design

Results 1901 - 1925 of 2022Sort Results By: Published Date | Title | Company Name

Top 8 Considerations for Choosing the Right Rack Power Distribution Units to Fit Your Needs

Published By: Tripp Lite     Published Date: May 15, 2018
As organizations pursue improvements in reliability and energy efficiency, power design in data centers gets substantial attention—particularly from facilities and engineering personnel. At the same time, however, many IT professionals tend to spend little time or energy on the specific products they use to deliver and distribute electrical power. In?rack power is often considered less strategically important than which servers or databases to deploy, and it is often one of the last decisions to be made in the overall design of the data center. But choosing the right in-rack power solutions can save organizations from potentially crippling downtime and deliver significant up-front and ongoing savings through improved IT efficiency and data center infrastructure management.
Tags : 
    
Tripp Lite

Top 12 Questions to Consider When Choosing UPS Systems for Network/Server Applications

Published By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
    
Tripp Lite

Rack Basics: Everything You Need to Know Before You Equip Your Data Center

Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite

Wedding site "The Pros" Increases Sales by 80%+ and Revenue per Visit by 70%+

Published By: TRUSTe     Published Date: Jun 02, 2010
For Ecommerce and Direct Marketing professionals: As a result of displaying the TRUSTe seal, The Pros saw an enormous 84% lift in Purchases by those landing on the page with the TRUSTe seal, and a 72% increase in Revenue per Visitor lift. See how you can mirror these results today.
Tags : 
truste, suresource, ecommerce, the pros, landing pages, website development, design, a/b
    
TRUSTe

Privacy Assessment Overview

Published By: TRUSTe     Published Date: Jun 02, 2010
Ecommerce, Web Development and Design, and Direct Marketing professionals can take advantage of a new program designed to gauge your organization's privacy level. Thousands of companies leave the intricacies of privacy management to TRUSTe, 13 year old leader in online privacy. Gain an overview of the program today.
Tags : 
truste, ecommerce, privacy, security, coppa, transactions, a/b, optimization
    
TRUSTe

Building a Trusted Mobile Strategy: Increase User Trust to Further your Mobile Platform Strategy

Published By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : 
truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps
    
TRUSTe

Ecommerce Professionals: Reduce Purchase Delay and Decrease Cart Abandonment

Published By: TRUSTe     Published Date: Dec 08, 2010
Shirley Tan, Founder of AmericanBridal.com - subsidiary of TheKnot.com, details her success building the highly-successful AmericanBridal.com Ecommerce business including causes and remedies for purchase delay, tips about website design and purchase flow to engender trust in your web visitors, how to increase cart conversion.
Tags : 
truste, ecommerce, purchase delay, cart abandonment, americanbridal, website design, purchase flow, trust and security
    
TRUSTe

Top 4 Secrets to Building Instant Trust Online

Published By: TRUSTe     Published Date: Dec 08, 2010
In this webinar, nationally-recognized landing page optimization expert Tim Ash and Andreas Ryuta Stenzel, Senior Manager of Online Marketing at TRUSTe, lay out the top 4 secrets to building instant trust online.
Tags : 
truste, trust and security, landing page optimization, online marketing, website design, conversion rates
    
TRUSTe

The Ultimate CX & Digital Transformation Workbook for Contact Centers

Published By: ttec     Published Date: Oct 25, 2019
Achieving a value-based digital transformation in the contact center isn’t just about adopting new technology – it’s about finding, implementing, and optimizing the right technology to gain the most value for the company, its employees, and most importantly, the customer. It all starts with a tactical cloud migration plan that’s rooted in an unbreakable alignment of business goals, IT strategy, and customer needs. This 7-point digital planning workbook was designed by TTEC’s Center for Customer Excellence to help facilitate richer, more productive CX transformation discussions between IT and business leaders. Don’t let misalignment derail your digital transformation efforts. Snag your FREE copy of The Ultimate CX & Digital Transformation Workbook for Contact Centers today! Learn how to create cross-company alignment to develop a strategic customer engagement plan that forms the basis for a successful value-based transformation.
Tags : 
    
ttec

Introduction to AWS IaaS Solutions: Deploying and Managing Amazon Web Services

Published By: Turbonomic     Published Date: Nov 27, 2018
Want to learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services? This ebook will take you through practical examples, design patterns, and tips to help you confidently build a working IaaS solution. Download to find out: The key components of the AWS public cloud platform How to launch your compute and storage resources on the AWS Virtual Private Cloud (VPC) platform How to add compute resources to your VPC with AWS Elastic Compute Cloud (EC2) The types of storage in AWS Elastic Block Storage (EBS) with cost, performance impact, and examples of operational tasks By the end of this ebook, you’ll master AWS core components and how to design for resiliency. You’ll even be able to launch and manage your cloud solution using either the AWS command-line interface or the AWS web console.
Tags : 
    
