document

Results 26 - 50 of 985Sort Results By: Published Date | Title | Company Name

Insurance Blueprint

Published By: Equinix EMEA     Published Date: May 22, 2019
This document outlines how Insurance providers must optimize and scale for policy collaboration in a rapidly changing, omni-channel environment while shifting to providing new types of digital insurance. Additionally, shifting demographics is transforming interaction between insurance providers, reinsurers and customers. To address, Insurance providers must move to the digital edge adjacent to customers, clouds, partners and remote devices.
Tags : 
    
Equinix EMEA

Whitepaper: Demystifying SD-WAN's Relationship to WAN Optimization

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As software-defined WAN (SD-WAN) continues to become a mainstream technology, its relationship to WAN Optimization (WANop) must be examined. At first glance, the two can appear alike, and are often erroneously mentioned as synonymous technologies. A deeper examination however, will reveal two distinct and highly complementary technologies with very limited feature overlap. This document aims to demystify the relationship between the two, outline the market shifts that have led to a reduced WANop sector, and provide a recommendation on deploying both technologies in a modern enterprise WAN.
Tags : 
    
VMware SD-WAN by VeloCloud

Dell And Partners Workforce Productivity Benefits

Published By: Dell APAC     Published Date: May 16, 2019
"Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic ImpactTM (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: › Best device experience: a hardware policy combining the choice of a range of Dell PCs, tablets, and peripherals with rapid configuration and delivery. › Unified endpoint management (UEM): an integrated approach to managing mobile devices, PCs. and other workstation technologies. In this case study, implementations of Workspace ONE, VMware’s UEM solution, have been assessed. › Enterprise collaboration: includes capabilities such as messaging, conferencing, document sharing, and business use of social media. In this case study the collaboration elements of Microsoft Office 365, namely OneDrive, SharePoint, Teams, Skype for Business, and Yammer
Tags : 
    
Dell APAC

Why Smart Purchasers Focus on Value, Not Price

Published By: Canon Solutions America     Published Date: May 15, 2019
State and local governments can reduce their technology costs by adopting a “best value” approach to procurement. This brief focuses on the benefits of best-value purchasing for your agency’s critical print and document management solutions.
Tags : 
    
Canon Solutions America

Abordar el dilema de la movilidad

Published By: Lenovo UK     Published Date: May 15, 2019
El aumento de la movilidad está causando un dolor de cabeza a los equipos de TI en todas partes, con el potencial de mayores costos y riesgos. Pero con ThinkPad impulsado por los procesadores Intel® Core™ i7 vPro™, obtiene seguridad 360, durabilidad confiable y productividad sin compromisos en todos y cada uno de los dispositivos. Obtenga más información en nuestro documento técnico. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK

B2B Enterprise Content Marketing 2019

Published By: Seismic     Published Date: May 14, 2019
New research from Content Marketing Institute shows that enterprise content marketers are seeing more success with content marketing. Download the report to learn: ? The benefits of a documented content marketing strategy ? How enterprise marketers rate alignment of content marketing and sales in their organization ? Content marketing methods enterprise marketers use to nurture their audience Discover the benchmarks, budgets, and trends impacting content marketers in the B2B enterprise space in the year ahead.
Tags : 
    
Seismic

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19

Business Disaster Recovery Strategies: Succeeding Where the Odds Say You Will Fail

Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18

6 Critical Reasons for Office 365 Backup

Published By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
    
Veeam '18

6 ottimi motivi per eseguire il backup di Office 365

Published By: Veeam '18     Published Date: May 01, 2019
Questo documento di facile e rapida lettura (5 minuti) spiega perché le organizzazioni devono proteggere i dati di Office 365. Questo report fa chiarezza su: • la sostanziale distinzione tra la responsabilità di Microsoft Office 365 e la responsabilità delle organizzazioni IT • 6 motivi per cui il backup di Office 365 è importantissimo • Chi controlla i dati di Office 365
Tags : 
    
Veeam '18

Real-world AI - Deep Learning Pipeline Powered By FlashBlade

Published By: Pure Storage     Published Date: Apr 10, 2019
This document describes the technical reasons for and benefits of an end-to-end training system and why the Pure Storage® FlashBlade™ product is an essential platform. It also shows performance benchmarks based on a system that combines the NVIDIA® DGX-1™, a multi-GPU server purpose-built for deep learning applications and Pure FlashBlade, a scale out, high performance, dynamic data hub for the entire AI data pipeline.
Tags : 
    
