abs

Results 26 - 50 of 484Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within higher education can be a challenge with so many uses and options today. This use case guide takes into consideration higher education needs regarding form factor and key features. Take a look at this guide to learn how the computing choices made can facilitate the student learning environment whether in computer labs, in interactive learning spaces, or if learning takes place on the go via academic-related activities with digital signage located in the hallway. Read this paper today to find out the best desktop and display solutions to meet the needs of university and college students.
Tags : 
    
Dell
Published By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within K-12 education can be a challenge with so many uses and options available. This use case guide takes into consideration the specific needs within K-12 education environments. Whether seeking the best fit devices for STEM labs, looking to create interactive learning spaces, or fulfilling the design needs of today’s interactive classrooms, the uses are varied and there is not a one size fits all approach. Download this guide to learn how the computing choices made can facilitate the teaching and learning environments via the Dell™ OptiPlex™ family of devices. Learn which solutions are recommended for different use cases within the K-12 education world.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 23, 2017
During the course of research efforts in the all-flash array (AFA) space, IDC is still encountering IT executives, particularly CIOs and CFOs, who have an outdated perspective on relevant cost metrics for comparing all-flash solutions with legacy hard disk drive (HDD)–based systems. In IDC's view, flash is an absolute requirement for performance reasons in any 3rd Platform computing environment. While most understand the need for flash performance, there is still a subset that does not view the broader use of flash in the enterprise as cost effective
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 04, 2018
Handle more orders with faster response times, today and tomorrow. Databases are often the driving force behind a company’s mission-critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Download this summary from Dell EMC and Intel® to learn more. • Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. New Possibilities Outside. • Please use this trademark line at the bottom of the landing page: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Selecting the best computing solutions within higher education can be a challenge with so many uses and options today. This use case guide takes into consideration higher education needs regarding form factor and key features. Take a look at this guide to learn how the computing choices made can facilitate the student learning environment whether in computer labs, in interactive learning spaces, or if learning takes place on the go via academic-related activities with digital signage located in the hallway. Read this paper today to find out the best desktop and display solutions to meet the needs of university and college students. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: MobileIron     Published Date: Apr 20, 2015
Angesichts der Geschwindigkeit, mit der Unternehmen auf Mobiltechnik umsteigen, muss man statt von einer Entwicklung schon eher von einem globalen Wandel sprechen. Unter Berücksichtigung der Tatsache, wie schnell Benutzer und Unternehmen von PCs auf Mobilgeräte umsatteln, prognostizierte IDC, dass der Absatz von PCs 2013 auf ein Rekordtief fallen würde.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Il est tout aussi facile d'être submergé par l'omniprésent Big Data qu'il l'est pour les organisations d'être découragées par les défis qu'elles rencontrent lorsqu'elles implémentent une initiative en matière de Big Data. Les préoccupations liées aux ensembles de compétences associées au Big Data (et à leur absence), à la sécurité, à l'imprévisibilité des données, aux coûts non viables et à la nécessité d'effectuer une analyse de rentabilité peuvent mettre brutalement fin à une initiative en matière de Big Data.
Tags : 
    
Amazon Web Services
Published By: Symantec.cloud     Published Date: Mar 02, 2011
Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.
Tags : 
symantec.cloud, messagelabs, endpoint security, security threats
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : 
symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc, workforce mobile, saas
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : 
symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device
    
Symantec.cloud
Published By: Dell     Published Date: May 04, 2018
To successfully navigate workforce transformation, you need to consider both IT and end-user needs. Upgrading your hardware, and “right-sizing” it to fit your workforce only solves half the issue. Download this executive summary to learn ways to best upgrade PCs efficiently with effective solutions to meet the needs of the emerging workforce. Organizations who find this balance can turn their workforce into a strategic asset and gain a competitive advantage while freeing up IT resources to invest in other aspects of digital transformation. Please add this tagline below the abstract in the same font size and above the trademark line: Intel Inside®. Powerful Productivity Outside. The following trademark line should be used on the landing pages for this asset: Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Avanade DACH     Published Date: Jul 12, 2018
Nicht vernetzte Marketinglösungen kosten bares Geld 61 Prozent der Unternehmen verlieren Einnahmen aufgrund ihrer Marketing-Technologien – das lässt sich vermeiden. Wer seine Marketing-Technologien nicht konsequent aufeinander abstimmt, der lässt wertvolle Umsatzpotenziale ungenutzt. Das belegt eine neue Studie von Avanade und Sitecore. Die Studie macht deutlich, vor welchen Herausforderungen Unternehmen bei der Optimierung ihrer Customer Experience stehen – und beschreibt, welche Möglichkeiten Unternehmen damit verpassen. Lesen Sie, wie Sie das Beste aus Ihren Marketing-Technologien herausholen – und Ihren Umsatz nachhaltig steigern.
Tags : 
    
Avanade  DACH
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
    
Entrust Datacard
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud, cloud computing
    
Red Hat
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : 
data, security, mobility, mobile computing, best practices
    
Absolute Software
Published By: Adobe     Published Date: Apr 25, 2016
Im vorliegenden Paper beschäftigen wir uns mit der IT-Umgebung. Wie können Sie einfach zu verwaltende Dokumentenlösungen implementieren, die Desktop-Anwendungen, Apps und die Cloud aufeinander abstimmen und so den Anforderungen der modernen Arbeitswelt gerecht werden?
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 05, 2016
They’ve broken free from the customer relationship management (CRM) and clickstream-tracking systems you’ve used to keep tabs on them.
Tags : 
crm, customer experience, client experience
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept