cad

Results 201 - 225 of 764Sort Results By: Published Date | Title | Company Name

ROI en estaciones de trabajo móviles demasiado convincentes para ignorar

Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estaciones de trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.

ROI en estaciones de trabajo móviles demasiado convincentes para ignorar

Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estacionesde trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/ CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.

9 Effective Habits for Retaining Top Talent

Published By: XpertHR     Published Date: Jun 13, 2018
It’s an employee job market these days. With the lowest unemployment rate in decades, HR professionals must be hyper-focused not just on attracting, but on retaining, top talent. The stakes are too high to risk losing key employees to competitors. Effective performance management and a strong culture are must haves to keep valuable talent from walking out the door. This whitepaper from XpertHR covers nine critical categories of best practices in retaining top talent. Download your copy today!
Tags : 
employee retention, reduce turnover, talent management, performance management, talent acquisition, company culture, career development, employee communication
    
XpertHR

Faster Mainframes for Speed Trading

Published By: Infosys     Published Date: Jun 12, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys

Best-of-Breed Enterprise Mac Management

Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf

Best-of-Breed Enterprise Mac Management

Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed.
Tags : 
    
Jamf

Real world projects vs. Academic coding

Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider

Faster Mainframes for Speed Trading

Published By: Infosys     Published Date: May 30, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys

Las siete tendencias de la inteligencia empresarial

Published By: CA Technologies EMEA     Published Date: May 25, 2018
Muchas de las organizaciones más grandes y de mayor éxito del mundo utilizan CA Project & Portfolio Management (CA PPM) como la piedra angular de su estrategia de inteligencia empresarial (BI). De este modo, CA puede medir continuamente el pulso del mercado de forma directa con el fin de observar con sus propios ojos la evolución de las expectativas y el uso conforme las empresas adoptan las tecnologías de BI.
Tags : 
las, siete, tendencias, inteligencia, empresarial
    
CA Technologies EMEA

Guía para diseño REST y API Si la única herramienta de la que se dispone es un martillo.

Published By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
    
CA Technologies EMEA

Guía sobre la transformación digital para directores de digitalización

Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la actualidad, la tecnología digital está por todas partes; la nube, los dispositivos móviles, las redes sociales y el Internet de las cosas están cambiando nuestra forma de trabajar y divertirnos. Este entorno digital que evoluciona a gran velocidad está, además, redefiniendo las relaciones entre la compañía y sus clientes, que ahora esperan recibir una experiencia cómoda e interactiva de sus marcas favoritas. La seguridad es también una prioridad. Los riesgos son ahora mayores, pues tanto la empresa como sus clientes intercambian una cantidad cada vez mayor de datos confidenciales.
Tags : 
    
CA Technologies EMEA

API360: El modelo completo de estrategia de API para la empresa

Published By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
    
CA Technologies EMEA

Arquitectura y estrategia de API Un enfoque coordinado

Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA

Strategia e architettura delle API: un approccio coordinato

Published By: CA Technologies EMEA     Published Date: May 23, 2018
L'avvento delle API (interfacce di programmazione delle applicazioni) rappresenta al contempo un'opportunità di business e una sfida tecnologica. Per i leader di business, le API sono un'occasione per generare nuovi flussi di ricavi e massimizzare il valore offerto ai clienti. Ricade però sugli architetti aziendali la responsabilità di creare API che consentano di riutilizzare i sistemi backend in nuove applicazioni web e mobile.È fondamentale che tutti gli stakeholder comprendano la stretta correlazione tra gli obiettivi aziendali e le sfide tecniche di un programma API. Spetta ai manager del programma la responsabilità di comunicare con chiarezza gli obiettivi di business primari delle API proposte agli architetti che poi realizzeranno materialmente l'interfaccia. Gli architetti devono invece focalizzarsi su tali obiettivi durante le fasi di implementazione dell'infrastruttura API e di progettazione dell'interfaccia stessa. Tutte le decisioni tecniche devono contribuire alla creazion
Tags : 
    
CA Technologies EMEA

Uso de los análisis de amenazas para proteger el acceso con privilegios y prevenir infracciones

Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protección del acceso con privilegios y la prevención de infracciones siguen constituyendo preocupaciones urgentes en empresas de todos los tamaños. Los atacantes recurren a una gama mayor de métodos más sofisticados para infiltrarse en sistemas vulnerables y, a pesar de que las noticias sobre infracciones externas ocupan con frecuencia los titulares, las organizaciones también deben ser capaces de defenderse contra las amenazas internas. De hecho, dado que en la actualidad se recurre de forma generalizada a la externalización y la asociación para acometer labores clave, un mayor número de usuarios tiene, hoy en día, acceso con privilegios a sistemas empresariales de fundamental importancia. Además, resulta primordial que los administradores actuales de los sistemas comprendan cómo se están utilizando estos últimos, quién los usa y en qué condiciones. Desafortunadamente, las soluciones estándar de seguridad no pueden proteger el acceso interno o con privilegios de manera eficaz y ad
Tags : 
    
