräten in den letzten Jahren ist es zu verdanken, dass Apps für Unternehmen zu einem der wichtigsten Kanäle geworden sind, über den sie mit ihren treuesten und wertvollsten Kunden kommunizieren. Wenn Konsumenten mobile Geräte nutzen, verbringen sie 85% der Zeit mit Apps1, und mittlerweile ziehen moderne Nutzer Apps sogar dem Fernsehen vor.2 Obwohl die Verwendung von Apps in den vergangenen zwei Jahren um über 60% zugenommen hat, ist die Anzahl der Apps, mit denen jeder Nutzer interagiert, mit ungefähr 27 pro Monat vergleichsweise stabil geblieben.3 Nutzer wünschen sich also kaum neue Apps, interagieren aber stark mit den bereits genutzten. Das mobile Internet vergrößert also die Reichweite von Unternehmen, und Apps sind eine leistungsstarke Verbindung zu ihren besten Kunden.4 Nutzer, denen das Unternehmen wichtig genug ist, um dessen App herunterzuladen und zu installieren, sind die motivierteste Zielgruppe und die treuesten Fans.
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell
Published By: SAS     Published Date: Apr 16, 2015
Former Intel CEO Andy Grove once coined the phrase, “Technology happens.” As true as Grove’s pat aphorism has become, it’s not always good news. Twenty years ago, no one ever got fired for buying IBM. In the heyday of customer relationship management (CRM), companies bought first and asked questions later. Nowadays, executives are being enlightened by the promise of big data technologies and the role data plays in the fact-based enterprise. Leaders in business and IT alike are waking up to the reality that – despite the hype around platforms and processing speeds – their companies have failed to established sustained processes and skills around data.
Tags : 
    
SAS
Published By: CA Technologies     Published Date: Nov 07, 2014
Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.
Tags : 
mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, cloud computing
    
CA Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers are beginning to invest in location insights which give them data on how and why transactions are made in specific places. And with nearly all smartphones equipped with geolocation abilities, advertisements can be made location-aware with improved precision for targeting. Understanding location is key to gaining improved insights. HERE offers data sets and services that advertisers can use to contextualize consumer movements and habits in the world around them to provide well-timed and relevant advertising.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Dell EMC     Published Date: Feb 23, 2017
How do solid-state drives really match up to hard disk drives? This Infographic illustrates a side-by-side comparison that quantifies how the differences extend beyond cost per GB. See how SSD and HDDs stack up against each other with facts on reliability, capacity, latency, transfer rates, IOPS, and power consumption.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.