part design

Results 1 - 25 of 113Sort Results By: Published Date | Title | Company Name

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Charting a course for an exceptional customer experience.

Published By: Adobe     Published Date: Jun 26, 2019
While having the right tech is key to delivering great experiences, an equally important part of the equation is having the right people, processes and org structures. Three best practices to design your org for successful experience delivery: 1. Cultivate the right skills and find the right talent for customer obsession 2. Set up org structures that encourage cross channel collaboration 3. Embrace the possibility of using external support to address the challenges of change management
Tags : 
    
Adobe

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Data Security for the Way People Work

Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking, it management
    
Cisco

Cisco Validated Design Summary for BYOD (in English)

Published By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking, software development
    
Cisco

PART 2 BYOD Design Overview

Published By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
business models, development, business solutions, best practices, business intelligence, business process management, productivity
    
Cisco

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
    
Cisco

From Cliche to Mission Critical

Published By: Adobe     Published Date: Dec 07, 2017
Stock photos get a bad rap sometimes. We’ve all seen images of women inexplicably smiling at their forkfuls of salad, or an unnaturally giddy customer service representative standing by. “Some stock photography just looks like stock photography,” says May Curry, a graphic design veteran with almost 20 years of experience.1 But stock photography has always been an essential part of the designer’s toolkit. When used right, it helps brands make just the right impact. Today, collections are evolving to keep pace with visual trends and create unique, attention-grabbing images-quickly and no budget. Download this whitepaper to take a look at stock's rapid transformation and how it's helping designers do beautiful work, faster than ever.
Tags : 
    
Adobe

The Workstation Buyer’s Guide for Manufacturing and Engineering

Published By: Dell EMC     Published Date: Mar 08, 2019
Digital transformation means many key parts of the business now depend on specific and often very demanding applications. The outcome of these applications can determine the health of the company. Running them on commodity PCs is a risky strategy. Workstations designed to tackle the most challenging workloads can help ensure a positive outcome. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC

The Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9

Hybrid Cloud 5 Key Considerations

Published By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete Hybrid Cloud ecosystem capabilities. Our solutions help our clients plan and deliver scalable Hybrid Cloud by showing an understanding of their market segments, then delivering on designing effective programs.
Tags : 
    
B Channels

Industrial Internet of Things Assessment for 2018 Part 1

Published By: B Channels     Published Date: May 01, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete IOT ecosystem capabilities. Our solutions help our clients plan and deliver scalable loT by showing an understanding of their market segments, then delivering on designing effective programs. We are adept at finding and engaging partners in loT segments by finding, nurturing and growing partner ecosystems.
Tags : 
    
B Channels

Elastic Material for Accelerated Design Verification and Prototyping

Published By: 3D Systems     Published Date: Feb 28, 2019
Ideal for engineers for prototyping and verifying designs across a range of industrial and consumer goods applications, the FabPro Elastic BLK material offers excellent compressive characteristics and shape recovery with a realistic opaque black rubber look and feel. Quick printing and quick curing, FabPro Elastic BLK material saves times and money versus outsourcing to a third party for manufacturing. Suggested applications include: • Overmolds, seals, grommets, grips and vibration dampening components • Functional parts including dust covers, push buttons and cable stress reliefs FabPro Elastic BLK material expands the range of functional materials for 3D Systems' most affordable industrial 3D printer, the FabPro 1000. Rugged and durable, the FabPro 1000 is designed for engineers and designers who want to save time and money by managing their design and prototyping processes in-house.
Tags : 
    
3D Systems

White Paper:The New World of Thermoplastic Manufacturing

Published By: 3D Systems     Published Date: Feb 28, 2019
Rewrite the rules of injection molding with 3D Systems thermoplastic additive manufacturing printers and materials. Selective Laser Sintering (SLS) technology is at the heart of a growing trend in mass custom manufacturing as well as functional prototyping. The right additive technologies, materials and finishes are transforming manufacturing. Digital-direct thermoplastic manufacturing offers exceptional quality while opening the door to novel design parameters not possible with injection molding. Thermoplastic additive manufacturing also bypasses the long lead time and up-front investment in injection molding tooling. If you measure your finished parts on the three dimensions: quality, time to market, and cost per cubic inch, in many situations industrial SLS offers a better total value proposition. 3D Systems offers a wide variety of 3D printable thermoplastics, engineered for a range of applications. Materials specialists, designers, and manufacturing engineers can collaborate on
Tags : 
    
