Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sso

Results 1 - 25 of 1650Sort Results By: Published Date | Title | Company Name
Published By: Zpas     Published Date: Apr 18, 2017
The most important factors that determine the correct operation of modern automation, electronics, industrial computers and other devices are the correct power supply and the appropriate climatic conditions. These are necessary to ensure ongoing operation of priority infrastructure equipment – server room, data communication, power engineering.
Tags : 
power, datacenter, server, zpas_uk
    
Zpas
Published By: Eaton     Published Date: Sep 29, 2017
Exploiting the Software Advantage Lessons from Digital Disrupters
Tags : 
datacenter, cloud, technology, digital, datacenter, datacentre_strategy_and_evolution, networking, data center
    
Eaton
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 17, 2018
Your mobile workforce needs devices that are both versatile and allow for higher productivity. Increasingly, that’s 2-in-1 devices, such as convertible notebooks or detachable tablets. IDC research shows that using Dell 2-in-1 devices, powered by Intel® processors, made people more productive while being less physically demanding and requiring less effort. Download the executive summary for highlights of the IDC study and to find out why people prefer using 2-in-1 devices over traditional laptops. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Pure Storage     Published Date: Oct 09, 2018
Oggi la continuità operativa è fondamentale per qualsiasi azienda. Le imprese sono coinvolte in una trasformazione digitale profonda e si rivolgono all’IT per tutte le attività più mission-critical. I tempi di fermo possono arrivare a paralizzare l’intera organizzazione: le aziende più resilienti sono in grado di gestire i guasti tecnologici e fare in modo che l’azienda resti sempre operativa e funzionante. Garantire la business continuity, infatti, significa garantire maggiore vantaggio competitivo, maggiore coinvolgimento dei clienti e maggiore innovazione. Tuttavia, il raggiungimento di una business continuity di alto livello, con Recovery Point Objective (RPO) e Recovery Time Objective (RTO) pari a zero, è tipica delle imprese di grandi dimensioni che, proprio perché grandi, possono sostenere gli investimenti necessari e gestire la complessità associata. Per la maggior parte delle aziende, i costi di una business continuity di alto livello sono sempre risultati eccessivi. Oggi la s
Tags : 
    
Pure Storage
Published By: Dell Server     Published Date: Aug 07, 2018
IT is in the midst of one of its major transformations. IDC has characterized this paradigm shift as the “third platform,” driven by innovations in cloud, big data, mobility and social technologies. Progressive enterprises are seeking to leverage third-platform technologies to create new business opportunities and competitive differentiation through new products such as Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor and services, new business models and new ways of engaging customers.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 07, 2018
Drive a competitive advantage. Deploy and analyse more high-value data workloads faster with a 41% increase in transactions per second and a 50% reduction in average query response time with the Dell EMC PowerEdge Servers, powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
Transforming IT to meet the emerging requirements of a rapidly advancing digital economy is a priority for most companies today. Market economies and quickly evolving digital interactions are driving new and increasing demands on IT infrastructure for organizations of all kinds – from small businesses to enterprises to public institutions. IT requirements to support a variety of digital use paradigms (personal devices, IoT, VMs, VDI) are changing quickly, and organizations need to respond in order to be competitive in this evolving digital world. The latest generation of PowerEdge servers powered by Intel® Xeon® Platinum processors can deliver differentiated business agility over older-generation infrastructure. IDC asserted that updating servers can help businesses deploy applications up to 22 percent faster and improve application performance up to 29 percent over outdated infrastructure. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
Transform your IT with the clear winner in server innovation Greater performance, agility and security are the new imperatives of the modern data center. Dell EMC PowerEdge servers — with Intel® Xeon® Scalable processors — are ready to meet those demands, today and tomorrow.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
    
Dell Server
Published By: Workday Italy     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
    
Workday Italy
Published By: Pure Storage     Published Date: Oct 09, 2018
As flash storage has permeated mainstream computing, enterprises are coming to better understand not only its performance benefits but also the secondary economic benefits of flash deployment at scale. This combination of benefits — lower latencies, higher throughput and bandwidth, higher storage densities, much lower energy and floor space consumption, higher CPU utilization, the need for fewer servers and their associated lower software licensing costs, lower administration costs, and higher device-level reliability — has made the use of AFAs an economically compelling choice relative to legacy storage architectures initially developed for use with hard disk drives (HDDs). As growth rates for hybrid flash arrays (HFAs) and HDD-only arrays fall off precipitously, AFAs are experiencing one of the highest growth rates in external storage today — a compound annual growth rate (CAGR) of 26.2% through 2020.
Tags : 
    