Turbonomic

Introducing the Two Sigma Factor Lens

Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma

HDMI ESD Protection Without Sacrificing Performance

Published By: Tyco Electronics     Published Date: Jun 23, 2008
Adding ESD protection to your HDMI system design can be simplified by choosing the proper solution. Tyco Electronics' ESD and overcurrent protection reference layout complies with the HDMI 1.3 specification at 3.4GHz, helps meet the requirements of the IEC 61000-4-2 ESD protection specification, and optimizes board space, all of which helps minimize risk for designers.
Tags : 
esd, scm, plm, supply chain, product lifecycle, tyco, circuit protection
    
Tyco Electronics

Tyco Integrated Security Education Solutions

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Building on the experience we’ve gained as the leading name in the security field since 1874, Tyco Integrated Security currently helps protect thousands of schools around the country. And because of our comprehensive offerings, we’ve been able to do so with security solutions specifically designed for each unique situation.
Tags : 
tyco, security, security education, school
    
Tyco Integrated Security

How to Design Compelling Content Experiences

Published By: Uberflip     Published Date: Jan 20, 2016
In this presentation, SnapApp’s Vanessa Porter joins us for a discussion on how to leverage new interactive content formats in tandem with a content experience that’s optimized to make it all work.
Tags : 
uberflip, content, engagement, snapapp, content, opt-in
    
Uberflip

Microsoft Workflow Foundation, SharePoint Workflow Designer and the Ultimus BPM Suite

Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
    
Ultimus

Beauty & The Backup: Are You Spending Too Much Time on Backup and Recovery?

Published By: Unitrends     Published Date: Oct 30, 2015
Usability—much less beauty—was never a priority for backup and recovery software. All that mattered was that large and complex applications, usually diverse independent applications from multiple vendors, worked. As a result, IT staff spent countless hours slogging through poorly designed systems. But it doesn't have to be like this.
Tags : 
unitrends, backup software, recovery software, it staff solutions, it solutions, usability, it management, knowledge management
    
Unitrends

Smarter Operations: The Value Chain’s Vital Role in Digital Evolution

Published By: UPS     Published Date: Sep 28, 2017
This series explores the role of modern digital technology in the evolution of manufacturing production, defined here as the value chain of internal and external contributors to the manufacture and delivery of products. Each chapter is designed to help operators visualize how they can build-out production of the future, and how to leverage help from the value chain to make faster progress.
Tags : 
manufacturing production, digital supply chain, smart operations, digital transformation, industrial internet of things
    
UPS

Top 12 Best Practices for Virtualizing Active Directory Domain Controllers

Published By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : 
veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields
    
Veeam

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi

Tips on Finding a Website Design Service

Published By: VendorSeek     Published Date: Feb 22, 2010
Save Time and Money on Web/E-Commerce Design. Fill out the form to request Web/E-Commerce Design price quotes
Tags : 
vendorseek, web e-commerce design, layout, vendor quotes, website graphics
    
VendorSeek

IDC Technology Spotlight: Primary Flash Market Evolving to Next-Generation Architectures

Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs —first for primary storage workloads and then ultimately for secondary storage workloads — will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) — it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage

High-Performance Embedded Applications: The SUMIT Standard

Published By: VersaLogic Corp.     Published Date: Nov 03, 2010
How the SUMIT interconnect standard is designed to meet the evolving needs of embedded systems.
Tags : 
embedded, single board computer, sumit, pci express, pcie, form factor, embedded design, boards & modules
    
VersaLogic Corp.

The Vertica Analytic Database Technical Overview White Paper

Published By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : 
vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc
    
Vertica

Slashing Data Warehouse Costs with the Vertica Analytic Database

Published By: Vertica     Published Date: Feb 20, 2010
For over a decade, IT organizations have been plagued by high data warehousing costs, with millions of dollars spent annually on specialized, high-end hardware and DBA personnel overhead for performance tuning. The root cause: using data warehouse database management (DBMS) software, like Oracle and SQLServer that were designed 20-30 years ago to handle write-intensive OLTP workloads, not query-intensive analytic workloads.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc
    
Vertica
Start   Previous    67 68 69 70 71 72 73 74 75 76 77 78 79 80 81    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.