dam

Results 76 - 100 of 921Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Para lograr la agilidad y generar un impacto real en la transformación comercial, se debe adoptar la modernización del centro de datos como una competencia principal. Es crucial tener la infraestructura de TI más actualizada para ser compatible con la escala y la complejidad de un panorama de tecnología cambiante. Las empresas deben incorporar este imperativo mediante la adopción de los principios del centro de datos definido por software y la modernización, además de la automatización de sus procesos de gestión de TI. Quienes lo hagan, impulsarán la innovación del negocio y ofrecerán experiencias de cliente superiores con una tecnología empresarial rápida, segura y confiable. En diciembre de 2018, Dell Technologies encargó a Forrester Consulting la evaluación del valor comercial de infraestructuras modernas en centros de datos empresariales. Forrester realizó una encuesta en línea a 508 tomadores de decisiones tecnológicas de infraestructura de TI en empresas en siete países para expl
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Damit die für eine Business-Transformation erforderliche Flexibilität erreicht werden kann, muss die Modernisierung des Rechenzentrums als Kernkompetenz wahrgenommen werden. Voraussetzung hierfür ist eine hochmoderne IT-Infrastruktur, die das Ausmaß und die Komplexität einer sich wandelnden Technologielandschaft unterstützen kann. Unternehmen müssen diese Notwendigkeit erfüllen, indem sie die SDDC-Prinzipien (Software-Defined-Datacenter) übernehmen, auf Modernisierung setzen und ihre IT-Managementprozesse automatisieren. Alle, die dies beherzigen, können mit schneller, sicherer und zuverlässiger Unternehmenstechnologie geschäftliche Innovationen voranbringen und überragende Kundenerfahrungen bieten. Im Dezember 2018 beauftragte Dell Technologies Forrester Consulting mit der Bewertung des geschäftlichen Nutzens einer modernen Infrastruktur in den Rechenzentren von Unternehmen. Forrester führte eine Onlineumfrage unter 508 für die IT-Infrastrukturtechnologie zuständigen Entscheidungsträg
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Le aziende che stanno intraprendendo percorsi di Digital Transformation (DX) si stanno orientando verso nuovi modelli di business in cui i dati sono considerati un asset strategico fondamentale per potenziare le applicazioni e guidare le decisioni di business. A tale scopo, è necessario trasformare i dati raccolti e gestiti dalle aziende in una risorsa preziosa denominata "capitale dei dati". L'infrastruttura IT e i workload tradizionali non sono concepiti per facilitare la creazione del "capitale dei dati". La portata dei dati che devono essere acquisiti, archiviati, protetti e resi disponibili per l'utilizzo e la necessità di applicazioni di nuova generazione (NGA - Next-Generation Application) che i dipartimenti IT sviluppano per promuovere la creazione del capitale dei dati vanno oltre le capacità dell'infrastruttura tradizionale in termini di prestazioni, scalabilità, disponibilità, flessibilità e gestibilità. Per soddisfare questi requisiti più rigorosi, la maggior parte delle az
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Hardwaretechnologie kann nicht endlos genutzt werden. Sie hat einen Lebenszyklus mit einem messbaren Beginn und Ende von Produktivität und Nutzen. Die IT verfolgt die Aufgabe, den PC-Lebenszyklus zu optimieren und gleichzeitig für ihr Unternehmen einen strategischen Durchbruch zu erzielen. Aufgrund der Kosten und Komplexität des PC-Managements bleibt der IT jedoch nur wenig Zeit für Innovationen. Wir bieten flexible Finanzierungsoptionen, die dafür sorgen, dass der IT-Abteilung alle erforderlichen Ressourcen zum richtigen Zeitpunkt zur Verfügung stehen, damit die Endnutzer beschäftigt und produktiv sind. Erfahren Sie mehr über Dell Lösungen mit Intel® Technologie.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Da die Mobilität von Mitarbeitern weltweit zunimmt und Unternehmen mehr in Tablet- und Laptop-PCs investieren, überdenken Organisationen ihre laufenden Investitionen in traditionelle PCs. Dennoch schätzen Einkäufer von Unternehmens-PCs nach wie vor die Sicherheit und Leistung von Desktop-Computing-Lösungen. Ihrer Meinung nach helfen neue Formfaktoren wie Mikro-PCs dabei, die Produktivität von Mitarbeitern zu steigern und ein angenehmes technisches Arbeitsumfeld zu schaffen, dass Ihnen mindestens so wichtig wie eine hohe Sicherheit ist. Dell beauftragte Forrester Consulting mit der Durchführung einer kundenspezifischen Studie mit 103 Entscheidungsträgern und Influencern aus den Bereichen Business und IT-PC in Nordamerika. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivitätstool für Mitarbeiter. IT-Führungskräfte müssen das PC-Management über den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer möglichst effektiv arbeiten können. Heute gehen IT-Führungskräfte den PC-Lebenszyklus über ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, während der Schwerpunkt der Transformation auf den geschäftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: May 08, 2019
Quanto tempo è necessario al tuo team IT per fornire ai dipendenti un batch di cinque notebook con provisioning completo? E per cento notebook? Per mille? A seconda delle dimensioni del tuo ordine, il tempo necessario per configurare manualmente questi dispositivi, combinato con la logistica di spedizione, potrebbe significare giorni o settimane di ritardi per il tuo utente finale. Dell Provisioning per VMware Workspace ONE® è in grado di risolvere questo problema con un intervento minimo da parte dell'IT.
Tags : 
    