Pure Storage
Published By: Intel     Published Date: Sep 14, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Cohesity     Published Date: Oct 02, 2018
Until recently, Manhattan Associates had used a traditional secondary storage solution to manage its large and rapidly expanding data footprint of ~1PB. Designed for traditional workflows, the company’s IT team realized it had become cost prohibitive to add features to their existing environment to support their VM level backups. Like most traditional storage options, the existing solution did not scale-out linearly, and complicated the environment by creating silos. With Cohesity’s scale-out architecture, the team was able to start small and grow their Cohesity environment on the go, yet keep it unified and simple. See how Manhanttan Associates achieved operational efficiency and lowered their TCO by supporting VM data protection, supporting native integration with the public cloud and providing simple converged solution for data protection, target storage and files. Get the case study.
Tags : 
case, study, manhattan, associates, consolidates, data, protection
    
Cohesity
Published By: Forcepoint     Published Date: Aug 31, 2018
Die Vernetzung und der Schutz von Unternehmen im Zuge einer immer weitergehenden dezentralen Streuung der Mitarbeiter, die Zugriff auf Ressourcen innerhalb und außerhalb des Unternehmensnetzwerks benötigten, führt zu einer neuen Schwerpunktsetzung auf betriebliche Effizienz und wirksamen Schutz. Während die fundamentalen Anliegen der Vertraulichkeit, Integrität und Verfügbarkeit von Daten unverändert bestehen bleiben, steigen die Kosten und potentiellen Schäden für Unternehmen immer weiter an, was die Rolle der Führungsebene und der Sicherheitsfachleute komplexer macht als je zuvor. Eine vor Kurzem von IDC durchgeführte Befragung von CISOs hat ergeben, dass die folgenden fünf Szenarien am meisten Besorgnis erregen: • Preisgabe vertraulicher Informationen auf der Titelseite bedeutender Veröffentlichungen (WSJ etc.) • Abfluss von 50 % der HR-Mitarbeiterdaten • IT-Systeme als Angriffsvektor gegen Partner • Gezielte Angriffe • Abfluss von 10 % der personen- und gesundheitsbezogenen Mitarbe
Tags : 
    
Forcepoint
Published By: XpertHR     Published Date: Jun 13, 2018
A renewed focus on pay equity at the state and federal levels, coupled with the power of movements like #MeToo and #TimesUp, have companies and their HR/compliance representatives dusting taking a deep dive into pay practices to ensure equity for all. Recent lawsuits settled in favor of plaintiffs, and activist call-outs for companies to be more equitable and transparent about pay practices, add fuel to the fire: ? Seven female law professors at the University of Denver won a $2.6 million settlement in May ? Activist investor Arjuna Capital is pushing major tech firms to publish data to support equitable pay practices ? Google is facing a class action battle over equitable pay practices That’s just the tip of the iceberg. If you’re not on top of this critical issue, you could be next on the list of companies facing legal and public scrutiny. XpertHR can help you wade through the regulatory requirements and practical considerations to audit and revise, as necessary, your pay practices.
Tags : 
pay equity, equal pay, gender equality, #metoo, #timesup, pay practices, compliance, fair pay
    
XpertHR
Published By: Kronos     Published Date: Sep 24, 2018
This joint research product between IndustryWeek Custom Research and Kronos shines a light on manufacturing strategy, management practices and investment priorities over the next five years and beyond. While U.S. manufacturing employment has declined over the past 25 years, the future outlook is bright. Taken alone, the U.S. manufacturing sector would be the ninth-largest economy in the world, according to the National Association of Manufacturers.
Tags : 
    
Kronos
Published By: DocuSign UK     Published Date: Aug 08, 2018
Download this eBook to learn how eSignature technology and the processes associated with it not only optimise workflows but also can help make company activities more secure and compliant.
Tags : 
    
DocuSign UK
Published By: Bluecore     Published Date: Sep 18, 2018
Email marketers have always dreaded the unsubscribe, and at the cost of nearly $18 or more per unsubscribe depending on your average order value, it’s clear why. Altogether, the cost of an unsubscribe -- in terms of lost revenue potential and associated soft costs — is nothing to blink at. Fortunately, there are several steps you can take to decrease your unsubscribe rate and recover some of that otherwise lost revenue.
Tags : 
email, marketers, subscriber, revenue
    
Bluecore
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.