RSS feed Get our RSS feed

News by Topic

graph

Results 126 - 150 of 1072Sort Results By: Published Date | Title | Company Name
By: Amazon Web Services     Published Date: Apr 11, 2018
Elastic Load Balancing distributes incoming application traffic across multiple EC2 instances, in multiple geographic areas. This increases the fault tolerance of your applications. Load Balancing
Tags : 
     Amazon Web Services
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
     Godfrey
By: NEC     Published Date: Aug 12, 2014
We consolidated nine legacy servers into one NEC Express5800/A2040b enterprise server, and proved real benefits of doing so. In this infographic, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.
Tags : consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators
     NEC
By: Mentor Graphics     Published Date: Apr 12, 2016
This paper, nominated for the DesignCon 2016 Best Paper Award, analyzes the computational procedure specified for Channel Operation Margin (COM) and compares it to traditional statistical eye/BER analysis.
Tags : mentor graphics, ber, com, channel compliance
     Mentor Graphics
By: Symantec     Published Date: Jan 10, 2013
Transport Layer Security, widely known as Secure Socket Layer or SSL is the most popular application of public key cryptography in the world. Sometimes, TLS can give illusion of security when it is not. This paper explains TLS and its best uses.
Tags : tls, ssl, transport layer security, secure socket layer, best practices, applications, symantec, security
     Symantec
By: Symantec     Published Date: Jun 28, 2012
Transport Layer Security or TLS widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world.
Tags : transport layer security, tls, secure soclets layover, ssl
     Symantec
By: Symantec Corporation     Published Date: Oct 03, 2013
White Paper Published By: Symantec Corporation Transport Layer Security or TLS, widely known also as Secure Sockets Layer or SSL, is the most popular application of public key cryptography in the world. It is most famous for securing Web browser sessions, but it has widespread application to other tasks.
Tags : symantec, security, threat, report, key findings, best practice, strategy, technology
     Symantec Corporation
By: Jonckers Translation & Engineering     Published Date: Jul 13, 2010
Download our Localization Kit guide to learn best practices in localization kit development.
Tags : jonckers, localization service provider, lsp, software, graphics, documentation, action item
     Jonckers Translation & Engineering
By: Jonckers     Published Date: Apr 11, 2011
Download our Localization Kit guide to learn best practices in localization kit development.
Tags : jonckers, localization service provider, lsp, software, graphics, documentation, action item, interactive/pr agencies
     Jonckers
By: Lenovo UK     Published Date: Oct 15, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: Lenovo UK     Published Date: Nov 08, 2018
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
     Lenovo UK
By: Intel     Published Date: Nov 13, 2019
The combination of the SAP HANA platform and Intel® Optane™ DC persistent memory means that enterprises now have new ways to approach data tiering and management. Downtime can be significantly reduced because SAP HANA doesn’t have to reload data back into main memory after a server reboot, and more data can remain in the “hot” tier of main memory, which increases the amount of data that can be analyzed at a time. See this new infographic for a quick summary. Intel® Optane™ DC persistent memory also benefits SAP HANA by providing a higher memory density than DRAM, in addition to being byte-addressable. Up to three terabytes of Intel® Optane™ DC persistent memory is available per CPU socket on systems configured with future Intel® Xeon® Gold processors and future Intel® Xeon® Platinum processors, which means that an eight-socket server can contain up to 24 terabytes of Intel® Optane™ DC persistent memory.
Tags : 
     Intel
By: Entelo     Published Date: Sep 06, 2017
With the power of the Boolean search, talent acquisition pros can boost their recruiting arsenal, run highly specialized searches, and hire top talent based on current and past job titles, particular skill sets, geographic location, work experience, or academic background. Read on to get started!
Tags : 
     Entelo
By: Citrix Systems     Published Date: Feb 14, 2019
"Help your teams be even more productive. By giving them a secure, reliable connection with high-definition access to the apps and data they need, they'll be able to keep projects moving forward seamlessly — even across low bandwidth or high-latency networks. What's more, IT will be able to manage it all efficiently. Download our white paper. You'll discover how Citrix Workspace offers a high-definition (HDX) virtualized experience that rivals that of a local PC, and: - Decreases your demand for bandwidth - Increases your user density per hosting server - Supports voice, video, and display—even 3D professional graphics!"
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Jun 04, 2019
Help your teams be even more productive. By giving them a secure, reliable connection with high-definition access to the apps and data they need, they'll be able to keep projects moving forward seamlessly — even across low bandwidth or high-latency networks. What's more, IT will be able to manage it all efficiently. Download our white paper. You'll discover how Citrix Workspace offers a high-definition (HDX) virtualized experience that rivals that of a local PC, and: Decreases your demand for bandwidth Increases your user density per hosting server Supports voice, video, and display—even 3D professional graphics!
Tags : 
     Citrix Systems
By: RES Software     Published Date: Apr 05, 2013
RES Software overcomes the challenges of: Complexity, Investment, Performance bottlenecks, Technology choices and Opportunities for problems. This infographic looks at how RES Software can boost your IT productivity.
Tags : boost your it productivity, res software, complexity, investment, performance bottlenecks, technology, it producitivity, efficiency
     RES Software
By: ADP     Published Date: Nov 16, 2017
People are the most important part of your organization. Understanding what they do, how they do it, and even why they do it, provides invaluable insights for optimizing your processes, department, or entire organization. And as a business leader, in many ways you’ve never had it so good. There’s more people data available than ever before, and you’ve got the opportunity to put it to work through data-driven initiatives like changes to workforce demographics, employee retention, or benefits allocations. And most important, you have a chance to fuel business decision-making with smart workforce insights. Once you’ve learned how to turn your people data into real business value, you’ll create more visibility within your business, and everyone will see that the rewards of HR analytics are worth the effort. It’s time to take the opportunity to prove the value of data-driven HR. No more darkness. Otherwise, the only journey ahead is into some challenging pitfalls. We’ve identified five of t
Tags : 
     ADP
By: IBM     Published Date: Jul 19, 2016
This infographic explains how to build your big data strategy on a solid foundation.
Tags : ibm, analytics, big data, strategy
     IBM
By: IBM     Published Date: Oct 08, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs.
Tags : ibm, mobilefirst, analytics, enterprise, application, application development
     IBM
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager, ciso, integration, support
     IBM
By: Polycom     Published Date: May 12, 2015
Infographic depicting the internal connections of a connected ecosystem and how polycom can deliver these benefits to companies.
Tags : polycom, finance, customer service, ecosystem, technology, integration
     Polycom
By: McAfee     Published Date: Mar 31, 2017
Infographic to accompany the "Sustainable Security Operations" white paper. It demonstrates how sustainable security operations overcomes major inhibitors.
Tags : secops, siem, soc, threat defense, continuous monitoring, remediation, response, automation
     McAfee
By: Oracle     Published Date: Apr 26, 2016
Information security attacks are on the rise. And enterprises are highly vulnerable when it comes to databases, where their most critical business information resides. It's time to turn the database, and the infrastructure it runs on, into an information fortress.
Tags : 
     Oracle
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics