fte

Results 151 - 175 of 1870Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Das IT-Marktforschungsunternehmen IDC hat eine globale Studie unter mehr als 3 500 IT-Führungskräften auf der ganzen Welt durchgeführt und fand heraus, dass Unternehmen jeder Größenordnung PC Life Style as a Service-Modelle zur Reduzierung der Kosten, Verkürzung von Aktualisierungszyklen und zur Beschaffung besserer Technologie für ihre Mitarbeiter in Erwägung ziehen. Dell PC as a Service (PCaaS) vereint Hardware, Software, Lebenszyklusservices und Finanzierung in einer umfassenden Lösung, die einen einzelnen, vorhersehbaren Preis pro Arbeitsplatz pro Monat bietet und von Dell Financial Services bereitgestellt wird. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 26, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Zowel publieke als particuliere organisaties erkennen dat het levenscyclusbeheer van de pc ingewikkelder en duurder wordt naarmate de verscheidenheid van pc-apparaten en werkstijlen van werknemers toeneemt. Om optimaal productief te zijn hebben verschillende groepen medewerkers verschillende behoeften op het gebied van hardware, software en configuratie voor eindgebruikers. Terwijl IT-afdelingen een breder scala aan technologie voor een steeds meer verspreid en mobieler personeel willen bieden en ondersteunen, met behoud van zo min mogelijk verstoring voor de eindgebruiker, moeten ze ook aan de kosten denken. Het consolideren van processen en het inroepen van de hulp van een leverancier, zoals Dell, kan de kosten verminderen en expertise bieden voor betere werking van pc-levenscyclusbeheer. Download deze whitepaper voor meer informatie over Dell oplossingen met Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivitätstool für Mitarbeiter. IT-Führungskräfte müssen das PC-Management über den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer möglichst effektiv arbeiten können. Heute gehen IT-Führungskräfte den PC-Lebenszyklus über ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, während der Schwerpunkt der Transformation auf den geschäftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
    
Dell EMC EMEA
Published By: Oracle     Published Date: Dec 21, 2018
After talking to 27 leading CFOs, the Economist Intelligence Unit finds that the finance team’s data analytics skills put the CFO in the driving seat of digital change.The result is that the CFO has a new responsibility to: • Help other business units meet their digital ambitions•Make relevant data visible across the business• Develop goals and metrics for digital success
Tags : 
    
Oracle
Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck begann als Prototyping-Technologie in den 1980er Jahren und hat sich seitdem rasant weiterentwickelt. Die stetigen Entwicklungen der letzten Jahrzehnte haben den 3D-Druck (auch als „Additive Fertigung“ bezeichnet) in der gesamten Produktionsumgebung zu einer praktikablen und kostengünstigen Technologie werden lassen: von der Prototypenentwicklung bis hin zur 3D-Direktherstellung. Unternehmen, die den 3D-Druck nutzen, können aufgrund der Fortschritte bei Dauer, Kosten und Fähigkeiten, die der 3D-Druck ermöglicht, eine Führungsposition in ihrer Branche erreichen und festigen. Dieses E-Book gibt einen Überblick über die Weiterentwicklungen bei den 3D-Drucktechnologien und Materialien von 3D Systems im Bereich der additiven Kunststofffertigung, die die Bandbreite der Einsatzmöglichkeiten in der Produktionsanwendung vergrößern.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck mit Metall revolutioniert den Fertigungsprozess. Komplexe Formen, verbesserte Funktionseigenschaften und Gewichtseinsparung sind einige der einzigartigen Vorteile der additiven Fertigung (Additive Manufacturing, AM). Es gibt eine Menge Informationen über Drucktechniken, Materialien und Hardware. Ein wichtiges Element wird jedoch eher selten betrachtet: Die Notwendigkeit einer integrierten Softwarelösung für die additive Metallfertigung. Es braucht mehr als ein 3D-CAD-Modell und einen guten Drucker, um erfolgreich zu drucken. Die Software für die additive Metallfertigung übernimmt alle Vorbereitungs- und Optimierungsschritte, die zur Umsetzung der gewünschten CAD-Modellspezifikationen erforderlich sind. Dieses eBook gibt einen Überblick über den Vorbereitungs- und Optimierungsprozess für die additive Fertigung. Es erklärt, wie wichtig die Software für die Rentabilität eines Unternehmens ist, das in der additiven Fertigung tätig ist. Es zeigt außerdem, worauf man bei der Aus
Tags : 
    
