net

Results 426 - 450 of 7724Sort Results By: Published Date | Title | Company Name

Accelerating the Artificial Intelligence Journey with Dell EMC Ready Solution for AI

Published By: Dell EMC Storage     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
    
Dell EMC Storage

Effektive Generierung von Datenkapital erfordert eine skalierbare, flexible Data-Storage- und Data-P

Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Unternehmen, die sich einer digitalen Transformation (DX) unterziehen, wechseln zu neuen Geschäftsmodellen, die Daten als wichtigen strategischen Vermögenswert für Anwendungen und Geschäftsentscheidungen erkennen. Hierfür müssen die von den Unternehmen gesammelten und verwalteten Daten in eine wertvolle Kapitalressource umgewandelt werden, die als „Datenkapital“ bezeichnet wird. Herkömmliche IT-Infrastrukturen und -Workloads sind nicht darauf ausgelegt, die Generierung von Datenkapital zu fördern. Die Menge an Daten, die erfasst, gespeichert, geschützt und zur Verwendung bereitgestellt werden müssen, sowie die Anforderungen der Next-Gen-Applications (NGAs), die IT-Abteilungen zur Förderung der Datenkapitalgenerierung entwickeln, gehen über die Möglichkeiten herkömmlicher Infrastrukturen in den Bereichen Leistung, Skalierbarkeit, Verfügbarkeit, Flexibilität und Verwaltbarkeit hinaus. Um diese strengeren Anforderungen zu erfüllen, führen die meisten Unternehmen während des DX-Prozesses e
Tags : 
    
Dell EMC Storage

Vanson Bourne - Global Data Protection Index III

Published By: Dell EMC Storage     Published Date: Aug 15, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
    
Dell EMC Storage

Proteccion Del Capital de Datos en su Organizacion

Published By: Dell EMC Storage     Published Date: Aug 15, 2019
La era digital está cambiando la forma en que las organizaciones piensan, protegen y monetizan los datos. Hoy más que nunca, las organizaciones buscan estar impulsadas por la tecnología digital, pero para lograr esto primero deben estar impulsadas por los datos. Los datos potencian todo en las organizaciones modernas: el análisis, las experiencias digitales, la IoT y la inteligencia artificial sonejemplos notables. Todo esto es esencial para las organizaciones que desean tener éxito en un mundo transformado digitalmente, pero que simplemente no pueden funcionar sin datos. Esto está impulsando el cambio de los datos como un recurso digital estático a los datos como un recurso estratégico del negocio.
Tags : 
    
Dell EMC Storage

Vanson Bourne - Global Data Protection Index III

Published By: Dell EMC Storage     Published Date: Sep 03, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
    
Dell EMC Storage

Sparen Sie Zeit und Geld

Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Das herkömmliche PC-Lebenszyklusmanagement ist ein ineffizienter und teurer Prozess, der Ihrem Unternehmen sowohl Zeit als auch Geld kostet. Mit Dell EMC PC as a Service (PCaaS) können Sie den Ansatz Ihres Unternehmens rund um die IT-Infrastruktur transformieren. Mit PCaaS erhalten Sie Zugang zu unserem mit Awards ausgezeichneten Portfolio an Kundengeräten. Wir haben jedem unserer Mitarbeiterprofile Hardware zugeordnet, die für die jeweiligen speziellen Anforderungen entwickelt wurde. Erfahren Sie mehr über Dell-Lösungen von Intel®.
Tags : 
    
Dell EMC EMEA

SD- WAN in the Age of Digital Transformation

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA

What to Consider When Evaluating your SD-WAN Options

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA

Why Legacy Security Architectures Are Inadequate in a Multi-cloud World

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA

How the Rapid Adoption of Public Clouds Is Affecting Cybersecurity

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Companies are increasingly moving data and applications to public cloud platforms. Sometimes these transitions happen with IT’s approval and guidance; sometimes they don’t. Regardless, a company that stores data and uses applications in multiple public clouds creates a challenging environment for the security architect. It’s difficult to gain visibility and control of the security posture when the organization relies on an assortment of disparate cloud platforms that all take different approaches to security and offer different tools. And it’s hard for a small security staff to stay on top of disparate solutions that fail to integrate.
Tags : 
    
Fortinet EMEA

2018 Security Implications of Digital Transformation Report

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA

Why Your Traditional Endpoint Security May be Putting you at Risk

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA

The Need for an Integrated Security Strategy

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
    
Fortinet EMEA

Four Ways to Improve Endpoint Security: Moving Beyond Traditional Approaches

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA

A Ciso Guide to Multi-cloud Security

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA

Accelerating the Artificial Intelligence Journey with Dell EMC Ready Solutions for AI

