design

Results 126 - 150 of 1998Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19
Published By: Schneider Electric     Published Date: Jun 07, 2019
Implementing prefabricated modular data centers results in well-understood benefits including speed of deployment, predictability, scalability, and lifecycle cost. The process of deploying them – from designing the data center, to preparing the site, to procuring the equipment, to installation – is quite different than that of a traditional data center. This paper presents practical considerations, guidance, and results that a data center manager should expect from such a deployment.
Tags : 
predictability, scalability, life cycle cost, schneider electric, - prefabricated data center, modular data center, data center design, data center manager
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Forcepoint     Published Date: Jun 06, 2019
Cost, speed, and reliability are all important to consider when designing a network, but balancing all three is no easy task. As your organization expands, you need a resilient, fast, and secure network—especially in large, distributed environments. And it needs to be affordable. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: KPMG     Published Date: Jun 06, 2019
As organisations transform to become customer-centric, connected enterprises, the IT operating model needs to transform too. Find out the advantage of a market-speed model. Read this briefing to discover: • what the key elements of a market-speed organisation are • how to design a new market-speed IT operating model • six priority actions to prepare the IT function for the shift.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: Staples     Published Date: Jun 04, 2019
Less than 20% of employees feel their workspace is “well designed” for employee needs. Watch this short video to learn how you can develop a workplace strategy that fits your unique organization.
Tags : 
    
Staples
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology conglomerate had to renew the current data center agreement, also it was no longer strategic to maintain their own hardware. LTI partnered with Oracle and helped in designing and executing the migration plan that would ensure Zero business disruption without stringent timeline. LTI leveraged a toolkit built by its in-house, dedicated Oracle Innovation and Solution Center (OISC) to help ensure an error-free migration. Benefits i. $1 M Overall Cost saving ii. 40% reduced TAT Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Instructure     Published Date: May 30, 2019
The Future of Work: 10 Essentials for Winning Employee Development Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. That’s four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everything—from recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do ex
Tags : 
    
Instructure
Published By: HP Inc.     Published Date: May 29, 2019
With a couple of swipes, a like and a share, what’s in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fast- spreading global pop culture that determines what’s hot, and what’s not, almost instantly. In such a connected world, keeping pace with the right look and feel is essential. While a picture was once worth a thousand words, it’s now worth much more. If you don’t want your audience to bounce, basic is not enough.
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: May 29, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Cisco     Published Date: May 24, 2019
Your network is the foundation to build digital capabilities. Deliver wired, wireless and SD-WAN connectivity with full network intelligence that leads to immersive user experience, simplified operations, and fastest breach detection. Cisco’s next-generation Secure Network solutions are designed for business of all sizes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 24, 2019
Mobile Global Workforce is predicted to surge to 1.87 billion by 2022. Be prepared for the wireless expansion with Mobility Express. Cisco’s Mobility Express* is designed for small businesses that want a controllerless solution with Wi-Fi management functions embedded in the Cisco Aironet® access point itself. Offering SMB’s Cisco’s industry-leading enterprise capabilities at a fraction of the enterprise cost.
Tags : 
    
Cisco
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Epicor     Published Date: May 21, 2019
In their report, “Magic Quadrant for Cloud ERP for Product-Centric Midsize Enterprises,” ¹ Gartner recognized Epicor as a Visionary in the cloud ERP marketplace. Additionally, Epicor scored highest in the ERP Functionality use case in Gartner's critical capabilities report. ² We believe Gartner’s positioning of Epicor ERP reflects our focus on providing solutions that fit manufacturing businesses to drive growth with greater ease. Read the report from Gartner to learn more. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GART
Tags : 
cloud, erp, magic quadrant, visionary, epicor
    
Epicor
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
A key benefit of an SD-WAN is that you need not replace any part of your existing network. SDWAN simplifies your overall network architecture and management, and can be phased in as a parallel, overlay network. Sites are migrated in phases based on their type, location or any other sequence of priority you may have. This paper covers the migration design thought process, routing considerations, and a step-by-step migration path to insert your traditional WAN sites into an SD-WAN architecture.
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Over the last couple of years SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management. To ensure an understanding of the fundamental concepts, let’s quickly discuss the architecture and components of SD-WAN, and then move on to cover the best practices of various aspects of an SD-WAN migration
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
Leading multinational corporation and technology company wanted to simplify, streamline and automate their highly complex & business-critical processes, and improve SLA compliance. LTI provided 24x7 support with distributed teams across the onsite/offshore locations. Our Design-Thinking-led approach for the next-generation platform, using Altassian Jira, helped connect the client’s multiple systems through microservice integration patterns. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: HP Inc.     Published Date: May 21, 2019
Dans un monde éphémère de swipes, de likes et de shares, ce qui existe aujourd'hui aura disparu demain. Les tendances du design graphique évoluent rapidement pour suivre une culture pop mondiale qui se répand à grande vitesse et qui détermine ce qui est à la mode et ce qui ne l'est pas quasi instantanément.
Tags : 
    
HP Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library