lite

Results 51 - 75 of 143Sort Results By: Published Date | Title | Company Name
Published By: HotSchedules     Published Date: Apr 25, 2018
Successful restaurants know just how important a solid inventory management process is to delivering a great product and experience. Even so, many restaurants today still struggle with ordering the right amount of inventory. Statistics show that restaurants waste about 10% of their food product, that’s money literally thrown in the trash! There’s only so much time in a manager’s day to manually deal with all of it. This ebook will explore the exciting new frontier of intelligent restaurant operating platforms, and how modern inventory management systems can make the process easier and more successful for your managers.
Tags : 
    
HotSchedules
Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Aug 30, 2018
At HP, we know that in retail and hospitality environments, customers expect a fast and simple way to find information or to complete a transaction. The physical point-of-sale experience must rise to meet the demands of retailers through high aesthetic value and peak performance. From an elegant hotel to a small boutique, a quick-service restaurant to an outdoor garden center—all of these locations require a point-of-sale device that meets specific needs while appealing to any user. My team at HP sought to elevate this experience by redefining the customer experience through a versatile, reliable, and beautiful point-of-sale system. For the new HP ElitePOS, we gained insights from everywhere—designers, technologists, retailers, and consumers—to create a product that is beautifully simple. It started as a sketch on a napkin, and is now part of an iconic portfolio that dissolves barriers during point-of-sale customer interactions.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Aug 31, 2018
o Hear from HP Retail Solutions VP and General Manager, Aaron Weiss on how innovative design and performance point-of-sale are merging to elevate the customer experience. A friendly, easy-to-use technology design is vital to the customer experience. Hardware that blends into its environment and is designed for customers to interact with, helps drive action and engagement. A slim, accessible device like the HP ElitePOS – powered by Intel® Core™ i5 processors – caters to the variety of needs that customers encounter throughout any retail experience.
Tags : 
    
HP Inc.
Published By: HP Software     Published Date: Feb 02, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
security, bios, threat prevention, threat detection, malware, hacking
    
HP Software
Published By: IBM     Published Date: May 25, 2016
Move your existing on-premises Java applications to the cloud by literally “lifting and shifting” your applications, unchanged, in minutes, with IBM WebSphere Application Server on Cloud.
Tags : 
ibm, middleware, application infrastructure, cloud, application, ibm websphere application server, enterprise applications, cloud computing
    
IBM
Published By: IBM APAC     Published Date: Jun 24, 2019
Every organization strives for more cyber resilience. The Ponemon Institute’s fourth annual study on “The Cyber Resilient Organization” uncovered that there is a set of habits or practices that the most cyber resilient organizations undertake to achieve greater states of cyber resilience. Download this report to review the key findings; including: • The impact of the skills gap • How complexity can be the enemy of cyber resilience • Lessons learned from high achieving cyber resilient organisations • The importance of incorporating the privacy function in your strategy. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: Jun 24, 2019
Your security products send alerts when a cyber attack strikes. Your incident response plan tells you what to do to block the attacker’s action and recover normal operations. But do you know how or where the attacker was able to get into your environment? Do you understand the tactics, techniques and procedures the attacker used? In short, to move to the next level of security, organizations need a way to both understand and manage threat intelligence. Because an organization that can uncover the context of a threat can also better respond to it. Learn more about the impact of security threats from this whitepaper. Join the IBM Security online community to learn from the shared knowledge and experiences of your peers and IBM Cyber Elites to tackle complex business problems.
Tags : 
    
IBM APAC
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
Flexible and quick fulfillment of online orders has become a differentiator for retailers in the battle for omnichannel customers. But omnichannel fulfillment is expensive and difficult to execute, eroding already thin margins and exposing fragile fulfillment systems. Furthermore, the amount of data that must be processed to ensure the most profitable transaction is more than a fulfillment professional can handle alone, with literally hundreds of decision points to consider.
Tags : 
omni channel, fulfillment, system, retailers, online orders, ibm
    
