att

Results 4051 - 4075 of 4113Sort Results By: Published Date | Title | Company Name
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Wir hatten verschiedene ungeplante Ausfälle zu verzeichnen, darunter zwei größere Ausfälle in unseren ERP- und Finanzsystemen, die wir uns als Unternehmen nicht leisten konnten. Mit Dell EMC All-Flash-Speicher hatten wir keine größeren Ausfälle mehr, dafür aber mehr Flexibilität für die Verwaltung unserer Datenspeicherbedürfnisse.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Das Royal Victoria Regional Health Centre (RVH), ein Krankenhaus etwa 100 km nördlich von Toronto in zentraler Lage von Ontario in Kanada, bietet eine schnelle Gesundheitsversorgung für mehr als 450.000 Bewohner in einem großen Gebiet. Das RVH-Team besteht aus mehr als 380 Ärzten, 2.500 Mitarbeitern und 850 ehrenamtlichen Helfern und bietet ein außergewöhnliches Gesundheitsangebot und spezielle Dienstleistungen. Dazu zählen Krebsbehandlung, Behandlung von Schlaganfällen, Orthopädie, Intensivmedizin, psychiatrische Versorgung und interventionelle Radiologie. Neben der Akutversorgungseinrichtung in Barrie mit 319 Betten stellt das RVH auch die MEDITECH EHR-Plattform (Electronic Health Records) für mehrere andere Krankenhäuser in Midland, Orangeville und Collingwood bereit.
Tags : 
    
Dell PC Lifecycle
Published By: Oracle     Published Date: Feb 16, 2018
Les avancées du numérique révolutionnent la manière dont nous travaillons, en apportant des innovations de façon permanente dans notre quotidien de travail. Ces technologies très prisées ont renforcé les attentes, obligeant les organisations à développer l'agilité métier à des niveaux sans précédent. Même si les opportunités annoncées sont prometteuses, nous sommes confrontés à de nouveaux freins qui peuvent faire obstacle à la réussite, comme la nécessité d'innover rapidement, de minimiser les coûts et de répondre rapidement aux pressions exercées par la concurrence.
Tags : 
guide, pour, approche, integree, enjeux, oracle
    
Oracle
Published By: Workday France     Published Date: Mar 08, 2018
Les Centres de Services Partagés Ressources Humaines (CSP RH) n’ont rien de nouveau. Selon un récent article du site HR Magazine1, les trois quarts des sociétés figurant au classement Fortune 500 font appel à des services partagés pour une ou plusieurs de leurs fonctions transverses. Un récent rapport de PWC2 indique quant à lui que 89 % des sociétés qui utilisent des services partagés RH ont atteint leurs objectifs initiaux en termes d’économies d’échelle.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Feb 04, 2019
L'étude « Tendances RH 2018 » de Deloitte met en évidence de nombreuses tendances liées au resssenti des salariés et des employeurs. Découvrez les points clés de cette étude et les 3 étapes que les entreprises émergentes doivent suivre pour attirer et fidéliser les meilleurs talents.
Tags : 
    
Workday France
Published By: Dell Server     Published Date: Aug 08, 2018
PowerEdge servers protect your customers and business with integrated security Analysts say attacks on firmware are becoming a greater threat to systems, making a cyber-resilient server architecture essential to the modern data center. Dell EMC PowerEdge servers, powered by Intel® Xeon® Scalable processors, deliver comprehensive management tools and robust layers of security to protect hardware and firmware throughout the server lifecycle.
Tags : 
    
Dell Server
Published By: Dell Server     Published Date: Aug 17, 2018
For those struggling to convince their leadership to adopt software defined storage (SDS), this eBook from Dell EMC can help you make the case. We’ve gathered 5 ways server technology is advancing software-defined storage adoption, making it easier for businesses to implement SDS in the modern data center. The biggest misconception about SDS is that the underlying hardware is not important. It’s true, many of the features and performance enhancements are now provided by software.1 But, if you thought the hardware provider doesn’t matter when implementing an SDS solution, think again. We’ll show you why.
Tags : 
    