CA Technologies EMEA

Zero Trust Security: A New Paradigm For a Changing World

Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation

The Art Of Gentle Disruption

Published By: Infosys     Published Date: May 21, 2018
The world of retail banking has changed enormously in the last decade. Our client, one of the largest banks in the world, with over 50 million customers, has been at the heart of this movement. In the early days, we helped them to be one of the first banks to offer internet banking servers. Now, as digital natives enter the banking stream and demand seamless banking experiences, we are helping our client to rethink customer experiences at the convergence of physical and digital realms.
Tags : 
retail, banking, digital, customer, finance
    
Infosys

Innovation Through Intelligent Automation

Published By: Infosys     Published Date: May 21, 2018
Pfizer is one of the world's largest pharmaceutical companies, with a vision to mobilize innovation to build a healthier world. This approach is perfectly aligned to Infosys' own core values and culture of innovation, and the two companies have enjoyed a highly productive relationship for over a decade. It was natural, therefore, that Pfizer should ask us to use our innovations to provide continuous cost savings while improving overall IT operations efficiency for all the stakeholders involved.
Tags : 
automation, innovation, relationship, companies, mobilization, pfizer
    
Infosys

The Next Mobile Decade

Published By: Adobe     Published Date: May 15, 2018
Mobile capabilities have grown up. Strategies should, too. Over the last ten years, smartphone usage among adults has grown to 95 percent. Surprisingly, 90 percent of marketers say they’ve only had a mobile strategy for five years or less. Read The Next Mobile Decade: Adobe 2018 Mobile Maturity Study, and learn: - How 500 marketing and IT professionals tackled mobile marketing last year - Which mobile strategies the most advanced organizations put into practice - What you can do to make your brand a mobile leader in the next decade Fill out the form to get the report
Tags : 
    
Adobe

Bluecore's 2018 Retail Email Benchmark Report

Published By: Bluecore     Published Date: May 14, 2018
After decades in the limelight, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages. To better understand how retailers are using email, including the extent to which they have embraced individualized messaging opportunities and the effectiveness of those messages, Bluecore turned to the data. Our 2018 Retail Email Benchmark report provides a baseline understanding of these a
Tags : 
    
Bluecore

How To Generate Thousands Of Leads Using Sales Chat

Published By: CloudTask     Published Date: May 11, 2018
As a B2B marketer, the process of nurturing and generating new leads is always tricky business. Chasing high quality and relevant leads requires a considerable amount of time, energy and resources to be invested into email marketing campaigns, social media management and educational content such as blogs, whitepapers and eBooks. While live chat support has been around for about a decade, only in recent years and especially in the age of the smartphone, are B2B companies capitalizing on it as a channel to generate and nurture leads.
Tags : 
    
CloudTask

You’ve Been Breached – Now What? How to Respond to a Worst-Case Scenario

Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike

Resetting Service for the Financial Institution - Using Your Branch to Better Embrace the Customer

Published By: Epson     Published Date: May 10, 2018
Online, mobile, omnichannel, untethered, data mining, automation, and remote communication are all now buzzwords surrounding the new technologies and resources financial institutions have to help them re-invent their branch experience. Capabilities are available today that were not imagined a decade ago. This is an exciting time for those institutions that can look to the future and enhance their offerings. While technology is driving change, it can also be a tremendous challenge for financial institutions as they work to keep pace and even take advantage of the dramatic shift in customer needs and expectations. Millennials, baby boomers, small businesses – all are important market segments with very different wants and needs. Driven by technology, the new demand is for a complete online presence, complemented by more flexibility in personalized services, and specialized expertise available in every branch. Suffice it to say, financial institutions of all sizes and in every geography a
Tags : 
    
Epson

Computing Recommendations for Higher Education: Universities and Colleges

Published By: Dell EMC     Published Date: May 09, 2018
Selecting the best computing solutions within higher education can be a challenge with so many uses and options today. This use case guide takes into consideration higher education needs regarding form factor and key features. Take a look at this guide to learn how the computing choices made can facilitate the student learning environment whether in computer labs, in interactive learning spaces, or if learning takes place on the go via academic-related activities with digital signage located in the hallway. Read this paper today to find out the best desktop and display solutions to meet the needs of university and college students. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor Intel, the Intel logo, Xeon and Xeon Inside are the trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC

Mobile Threat Detection Through Machine Learning

Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.