Pure Storage

The PC Lifecycle Continuum: From Control to Transformation

Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Mientras las diversas organizaciones buscan implementar estrategias impulsadas por los datos, el ordenador personal en todas sus variantes sigue siendo la herramienta de productividad clave para el personal. Los líderes de TI deben orientar la gestión de los PC durante todo su ciclo de vida para que los usuarios trabajen de la manera más eficaz. En la actualidad, los líderes de TI abordan el ciclo de vida de los PC en un ciclo continuo, desde el control hasta la transformación. El control está orientado hacia la optimización, mientras que la transformación se centra en el impacto de la tecnología en el negocio. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

Accelerating the Artificial Intelligence Journey with Dell EMC Ready Solution for AI

Published By: Dell EMC Storage     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
    
Dell EMC Storage

Accelerating the Artificial Intelligence Journey with Dell EMC Ready Solutions for AI

Published By: Dell EMC     Published Date: Mar 27, 2019
This ESG Technical Review documents evaluation of Dell EMC Ready Solutions for AI. We focused on understanding the performance and ease of use of the Ready Solutions for AI with optimized designs for machine learning and deep learning. To validate the full stack performance, we measured the number of images per second processed when training the AlexNet and ResNet50 deep learning networks and evaluated how the integrated solutions can simplify and accelerate AI deployment. The Deep Learning with NVIDIA design featuring Isilon significantly outperformed the competition in training time, delivering 2.9 times the performance of one competitor for an AlexNet deep learning neural network in a GPU accelerated environment and 2.3 times another competitor for a ResNet50 deep learning neural network.
Tags : 
    
Dell EMC

Data Warehouse Appliances and the New World Order of Analytics

Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
In this paper, we focus on the DWA and how it has evolved over the years since its introduction. The XDW architecture is then described, in which the need to maintain the data warehouse is documented while adding new components and capabilities to extend the analytical capabilities. This section also discusses the appropriate usage of appliances within the XDW. The rest of the paper covers the benefits from implementing the DWA, the selection considerations for them and what the future holds for them.
Tags : 
    
Group M_IBM Q119

Why Your Data May Be Vulnerable in Places You Wouldn't Expect

Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

When Your Organization Gets Hacked, Here's How it Will Go Down

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America

Security Software Can't Protect Your Law Firm If Your Staff Can't Use It

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

How Your Trusty Office Printer Can Put Your Legal Files At Risk

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

Healthcare Document Security At A Glance: Stats, Risks, And More

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America

The 5 Pillars of Healthcare Data Security

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America

Evolución de la seguridad para adaptarse al trabajador moderno

Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Para mantenerse al día del crecimiento de la movilidad del negocio sin sucumbir a los riesgos potenciales, el equipo de TI debe ser capaz de afrontar de manera eficaz problemas complejos, desde el aprovisionamiento de servicios y la adquisición de dispositivos hasta la supervisión de la seguridad. ¿Por qué? Los trabajadores de la información necesitan acceso a información a menudo confidencial en una amplia variedad de dispositivos y aplicaciones de empresa desde donde estén. En otras palabras, las políticas de seguridad y privacidad que no obstaculicen la productividad del usuario final facultarán a los trabajadores y aumentarán su rendimiento. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA

Using Document Scanning Technology to Meet the High Standard for Digital Record Keeping & Compliance

Published By: Epson     Published Date: Feb 27, 2019
By the end of 2019, the National Archives and Records Administration (NARA) will require all U.S. federal agencies to meet stringent new standards for electronic records management. This includes a requirement that all agencies manage their records electronically to the fullest extent possible, with long-term plans to stop accepting paper-based records and archives completely by 2022
Tags : 
    
Epson

Try Red Hat Enterprise Linux operating system

Published By: Red Hat     Published Date: Feb 25, 2019
Evaluate Red Hat Enterprise Linux for your application deployments, datacenter infrastructure or virtual and cloud environments. Red Hat Enterprise Linux provides a reliable and secure operating system that you can trust to run your most mission critical workloads. This evaluation: Provides a single subscription for a variant of Red Hat Enterprise Linux Offers access to Red Hat's award winning Customer Portal, including knowledge, videos, and documentation Is not intended for production use
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.