Published By: Dell EMC     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
    
Dell EMC

eBook: Additive Fertigung von Kunststoffteilen für Ihre Produktionsumgebung

Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck begann als Prototyping-Technologie in den 1980er Jahren und hat sich seitdem rasant weiterentwickelt. Die stetigen Entwicklungen der letzten Jahrzehnte haben den 3D-Druck (auch als „Additive Fertigung“ bezeichnet) in der gesamten Produktionsumgebung zu einer praktikablen und kostengünstigen Technologie werden lassen: von der Prototypenentwicklung bis hin zur 3D-Direktherstellung. Unternehmen, die den 3D-Druck nutzen, können aufgrund der Fortschritte bei Dauer, Kosten und Fähigkeiten, die der 3D-Druck ermöglicht, eine Führungsposition in ihrer Branche erreichen und festigen. Dieses E-Book gibt einen Überblick über die Weiterentwicklungen bei den 3D-Drucktechnologien und Materialien von 3D Systems im Bereich der additiven Kunststofffertigung, die die Bandbreite der Einsatzmöglichkeiten in der Produktionsanwendung vergrößern.
Tags : 
    
3D Systems

Ist das 3D-Scannen für Ihre Prüfanforderungen geeignet?

Published By: 3D Systems     Published Date: Mar 07, 2019
Qualität und Zuverlässigkeit sind wichtiger denn je. Angesichts der allgegenwärtigen Konkurrenzsituation können es sich Unternehmen nicht leisten, bei der Qualität ihrer Produkte Abstriche zu machen. Und das Management darf nicht zögern, stets die neuesten Werkzeuge und Technologien einzusetzen, um jederzeit höchste Qualität sicherzustellen. Das vorliegende E-Book hilft Ihnen dabei, festzustellen, ob 3D-Scannen für Ihre Prüfanforderungen geeignet ist. Außerdem erfahren Sie, wie Sie die Technologie in Ihrem Unternehmen optimal einsetzen können.
Tags : 
    
3D Systems

The Power of Data Orchestration for Commercial Washing Machines

Published By: Sierra Wireless     Published Date: May 08, 2019
The Industrial Internet of Things (IIoT) has made equipment more efficient while improving customer experiences. For the first time, it enables manufacturers to gather and analyze sensor-based data to enhance operations. Every year, Sierra Wireless finds more applications for this exciting new technology. Now, we are applying the benefits of the IIoT to commercial and industrial washing machines. To find out more download this whitepaper today!
Tags : 
    
Sierra Wireless

The Power of IOT for Commercial Washing Machines

Published By: Sierra Wireless     Published Date: May 08, 2019
The industrial Internet of Things (IoT) has made equipment more efficient while improving customer experiences. For the first time, it enables manufacturers to gather and analyze sensor-based data to enhance operations. One industry that is experiencing the benefits of IoT is commercial and industrial washing machine manufacturers. OctaveTM, Sierra Wireless' new device-to-cloud solution, lets you securely extract, orchestrate, and act on data from your washing equipment at the edge, to the cloud.
Tags : 
    
Sierra Wireless

Strong Customer Authentication Explained

Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe

The Rise of Digital Business and how to Succeed

Published By: Virgin Media Business     Published Date: Aug 05, 2019
The world is now digital. From the explosive expansion in data-driven service delivery to digitally disruptive business models such as Uber and Netflix that have fundamentally changed the way we consume products, the digital evolution is unavoidable. As digital continues to advance, it’s crucial that UK businesses can be confident in their ability to keep up to date with the latest trends and technologies. But enhancing existing tools and models is just the beginning. Digital transformation is about taking advantage of new innovations that completely change the way businesses work, the experiences they offer their customers and the value they deliver within their market. To find out more download this whitepaper today.
Tags : 
    
Virgin Media Business

Rightmove Case Study: How a UK real estate site dramatically improved the user experience

Published By: Limelight Network     Published Date: Aug 12, 2019
The UK’s number one property website, Rightmove.co.uk, provides home hunters with both website and mobile access to over one million available properties daily. Their website and mobile platforms make searching for and researching properties to buy or rent, easy. Rightmove continues to grow with over 50 million-page impressions a day, often topping 55 million. Since its initial launch in 2000, there have been almost 40 million properties listed, with a library of over 2.5 billion active and archived images. Rightmove customers, including UK and overseas-based estate and letting Agents as well as new home developers are uploading 2 million images every day. Tim Harding, Head of Operations at Rightmove, is responsible for ensuring these images are available to home hunters visiting the site at all times, no matter what device they are using or where they are located. After two years at Rightmove, Tim has seen a tremendous increase in the amount of images posted per property, along with g
Tags : 
    
Limelight Network

Do's and Don'ts of Evaluating and Deploying a CDN

Published By: Limelight Network     Published Date: Aug 12, 2019
As businesses continue to expand their online reach globally, user experience is one of the most important factors for building audience satisfaction and driving revenue. But whether you are delivering videos, web content or even ? les, ensuring engaging online experiences from an increasing variety of devices around the world, is a huge challenge. Organizations have a number of methods for improving user experiences, one of which is leveraging a content delivery network (CDN). But not all CDNs deliver the same level of service. This guide will provide some tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs.
Tags : 
    
Limelight Network

Comprehensive Cybersecurity Defences for Content Delivery

Published By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
    
Limelight Network
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.