high tech

Results 326 - 350 of 535Sort Results By: Published Date | Title | Company Name
Published By: MarkLogic     Published Date: Nov 07, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
    
MarkLogic
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
McAfee
Published By: MedeAnalytics     Published Date: Mar 09, 2012
The patient access process has traditionally been highly fragmented. Integrating disparate systems into a single workflow interface can simplify the registration and financial clearance process, resulting in a reduction of bad debt, increased point-of-service cash and improved patient satisfaction. Read to find out how patient access workflow technology can streamline your front-end process and improve satisfaction for your patients.
Tags : 
healthcare, patient access, patient access intelligence, pai, debt, patient satisfaction
    
MedeAnalytics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
High Density Interconnect (HDI) is being used more often to meet the growing need for more complex designs in smaller form factors. Beyond some of the more obvious electrical effects of using smaller vias, there is also an impact to the power integrity of a board using HDI. This includes different effects of mounted inductances of decoupling capacitors, changes in plane performance due to reduction in perforation from chip pinouts, and the inherent plane-capacitance changes from using dielectrics of various thicknesses. This paper will examine and quantify these effects, using numerous design examples, including a large conventional through-hole design board that was reduced using HDI.
Tags : 
power integrity effects, mentor graphics, high density interconnect, hdi, chip pinouts, perforation, multilayer or build-up multilayer, bum, sequential build-up technologies, sbu, buried via holes, bvhs, dielectric materials, photosensitive, laser drilling, plasma drilling, microvia, plated through-holes, pths, power distribution network
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Sep 04, 2009
This paper looks at the issues, materials and current processes being researched to create this integrated Opto-Electronic Circuit Board by European, Japanese and North American organizations.
Tags : 
mentor graphics, high density interconnect (hdi), high speed applications, opto-electronics, photonics, pcbs, opto-electronic circuit board, eobc-optofoil, univ. of ulm, fraunhafer inst, daimler-chrysler, siemens, truemode, terahertz, polyguide, dupont, topcat, nist, goodyear, jiep
    
Mentor Graphics
Published By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : 
messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet, spammers
    
MessageLabs
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
Until recently, many high-tech manufacturers – especially small and medium-sized businesses – have been able to survive by applying 80% of their operational focus to 20% or less of their critical customers and suppliers. That was then. The new mandate from channel masters is for more intense, collaborative relationships with fewer suppliers.
Tags : 
industry directions, oem, manufacturing, manufacturer, scm, supply chain, ems, electronics manufacturing, productivity, plm, product lifecycle management, cost control, r&d, r & d, enterprise resource, erm, erp, microsoft dynamics
    
Microsoft Dynamics
Published By: MicroStrategy     Published Date: Sep 09, 2014
Improve revenue, loyalty, and productivity while controlling costs. It’s a given: Most shoppers are now armed with a mobile device when they enter a retail store. They are highly informed and expect retail employees they interact with to be at least, if not more knowledgeable about a store’s products, promotions, and services. This white paper outlines the 5 key benefits of a winning mobile app strategy, including new ways retailers can effectively leverage mobile technology as a competitive advantage. With the average shopper looking at their phone more than 150 times a day, learn how leading retailers leverage mobile technology to: Enhance customer experience Drive sales Boost customer loyalty Achieve operational efficiencies Download this white paper to find out how retailers with a powerful, effective mobile app program in place can win the battle for shoppers’ eyes and ears — and wallets.
Tags : 
mobile apps, customer experience, customer loyalty, operational efficiencies, mobile technology, sales lift, customer loyalty, best practices
    
MicroStrategy
Published By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : 
email security, ransomware, phishing, whaling, security strategy
    
Mimecast
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in mobile and cloud security innovation for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. We ensure customers can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
Now is the time to switch from BlackBerry’s new and unproven mobile device management (MDM) offering to a modern, comprehensive EMM solution like MobileIron. In today’s highly competitive and fast-paced global economy, the last thing companies need is an MDM vendor who is always playing catch up through technology acquisitions that cost too much and offer too little. MobileIron is a recognized industry leader that has always been 100% focused on mobile security. Our unified, multi-OS EMM platform was built from the ground up to meet the needs of the modern mobile enterprise by reducing IT complexity, delivering a secure user experience, and protecting mobile apps and data on any device, in any cloud service, anywhere in the world.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
MobileIron
Published By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : 
cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
    
MobileIron
Published By: MuleSoft     Published Date: Oct 13, 2015
Nearly every industry today is facing an array of digital opportunities thanks to the prevalence of innovative technology. But with opportunities come challenges – especially in financial services. In an industry where digital innovations are used widely and have come to be expected by consumers, there is a greater push to deliver a highly personalized and convenient experience that stretches across mobile, social, and alternative delivery channels. Learn more about how financial institutions can harness digital technologies to take advantage of these opportunities.
Tags : 
financial services, digital opportunities, innovation, personalized experience
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
    
MuleSoft
Published By: NetApp     Published Date: Feb 19, 2015
In today’s 24/7, always-on world, people expect institutions of higher education to lead with technology. Constant connectivity, mobility, and access to rich media anytime, anywhere not only define the educational experience, but also help to attract and retain the best students, faculty, and staff. Western Oregon University (WOU), relies on NetApp to help support its mission of providing effective, technology-powered learning opportunities.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: NetApp APAC     Published Date: Jul 08, 2019
All-flash storage is on a strong growth trajectory, but the industry is not swooning naively over the blazing fast I/O speeds. Most IT managers are talking a mature, step-by-step approach to all-flash adoption. Falling per-gigabyte prices are making the technology more commonplace. Solid state drives are no longer just for specialized, high-performing tasks. Before they leap, however, storage professionals want to understand the full business picture as they formulate a winning strategy for putting all-flash storage to use for more workloads. This paper offers insights for business success with all-flash storage based on IT Central Station reviews. Real users weigh in on what it takes to get the most out of the technology. It covers such aspects of flash storage as the need for simplicity and the importance of flexibility. The paper also looks at how to build a business case for all-flash and think through the implications of issues such as integration with existing infrastructure.
Tags : 
    
NetApp APAC
Published By: Netezza IBM US     Published Date: Mar 27, 2012
Across all industries, Revolution R Enterprise advanced analytics platform leverages the capabilities of IBM Netezza Analytics on IBM Netezza's family of data warehouse appliances, merging high-performance, scalable data warehouse technology with advanced in-database analytics and massively parallel capabilities
Tags : 
ibm, technology, netezza, analytics, enterprise analytics
    
Netezza IBM US
Published By: NetSuite     Published Date: Apr 22, 2016
This report highlights these and other trends, and it also reveals what distributors are planning to do in 2016 to build revenue and cut costs, while also improving their technological capabilities as the industry adapts to a new economy and evolving workforce.
Tags : 
    
NetSuite
Published By: Network Automation     Published Date: Dec 10, 2008
IST uses Fourth Shift software by SoftBrands to manage its operations in Big Flats, New York (headquarters) and Buffalo, New York, as well as the United Kingdom, Canada and France. For Fourth Shift to function correctly for IST, a series of process must be run each night on several servers. These processes include batch runs, data extracts, and system backup.
Tags : 
network automation, process automation, automate, automatic interaction
    
Network Automation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.