Dell Server
Published By: Dell EMC     Published Date: Aug 23, 2018
“3D-designverktyg har visserligen funnits ett tag, men nu när VR har nått konsumenterna får vi tillgång till visualiseringsalternativ i aldrig tidigare skådad takt. Visualiseringen har utvecklats till en nivå som gör det möjligt för formgivare att framställa fotorealistiska bilder av produkter i naturliga miljöer snabbare och med större precision. Detta ger ännu kortare ledtid och gör att kunderna själva kan uppleva produkten, utan de vanliga kostnaderna för att skapa prototyper och modeller. Den här handboken ger en översikt av den senaste utvecklingen inom visualisering och presenterar våra nya VR Centres of Excellence i Limerick, Cork, Paris, Frankfurt, Dubai, Santa Clara och Austin, där du kan få uppleva alla fördelar själv.” Rahul Tikoo VD för Dell Precision
Tags : 
    
Dell EMC
Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this inforgraphic, we are going to show you the possibilities with modernised, optimized data infrastructure. In doing so, we aim to bring you ideas about how you can bring your own data-driven business vision to life, focusing on the outcomes that matter most to you. In essence, we will be discussing five main industries and the possibilities for modernized data infrastructure. We will be displaying how Banking and Financial Services, Telecommunications, manufacturing, healthcare and retail can use data, analytics and automation to optimize their business, therefore bringing about a competitive edge which previous appeared unimaginable. Using data correctly, most importantly building proper data infrastructures, can be the driving force behind obtaining a competitive edge. Data is your story. And it’s our story, too.
Tags : 
digital transformation, data infrastructure, data optimisation
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Aug 13, 2018
In this inforgraphic, we are going to show you the possibilities with modernised, optimized data infrastructure. In doing so, we aim to bring you ideas about how you can bring your own data-driven business vision to life, focusing on the outcomes that matter most to you. In essence, we will be discussing five main industries and the possibilities for modernized data infrastructure. We will be displaying how Banking and Financial Services, Telecommunications, manufacturing, healthcare and retail can use data, analytics and automation to optimize their business, therefore bringing about a competitive edge which previous appeared unimaginable. Using data correctly, most importantly building proper data infrastructures, can be the driving force behind obtaining a competitive edge. Data is your story. And it’s our story, too.
Tags : 
    
Hitachi Vantara
Published By: Carbon Black     Published Date: Apr 10, 2018
A dversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Published By: Bluecore     Published Date: May 14, 2018
It’s easy to think of June as the calm before the retail storm of the back to school season, but it actually offers a lucrative opportunity to attract consumers shopping for the dads and grads in their lives. And while it might not be the biggest of retail spending holidays, the $21.1 billion consumers spent on Father’s Day and graduations in 2017 indicates that celebrating dads and grads is no joke. So what can you do to knock it out of the park this June? We’ve got your back with a special Dads & Grads edition of our Rethinking Retail Playbook, featuring five ideas to help you drive more revenue and increase stickiness with shoppers. Here’s what it takes.
Tags : 
    
Bluecore
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 31, 2018
Predictive analytics, sometimes called advanced analytics, is a term used to describe a range of analytical and statistical techniques to predict future actions or behaviors. In business, predictive analytics are used to make proactive decisions and determine actions, by using statistical models to discover patterns in historical and transactional data to uncover likely risks and opportunities. Predictive analytics incorporates a range of activities which we will explore in this paper, including data access, exploratory data analysis and visualization, developing assumptions and data models, applying predictive models, then estimating and/or predicting future outcomes. Download now to read on.
Tags : 
    
TIBCO Software
Published By: KPMG     Published Date: Sep 20, 2018
Our client had grown significantly over the years through organic and inorganic growth which had expanded its global footprint and service offerings. We deliver results that matter.
Tags : 
kpmg, business transformation
    
KPMG
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
• Transforming your content by making it accessible in the cloud is the first step to digital transformation. Where are you on this journey? • No matter where you are, there is always room to grow. It's not just about where you want to end up but how you'll get there and which tools you'll use. Read the latest AIIM report that lays out a comprehensive strategy to help get you there. • Download the full report, AIIM 2017 State of Information: Are Businesses Digitally Transforming or Stuck in Neutral?
Tags : 
    
Box
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: PGi     Published Date: Oct 01, 2018
Einfach ausgedrückt, BE ist das, was jemand fühlt, wenn er mit einer Lösung, Plattform oder einem Gerät interagiert. Die Benutzeroberfläche (BO) umfasst alle visuellen Elemente, die Sie zur Interaktion mit einer Lösung, Plattform oder einem Gerät verwenden. Dies beinhaltet alles von den Bildschirmen bis zu den Seiten — sogar die Schaltflächen und Symbole, die Sie anklicken.
Tags : 
    
PGi
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Start   Previous    151 152 153 154 155 156 157 158 159 160 161 162 163 164 165    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.