RSS feed Get our RSS feed

News by Topic

infor

Results 301 - 325 of 4328Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
     Akamai Technologies
By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
     Dell
By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel® Core™ i5-6300U processor performed compared to previous generations. • Starting computer and programs is 33% faster • Opening/using several applications at one time is 29% faster • Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : windows, processors, laptop, system information, intel core
     Dell
By: Dell EMC     Published Date: Nov 09, 2015
The webinar is an excellent resource to provide attendees with the kind of comprehensive and collaborative perspective needed when exploring the implementation of big data solutions. The real-world examples provide information that can enable better decisions for designing best-of-breed big data solutions for organizations.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 09, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries. The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell and its partners Cloudera and Intel.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell® and its partners Cloudera® and Intel®.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how to big data more manageable while condensing vast amounts of information into actionable business insights.
Tags : 
     Dell EMC
By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: What data virtualization is and its benefits When and when not to use data virtualization How to deploy data virtualization to benefit your business How to unlock the value of your SAP data
Tags : virtualization, data, users, analytics, sql, application, access, directory
     TIBCO Software
By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. TIBCO® Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •?What data virtualization is and its benefits •?When and when not to use data virtualization •?How to deploy data virtualization to benefit your business
Tags : virtualization, data, users, analytics, sql, application, access, directory
     TIBCO Software
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •? What data virtualization is and its benefits •? When and when not to use data virtualization •? How to deploy data virtualization to benefit your business •? How to unlock the value of your SAP data
Tags : 
     TIBCO Software GmbH
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. TIBCO® Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •? What data virtualization is and its benefits •? When and when not to use data virtualization •? How to deploy data virtualization to benefit your business
Tags : 
     TIBCO Software GmbH
By: CA Technologies     Published Date: Oct 22, 2014
This infograph provides important information adn statistics on BYOID and the potential impact if IT and business are out of step.
Tags : byoid, security, byoid strategy, it and business views on byoid, bring your own identity
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This White Paper provides information on how enhance delivery secure and improve customer experience.
Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security
     CA Technologies
By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : byod, identity, byoid benefits
     CA Technologies
By: CA Technologies     Published Date: Feb 09, 2015
This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.
Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services
     CA Technologies
By: Dell     Published Date: Nov 20, 2014
In extreme conditions, you need reliable technology. Whether you are a first responder, work in dangerous locations, wild weather, or just need your equipment to be able to withstand the same harsh conditions you do, Dell allows you to access information quickly - in extreme environments where traditional notebooks simply cannot live up to your expectations. How do you work in such harsh environments and keep information secure and long-lasting without the fear of losing critical information? And how do you keep the information secure, yet utilize a manageable system? Download this interactive infographic today to become informed on Dell's best practices.
Tags : mobility, real-world systems, extreme environments
     Dell
By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
     Dell
By: Dell     Published Date: Jan 26, 2015
Infrastructure and operations leaders must create a strategy and budget to outfit workers with devices, software, and services to improve their productivity. Additionally, I&O leaders play a critical role in both the strategy and budgetary support of customer-facing interaction technologies. This report helps you benchmark your organization against your peers as you work with business partners to develop and implement technology strategies that drive business results for your company. Read this Forrester Research report, offered compliments of Dell, for more information on strategies to devise the right technology fits for your organizational needs.
Tags : dell, windows, workforce, customer facing technology, infrastructure, operations, software, productivity
     Dell
By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : server configuration, role configuration, virtual disks, server installation
     Dell
By: Dell     Published Date: Oct 24, 2014
Windows Server 2004 platform migration is not a mere OS upgrade or migration. Platforms accordingly need to be classified by their use in order to establish an adequate migration plan; the use of platform can be largely classified into 4 types. Read this paper to become informed on the 4 types of platform use and how to establish an adequate migration plan.
Tags : migration process, server migration, platform methods
     Dell
By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
World-class ideas deserve world-class workstations.
Tags : dell, bim, building information modeling, dell precision workstations, 3d modeling techniques
     Dell Brought to you by Intel
By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
A Dell Reference Architecture for 2,000 users with mailbox resiliency.
Tags : dell, microsoft® exchange server, vrtx, traditional information technology
     Dell Brought to you by Intel
By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management
     Collaborative Consulting
By: Collaborative Consulting     Published Date: Dec 20, 2013
According to a McKinsey study, half of all outsourced projects failed to meet their expected goals – while an Information Week Survey showed that 40% of outsourced projects did not save money! Factors that contribute to these problems include issues with quality, time zone challenges, and added travel expenses, among others.
Tags : collaborative consulting, infographic, offshoring, real company costs, language issues, communication issues, property risk, security systems
     Collaborative Consulting
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics