RSS feed Get our RSS feed

News by Topic

graph

Results 701 - 725 of 1057Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Mar 03, 2017
When it comes to audience engagement, the landscape has been completely rewritten. Media and entertainment companies need to embrace new technologies to achieve revenue goals. The Adobe guide, Play to Win in Audience Intelligence, shows you how. Read the guide to learn: • How to bring your data sources together into a unified view of the customer • How to move beyond basic demographic attributes to behavior attributes • How to use look-alike modeling to improve customer targeting and acquisition
Tags : audience intelligence, audience engagement, unified data source, behavior attributes, look-alike modeling, customer experience/engagement
     Adobe
By: Mentor Graphics     Published Date: Apr 03, 2009
High Density Interconnect (HDI) is being used more often to meet the growing need for more complex designs in smaller form factors. Beyond some of the more obvious electrical effects of using smaller vias, there is also an impact to the power integrity of a board using HDI. This includes different effects of mounted inductances of decoupling capacitors, changes in plane performance due to reduction in perforation from chip pinouts, and the inherent plane-capacitance changes from using dielectrics of various thicknesses. This paper will examine and quantify these effects, using numerous design examples, including a large conventional through-hole design board that was reduced using HDI.
Tags : power integrity effects, mentor graphics, high density interconnect, hdi, chip pinouts, perforation, multilayer or build-up multilayer, bum
     Mentor Graphics
By: Mentor Graphics     Published Date: Jun 04, 2010
The focus of this paper is a combined electrical, thermal and optical characterization of power LED assemblies. Thermal management play important role in case of power LEDs, necessitating both physical measurements and simulation.
Tags : mentor graphics, electrical, thermal, optical characterization, power led assemblies, junction temperature
     Mentor Graphics
By: GoToMeeting     Published Date: Apr 04, 2011
This new Service Performance Insight explores why professional service organizations are increasingly relying on remote service delivery and collaboration tools to expand geographic reach, attract the best talent and increase satisfaction - all while reducing costs.
Tags : citrix gotomeeting, collaboration, psos, citrix, gotomeeting, web conferencing, telecommuting
     GoToMeeting
By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
     Intel
By: Group M_IBM Q4'19     Published Date: Oct 01, 2019
Infographic: Want to get more out of your asset management efforts? Time to include predictive maintenance.
Tags : 
     Group M_IBM Q4'19
By: Akamai     Published Date: Mar 08, 2017
Video leads mobile data traffic. Read this infographic to find out more facts about video and mobile data traffic.
Tags : video, mobile data traffic, mobile data, mobile video, infographic
     Akamai
By: Rackspace     Published Date: Jun 14, 2019
Don’t let the end of support for SQL Server 2008 and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : end of support, disruption, sql server, windows server, azure
     Rackspace
By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : outages, digital certificates, encryption, authentication, surveillance, automation
     Venafi
By: Thawte     Published Date: Oct 05, 2015
A l’heure où les consommateurs sont de plus en plus nombreux à faire leurs achats de Noël sur Internet, leurs exigences de sécurité représentent un enjeu plus capital que jamais. C’est donc maintenant qu’il faut agir. Sur le Net, un client rassuré est un client à moitié converti. Notre nouvelle infographie et notre dernier document technique vous en livre toutes les clés avant le grand rush de Noël.
Tags : online shopping growth, christmas shopping season, online-savvy, customer demand, online security, security
     Thawte
By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
     LifeLock
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
     Group M_IBM Q2'19
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : public key, secure content, encryption, proofspace, proofmark
     ProofSpace
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : trend micro, trend, e-discovery
     Trend Micro, Inc.
By: Lenovo UK     Published Date: Oct 15, 2018