3D Systems

Efficient and Effective Production Support with 3D Printed Jigs and Fixtures

Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems

Cloud Agility and Scalability

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading technology conglomerate had to renew the current data center agreement, also it was no longer strategic to maintain their own hardware. LTI partnered with Oracle and helped in designing and executing the migration plan that would ensure Zero business disruption without stringent timeline. LTI leveraged a toolkit built by its in-house, dedicated Oracle Innovation and Solution Center (OISC) to help ensure an error-free migration. Benefits i. $1 M Overall Cost saving ii. 40% reduced TAT Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Mar 28, 2019
To win the colocation race you need to be faster, reliable, innovative and efficient –all while making smarter design choices that will ensure positive returns. Customers are demanding 100% uptime and always-on connectivity –be it small enterprises to large Internet Giants–and colocation providers need to meet these expectations. The growing adoption of prefabricated data centers allows just that. With the undisputed benefits of prefab modules and building components(like speed or quality),colocation providers can manage their business today, and deploy faster in the future. Chris Crosby, CEO for Compass Datacenters, is well-known for his expertise in the data center industry. From its founding in 2012, Compass’ data center solutions have used prefabricated components like exterior walls and power centers to deliver brandable, dedicated facilities for colocation providers. Prefabrication is the central element of the company’s “Kit of Parts” methodology that delivers customizable data center solutions from the core to the edge. By attending this webinar, colocation providers will: • understand the flexibility and value delivered via the use of prefabricated construction • Hear the common misperceptions regarding prefabricated modules and data center components • learn how prefabricated solutions can provide more revenue generation capability than competing alternatives • know what key things to consider when evaluating prefabricated data center design
Tags : 
data centers, colocation provider, schneider electric, - modular data centers, prefabricated data center
    
Schneider Electric

Hadoop and the Data Warehouse: Competitive or Complementary?

Published By: Teradata     Published Date: Jan 30, 2015
It is hard for data and IT architects to understand what workloads should move, how to coordinate data movement and processing between systems, and how to integrate those systems to provide a broader and more flexible data platform. To better understand these topics, it is helpful to first understand what Hadoop and data warehouses were designed for and what uses were not originally intended as part of the design.
Tags : 
teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges, technology, framework, apache, hadoop, architecture, warehouse, optimization, security, scalability, consistency, flexibility, data management
    
Teradata

Get More Than Your Fair Share of Attention in Your Channel

Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty, customer incentive programs, customer loyalty program, customer marketing, best practices, business intelligence, customer interaction service, customer relationship management, customer satisfaction, customer service
    
BI WORLDWIDE

MobileIron And iOS: The Security Backbone For The Modern Enterprise

Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron

Factory Intelligence: Looking Beyond the Mode-Based Enterprise

Published By: Mitutoyo     Published Date: Aug 24, 2018
Today’s factory intelligence is the collaborative orchestration of people and machines. By blending intelligence from multiple sources, factories are truly becoming smarter. But it’s not just about the machines. Rather, people are improving machines through a true partnership that turns human experience into smarter machines. This shift marks a re?orientation to a thought process that’s more natural to people. After decades of working with 2D blueprints, designs and dimensioned drawings, factory intelligence leverages 3D models that are easier for people to comprehend and use. Plus, many people find more satisfaction in intelligent factory work that challenges them to manage relationships among machines, rather than repeatedly working on a single piece in a line. In smarter factories, people direct machines to adjust for shifting customer requirements and market demands.
Tags : 
factory intelligence, 3d models, market demands, model-based enterprise, supply chain, precision metrology, cmm
    
Mitutoyo
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.