IBM UK&Ireland
Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect
Published By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : 
voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone
    
iDirect
Published By: iDirect     Published Date: Sep 27, 2011
Discover how satellite IP communications can extend broadband communications anywhere, and meet today's demand for constant connectivity.
Tags : 
idirect, satellite technology, satellite hubs, satellite line cards, satellite routers, vsat satellite solutions, satellite communications, evolution routers
    
iDirect
Published By: iDirect     Published Date: Sep 27, 2011
Understand your options with this must-have list of criteria that can help ensure the success of your satellite deployment.
Tags : 
idirect, satellite technology, satellite hubs, satellite line cards, satellite routers, vsat satellite solutions, satellite communications, evolution routers
    
iDirect
Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies, wireless application software, wireless communications, wireless service providers
    
iDirect
Published By: iDirect     Published Date: Oct 13, 2011
Find out why utilities are expanding their use of satellite communications to provide reliable, intelligent connectivity to remote locations-and how it can work in your organization. Download the report.
Tags : 
idirect, pike research, technology, satellite, smart grid, communications, grid applications, wireless application software
    
iDirect
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Maintenant que les données sont devenues un levier de business et aussi un vecteur d’avantage compétitif, la disponibilité permanente des données, Always On, se pose en exigence stratégique attendue de l’organisation IT. Confrontées à plusieurs points de défaillance potentiels, les organisations IT s’eff orcent depuis des années de concevoir leur infrastructure de données de façon à tenir l’objectif Always On, ce qui induit des coûts élevés et une certaine complexité. Pour qu’une solution soit toujours Always On, elle doit avoir un objectif de point de reprise RPO (Recovery Point Objective) de 0 et un objectif de temps de reprise RTO (Recovery Time Objective) de 0. Mais ces conditions certes élémentaires d’une solution Always On ne sont en aucun cas suffi santes.
Tags : 
    
Infinidat EMEA
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infor     Published Date: Mar 03, 2017
It is the best of times and the worst of times for elite finance professionals in mid- to largesized organizations. With demands for more information, faster, going nowhere but up, and finance departments playing an increasingly strategic role in determining business direction, CFOs, Controllers and their staffs are finding themselves intellectually stimulated and exhausted in equal measure.
Tags : 
finance, cfo, finance process, data analysis, risk management
    
Infor
Published By: Intercom     Published Date: Oct 08, 2015
An effective messaging strategy means targeting the right users with the right message at the right time and place. Failing to do so leads to customers mentally, or literally, unsubscribing from you. From the makers of Intercom, a customer communications platform, this book teaches you how to increase customer engagement in three ways: 1. Define the audience for your message by segmenting users according to behavior and action. 2. Craft a message for maximum impact; what voice, tone, format, and language to use. 3. Discern the right way and the right time for a message and know what you can do to ensure it is received in the most appropriate setting and in the most appropriate context.
Tags : 
customer onboarding software, user engagement, in-product communication, in-product messaging, onboarding software, customer engagement software
    
Intercom
Published By: Juniper Networks     Published Date: Oct 19, 2015
À l'heure où les charges de travail des applications sont redéfinies, les data centers doivent évoluer. Ce livre blanc IDC étudie comment l'orchestration et l'automatisation des réseaux peuvent faciliter cette transition en créant des réseaux plus simples et plus flexibles.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jan 11, 2016
À l'heure où les charges de travail des applications sont redéfinies, les data centers doivent évoluer. Ce livre blanc IDC étudie comment l'orchestration et l'automatisation des réseaux peuvent faciliter cette transition en créant des réseaux plus simples et plus flexibles.
Tags : 
    
Juniper Networks
Published By: Lenovo UK     Published Date: Oct 15, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core ™ i7 vPro ™ -processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Nov 09, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Start   Previous    1 2 3 4 5 6    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.