Dell EMC EMEA
Published By: 3D Systems     Published Date: Feb 28, 2019
La stampa 3D è emersa come tecnologia di prototipazione negli anni '80 e da allora si è rapidamente evoluta. I continui sviluppi degli ultimi decenni hanno trasformato la stampa 3D, chiamata anche produzione additiva, in una tecnologia efficace ed economicamente conveniente all'interno dell'ambiente manifatturiero: la stampa 3D dà accesso alla prototipazione, all'abilitazione della produzione e alla produzione 3D diretta. Le aziende che utilizzano la stampa 3D possono ottenere e consolidare una posizione di vertice nel settore grazie ai progressi in termini di tempo, costi e capacità resi possibili dalla stampa 3D. In questo ebook viene fornita una panoramica della tecnologia di stampa 3D in plastica e dei progressi compiuti nell'ambito dei materiali da 3D Systems. Si estende così la gamma delle applicazioni di produzione.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
La stampa 3D in metallo sta rivoluzionando il processo di produzione. Forme complesse, proprietà funzionali migliorate e leggerezza sono alcuni dei vantaggi unici offerti dalla produzione additiva (PA). Sebbene vi sia una grande ricchezza di informazioni sulle tecniche di stampa, sui materiali e sull'hardware, un elemento critico che viene raramente menzionato è l'esigenza di una soluzione di software integrata per la produzione additiva in metallo. Non bastano un modello CAD 3D e una valida stampante per ottenere stampe di alta qualità. Il software di PA in metallo gestisce tutte le azioni di preparazione e ottimizzazione richieste per ottenere una parte stampata in grado di soddisfare le specifiche relative al modello CAD. Questo eBook offre una panoramica del processo di preparazione e ottimizzazione per la Produzione Additiva, spiegando l'importanza del software per la redditività di qualunque attività di produzione additiva. Suggerisce inoltre gli aspetti fondamentali di una soluz
Tags : 
    
3D Systems
Published By: Samsung     Published Date: Jun 20, 2019
Amongst the vast range of trends disrupting the workplace, we are seeing a significant change in the behaviours and expectations around an organisation’s most fundamental asset: its people. As organisations innovate every aspect of their workspace, the future requires them to rethink and redesign the way their employees engage, collaborate and be productive. Download this whitepaper to find out how Samsung Corporate Display Solutions can help your organisation transform.
Tags : 
samsung, corporate display solutions, workplace transformation
    
