information age

Results 151 - 175 of 1183Sort Results By: Published Date | Title | Company Name
Published By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant
Tags : 
emc documentum capital projects, document management, share information, share documents
    
EMC
Published By: SolidFire_NetApp     Published Date: May 10, 2016
This document includes general information about the Pure Storage architecture as it compares to SolidFire. Not intended to be exhaustive, it covers architectural elements where the solutions differ and impact overall suitability for the needs of the Next Generation Data Center (NGDC).
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence
    
SolidFire_NetApp
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Read how Real-time Compression can impact your environment in the ESG Lab Validation Report.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report examines an innovative high speed data compression appliance from IBM.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Take a look at this flier for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : 
ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse the data-sheet for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse this summary for additional information about performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers.
Tags : 
ibm uk, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering
    
Ogilvy - IBM UK
Published By: Senn Delaney     Published Date: Aug 21, 2008
Through a collaborative, groundbreaking study with three prominent U.S. business schools, Senn Delaney has discovered that people who operate from a unique set of three core principles consistently perform at the top 10 percent of performance ratings. The joint study and subsequent research and surveys led to creation of our new, evidence-based, practical performance model that can be taught, practiced, reinforced, applied and measured.
Tags : 
senn delaney, global information, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Savvis UK Limited     Published Date: Sep 06, 2012
Information technology is an essential vehicle for the delivery of well-organised, cost-effective public services that respond to the needs of citizens and business.
Tags : 
iaas, infrastructure-as-a-service, government, it solutions, information technology, colocation, managed hosting, dedicated cloud
    
Savvis UK Limited
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Dell Storage     Published Date: Apr 23, 2012
This solution guide describes the Dell HTSS which integrates PV DL2200 running CV Simpana 9 Data & Information Management Software with the Dell NSS and PowerVault ML6000 Tape Libraries to provide a multi-tiered Hierarchical Storage Management system
Tags : 
storage, nas, object storage, tco, dell, long term archive, strategy, cost of ownership
    
Dell Storage
Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security
    
Voltage Security
Published By: GE Healthcare     Published Date: May 12, 2015
An effective cardiovascular IT system is a must-have, not a nice-to-have for cardiologists and cardiovascular clinicians to provide optimal care and help improve critical outcomes.
Tags : 
cardiovascular it system, diagnostic images, web-enabled information technology, cardiovascular information system, cvis software, cvpacs, cardiovascular informatics, cardiovascular image software
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, cardiovascular information system, cvis software, cvpacs, cardiovascular informatics
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Ongoing IT system improvements are required for cardiologists and cardiovascular clinicians to enhance the overall quality of care experience.
Tags : 
cardiovascular care, patient data software management, cost containment, secure data integration, analytics, workflow, productivity, billing
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Streamline patient-centered cardiovascular diagnostic workflow with a definitive imaging strategy.
Tags : 
cardiovascular diagnostics, cardiac care, imaging solution, workflow, optimization, cardiovascular information system, cvis software, cvpacs
    
GE Healthcare
Published By: Mimecast     Published Date: Oct 02, 2018
Informationen zur aktuellen Bedrohungslage, zu fehleranfälligen Schutzmechanismen und zu menschlichem Versagen –und wie eine Cyber Resilience Strategie Sie vor Cyber Angriffen schützt.
Tags : 
    
Mimecast
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: CA Technologies     Published Date: Aug 22, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library