3D Systems
Published By: Lenovo UK     Published Date: May 15, 2019
Die zunehmende Mobilität verursacht für IT-Teams überall Kopfschmerzen mit dem Potenzial für erhöhte Kosten und Risiken. Mit ThinkPad, das auf Intel® Core™ i7 vPro™ Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlässige Haltbarkeit und uneingeschränkte Produktivität für jedes einzelne Gerät. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core™ i7 vPro™ Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Lenovo UK     Published Date: May 15, 2019
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: HP Inc.     Published Date: May 21, 2019
Sinds het begin van het digitale tijdperk verandert de wereld om ons heen sneller dan ooit en zien we een transformatie van sociale interacties, menselijk gedrag en verwachtingen. Om in een dergelijke omgeving succesvol te zijn, moeten merken hun doelgroep exact bieden wat zij willen, wanneer zij dit willen en de beloften van hun merk waarmaken.
Tags : 
    
HP Inc.
Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe
Published By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
    
Limelight Network
Published By: Limelight Network     Published Date: Aug 12, 2019
Many companies that need to deliver content online at scale use Content Delivery Networks (CDNs) to improve performance. However, even with a reliable CDN, there can be issues with service quality in different regions, insufficient capacity during peak periods, and lack of resiliency and diversification. To address these concerns, some companies distribute their delivery load across more than one CDN, a concept often called a multi-CDN implementation. In this paper, we’ll explore frequently-asked questions and best practices for implementing multi-CDN workflows based on extensive experience.
Tags : 
    
Limelight Network
Published By: IBM APAC     Published Date: Nov 22, 2017
AlchemyAPI’s approach to natural language processing incorporates both linguistic and statistical analysis techniques into a single unified system. This hybrid approach provides an industry-leading advantage since both techniques have benefits and drawbacks depending on the content and specific usecases. Linguistic analysis takes a basic grammatical approach to understand how words combine into phrases, and how those phrases combine into sentences. While this approach works well with editorialized text (e.g., news articles and press releases), it does not perform as well when it comes to usergenerated content, often filled with slang, misspellings and idioms. Statistical analysis, however, understands language from a mathematical standpoint and works well on “noisy” content (e.g., tweets, blog posts, and Facebook status updates). The combination of these two approaches allows for increased accuracy on a variety of content.
Tags : 
industry, advantage, linguistic, grammatical, statistical analysis, content
    
IBM APAC
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Nov 02, 2015
Remote offices, branch offices and small businesses have dramatically stepped up their adoption of new technology to help them run everything from typical business applications to cutting-edge solutions that differentiate their organizations. But that rapid run-up in new technology deployments has often come with a cost: increased infrastructure complexity that has become harder and more expensive to manage.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 02, 2015
Converged solutions are being widely adopted by large enterprises where infrastructure sprawl has chewed up budgets and made scalability a challenge, and as a method to speed delivery of IT services. They are also proving to be beneficial to IT-strapped small and mid-sized organizations, which often lack the skills and resources to keep up with increased business demands for IT services.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 08, 2015
Big data can be observed, in a real sense, by computers processing it and often by humans reviewing visualizations created from it. In the past, humans had to reduce the data, often using techniques of statistical sampling, to be able to make sense of it. Now, new big data processing techniques will help us make sense of it without traditional reduction.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library