Samsung
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Para 2030, se espera que el mercado de la energía eólica marina ascienda a 30.000 millones de libras esterlinas al año. Dando un salto en el tiempo hasta 2050, se prevé que la industria contribuya como mínimo a un tercio del suministro total de electricidad a nivel mundial. Si bien esto es una gran noticia para las empresas de generación de energía, investigaciones recientes han demostrado que los costes asociados con el mantenimiento de los parques eólicos se duplicarán entre 2015 y 2020. Para asegurar su lugar en el futuro panorama energético, proteger el valor y la producción de las turbinas eólicas mediante un mantenimiento eficaz será fundamental para lograr una ventaja competitiva. Hay pasos que se pueden tomar ahora para reducir los costes de mantenimiento hoy y mantenerlos más bajos en el futuro. Shell Omala S5 Wind 320 - aceite sintético avanzado para engranajes de turbinas eólicas que puede ayudar a asegurar que sus turbinas eólicas trabajen más duro durante más tiempo, i
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Es wird erwartet, dass der Offshore-Windenergie-Markt im Jahr 2030 jährlich 30 Milliarden Britische Pfund Wert sein wird. Schauen wir in das Jahr 2050, so wird die Windbranche dann mindestens ein Drittel der globalen Stromversorgung abdecken. Während das für die Stormerzeuger gute Nachrichten sind, zeigt sich aber auch, dass sich die mit der Wartung von Windfarmen einhergehenden Kosten zwischen 2015 und 2020 verdoppeln werden. Damit sich die Windturbinen ihren Platz im Energiemix der Zukunft sichern können, wird es für das Erreichen eines Wettbewerbsvorteils entscheidend sein, ihren Wert und Output mittels effektiver Wartung langfristig zu erhalten. Es gibt Möglichkeiten, die schon heute unternommen werden können, um Wartungskosten zu verringern und in der Zukunft zu senken. Shell Omala S5 Wind 320 ist ein synthetisches Gertriebeöl das speziell für den Einsatz in Windturbinen entwickelt wurde und sie dabei unterstützt , dass Ihre Windturbinen auch unter rauesten Bedingungen län
Tags : 
    
Shell U.K. Limited
Published By: Box     Published Date: Jul 29, 2019
Den meisten CIOs ist heute bewusst, dass Initiativen zum digitalen Wandel dazu beitragen können, Geschäftsprozesse zu optimieren, die Ef?zienz zu steigern und die Wettbewerbsfähigkeit zu erhöhen. Auf lange Sicht initiieren sie dadurch die Modernisierung und Zukunftsorientierung des Unternehmens. Einige der laufenden Transformationsinitiativen – auch in vielen wachstumsstarken Unternehmen – haben mit der Problematik zu kämpfen, den explosionsartigen Anstieg von unstrukturierten Daten zu verwalten und den damit verbundenen höheren Compliance- und Sicherheitsanforderungen gerecht zu werden. Zum Glück können neue Lösungen, die künstliche Intelligenz (KI) einsetzen, nicht genutzte Informationen aus unstrukturierten Daten extrahieren, beispielsweise aus Dokumenten, Bildern, Videos und Audiodateien. KI trägt auch dazu bei, viele der zeitaufwendigen Prozesse zur Klassi?zierung, Organisation und Analyse unstrukturierter Daten zu automatisieren.
Tags : 
    
Box
Published By: Virgin Media Business     Published Date: Aug 05, 2019
The world is now digital. From the explosive expansion in data-driven service delivery to digitally disruptive business models such as Uber and Netflix that have fundamentally changed the way we consume products, the digital evolution is unavoidable. As digital continues to advance, it’s crucial that UK businesses can be confident in their ability to keep up to date with the latest trends and technologies. But enhancing existing tools and models is just the beginning. Digital transformation is about taking advantage of new innovations that completely change the way businesses work, the experiences they offer their customers and the value they deliver within their market. To find out more download this whitepaper today.
Tags : 
    
Virgin Media Business
Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 17, 2016
Windows 10 is the OS of the future and fundamentally changes how PCs and other devices will be used and supported in organizations. However, with different support periods set by Microsoft for Windows 7, each IT and procurement organization need to evaluate what hardware and software combination will best support their workforce if they are not ready to move to Windows 10 right away. Even purchasing new PCs to take advantage of performance improvements and new form factors while downgrading the OS may not be an optimal strategy going forward.
Tags : 
dell, windows 7, procurement
    
Dell
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library