Avec un ordinateur portable volé chaque minute, comment conciliez-vous la menace pour la sécurité et le besoin croissant de mobilité de la main-d'œuvre et d'une productivité accrue? Avec le ThinkPad optimisé par les processeurs Intel® Core ™ i7 vPro ™, vous bénéficiez de l’approche 360 de Lenovo en matière de sécurité. Plus la durabilité pour garder vos utilisateurs en mouvement et productifs à chaque étape de leur journée de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
Avec un ordinateur portable volé chaque minute, comment conciliez-vous la menace pour la sécurité et le besoin croissant de mobilité de la main-d'œuvre et d'une productivité accrue? Avec le ThinkPad optimisé par les processeurs Intel® Core™ i7 vPro™, vous bénéficiez de l’approche 360 de Lenovo en matière de sécurité. Plus la durabilité pour garder vos utilisateurs en mouvement et productifs à chaque étape de leur journée de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, lenovo x1, workforce mobility
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
Avec un ordinateur portable volé chaque minute, comment conciliez-vous la menace pour la sécurité et le besoin croissant de mobilité de la main-d'œuvre et d'une productivité accrue? Avec le ThinkPad optimisé par les processeurs Intel® Core™ i7 vPro™, vous bénéficiez de l’approche 360 de Lenovo en matière de sécurité. Plus la durabilité pour garder vos utilisateurs en mouvement et productifs à chaque étape de leur journée de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
     Lenovo UK
By: Cisco     Published Date: Jun 04, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face.
Tags : ioe, public safety, justice, emergency response, networking
     Cisco
By: Cisco     Published Date: Sep 15, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face. It specifically examines this topic through applications in law enforcement, emergency response, corrections, courts, and national security, and shows how IoE can help transform agencies to better protect citizens and make communities safer. Finally, this paper will provide recommendations on strategy implementation to enable agencies to take the next steps.
Tags : public safety, iot, law enforcement, emergency response, strategy
     Cisco
By: Cisco     Published Date: Nov 18, 2015
The Internet of Everything (IoE) is a continuous interaction among people, processes, data, and things. Sensors, networks, and smart devices are ubiquitous, providing a torrent of streaming data or big data. The Internet of Things (IoT), which is a network of physical objects accessed through the Internet that can sense and communicate, is a component of IoE. Cisco is helping customers and strategic partners leverage the full potential of IoE to achieve radical results across all sectors and industries. Indeed, IoE is capable of helping public safety and justice agencies increase cost efficiency, improve safety and security, provide better response times, and increase productivity.
Tags : ioe, public safety, justice, emergency response, networking, security
     Cisco
By: Adobe     Published Date: Apr 13, 2017
Today’s customers expect personal experiences no matter where they are, on every device. And it’s on your team to keep pace with every digital demand. That’s part of the unique challenge facing by creative studios. But with the right stock solution, you can save time for the big ideas, not the little to-dos. Read Put Time Back on Your Side: How Adobe Stock Can Jumpstart Your Creative Process to learn how to: • Integrate Adobe Stock for business with your existing Creative Cloud solutions • License stock images without toggling between platforms or reapplying edits • Work up to 10x faster with stock images
Tags : creative assistance, graphic design, photo editing, creative cloud, design, creative design, photoshop, stock photography
     Adobe
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
     AT&T
By: Bazaarvoice     Published Date: May 21, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : bazaarvoice, mobile, mobile consumers, mobile shoppers, web content, emerging marketing, marketing research, e-commerce
     Bazaarvoice
By: Bazaarvoice     Published Date: Aug 01, 2014
It’s no longer enough to think of consumers as online vs. in-store. The mobile shopper is neither and both of these, becoming the norm rather than the exception. “7 Ways the Mobile Consumer Changes Everything” reveals new research.
Tags : bazaarvoice, marketing, mobile, research, content, optimize, emerging marketing, internet marketing
     Bazaarvoice
By: Symantec     Published Date: Oct 01, 2015
To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites. Learn more about this and other ways to boost your ranking - Download our Raise your Google Ranking guide and view the infographic.
Tags : https-secured sites, seo, google ranking, security
     Symantec
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics