mem

Results 101 - 125 of 540Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 29, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
    
iShares by BlackRock
Published By: Dell     Published Date: Jun 13, 2018
We expend so much energy trying to make each minute count in many areas of our life – why wouldn’t we take the same approach to our computing experience? Time stuck waiting on a system could be better spent solving problems, working, or even playing. Download this research study to learn more about how you could be saving time that is lost on slow end user computing systems. Find out how Intel® Optane™ memory with Dell OptiPlex 7050 Micro provides a simple way to improve system responsiveness in several key areas to give users a way to reclaim precious time and become more efficient.
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Il y a deux ans, CA Technologies a entrepris de réévaluer la manière dont les organisations exploitaient leurs solutions de gestion de projets et de portefeuilles. Notre objectif était de permettre à la solution CA Project & Portfolio Management (CA PPM) d’être encore plus utile aux travailleurs : des décideurs aux membres des équipes, en passant par les responsables des projets, des ressources et des finances.
Tags : 
puissant, configurable, convivial
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Due anni fa CA Technologies ha iniziato a riesaminare il modo in cui le aziende utilizzavano le sue soluzioni di Project and Portfolio Management, allo scopo di identificare come migliorare il servizio offerto da CA Project & Portfolio Management (CA PPM) a ogni singolo utente, dai project manager, ai responsabili finanziari e delle risorse, ai dirigenti con potere decisionale fino ai membri dei team.
Tags : 
ppm, potente, configurabile, social
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
L’essor des interfaces de programmation d’applications (API) représente à la fois une opportunité commerciale et un défi technique. Pour les dirigeants d’entreprise, les API sont synonymes de nouvelles sources de revenu et d’optimisation de la valeur pour le client. Ce sont toutefois les architectes d’entreprise qui sont chargés de créer ces API permettant de réutiliser les systèmes back-end dans les nouvelles applications Web et mobiles. Il est crucial que tous les intervenants comprennent que les objectifs métier et les défis techniques d’un programme d’API sont intimement liés. Les responsables de programmes ont pour rôle de présenter clairement les objectifs commerciaux clés d’une API proposée aux architectes qui seront en charge de la conception de l’interface.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: Excellus BlueCross BlueShield     Published Date: May 22, 2018
Share this handout to help your employees get the most value out of their health plans.
Tags : 
high deductible health plan, online tools, digital tools, healthcare, benefits, health benefits, healthcare, health insurance, health cost estimator, health deductible tracking
    
Excellus BlueCross BlueShield
Published By: Infosys     Published Date: May 21, 2018
Our client is a Finnish consulting and engineering company that deals with some of the world's toughest industries. Since 1958, the company has handled the power transmission system for the Swedish National Grid, revamped Salzburg railway station, and has been involved in 90 percent of the world's largest pulp mill designs. The nature of our client's work places unique demands on their IT infrastructure. Many of their projects require them to set up temporary offices in remote locations to deliver their engineering expertise, making seamless connectivity a critical business requirement. Large files, such as complex pipeline drawings, are passed between team members in different locations. Any outage that causes a delay in projects leads to potential financial penalties and damage to reputation.
Tags : 
landscape, company, industry
    
Infosys
Published By: HireVue     Published Date: May 16, 2018
WHY SO MANY COMPANIES ARE RETHINKING ASSESSMENTS If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates THIS EFFECTIVE SCREENING TOOL HAS UNINTENDED CONSEQUENCES In this eBook, we’ll look at the science behind traditional assessments and why despite sound science, they don’t work for candidates today- and how they can be transformed with video and artificial intelligence.
Tags : 
    
HireVue
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Published By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb
Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS
Published By: Dassault Systèmes     Published Date: May 09, 2018
Discerning and demanding consumers expect meaningful retail interactions. Creating new world-class experiences is vital to differentiate products and boost profits in the consumer goods market. • Let me shop when and how I want: Technology to research and buy products defines consumer behavior, driven by social media’s “see now, buy now” mentality. • Give me relevant data: With ever-expanding information, every touchpoint should have customer data that matters. • Give me a truly unique experience: Innovative retailers use new partners and tools to deliver personalized consumer experiences. • Pair my products with consistently good service: New customer service technologies are crucial in a world with more consumer/retailer choices. • Make my retail environments better: Consumers want memorable, differentiated experiences in user-friendly digital and physical retail environments. I invite you to download your targeted industry analysis and uncover the expectations to take into account a
Tags : 
    
Dassault Systèmes
Published By: TigerConnect     Published Date: May 02, 2018
t’s stunning really, that something as basic as communication among your care team members is such a significant factor in your success as a health delivery organization. And yet, it’s proven every day in hospitals and other patient care settings throughout the nation. Every one of these either affects or reflects your ability to complete tasks effectively. At right is a list of metrics that are affected by communications among clinical staff.
Tags : 
    
TigerConnect
Published By: Workday France     Published Date: Apr 30, 2018
Lisez le rapport dès maintenant et découvrez pourquoi les analystes ont choisi Workday pour vous aider à favoriser l'engagement des collaborateurs, fournir des informations à tous les membres de l'entreprise et développer votre activité.
Tags : 
    
Workday France
Published By: AWS     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
AWS
Published By: IBM APAC     Published Date: Apr 27, 2018
To make the best treatment decisions, doctors at Memorial Hermann required rapid, reliable access to patients medical records and fast insight into changing health indicators. Deploying IBM FlashSystem, physicians at Memorial Hermann can now rapidly access healthcare information and perform sophisticated analysis to identify early signs of illness and take appropriate action for patients 99% faster.
Tags : 
    
IBM APAC
Published By: HotSchedules     Published Date: Apr 25, 2018
Food safety should always be top-of-mind. Even one foodborne illness could put your restaurant out of business. The safety and well-being of your customers are at stake when your team isn’t following proper food safety protocol. This is where employee training becomes essential: your business needs a culture that values food safety. Typically though, food safety training hardly comes off as an exciting topic. But with today’s technology training can be engaging, entertaining, and memorable. This ebook will show you how to breathe new life into your food safety training with seven lessons on making training more impactful.
Tags : 
    
HotSchedules
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: DocuSign     Published Date: Apr 24, 2018
Life science companies are experiencing a significant transformation in how they bring new products to market. Organizations must adapt to changes in the marketplace, such as global product commercialization, specialized medicine, new regulations, new payment models, and new technology that are driving more product variety, smaller drug volumes, and shorter product life cycles. To meet the needs of this new commercial model, life science companies must re-envision the global supply chain and evolve the tools they use to run their business. The supply chain that was designed for launching blockbuster products will not work in the future. Today, the global supply chain relies on a manual, paper-based process centered on printing documents and sending them via overnight mail, fax, or e-mail with scanned attachments. This time-consuming and costly process is errorprone, tedious for customers and team members, and vulnerable to security and compliance risks.
Tags : 
    
DocuSign
Published By: Oracle     Published Date: Apr 16, 2018
A tecnologia dos bancos de dados está evoluindo rapidamente, particularmente em três áreas: tecnologia de memória interna, análise de big data e nuvem. Paralelamente, o papel do DBA continua a evoluir. Saiba mais sobre como algumas dessas mudanças refletem tendências que existem há bastante tempo e permanecem firmes.
Tags : 
quais, principais, evolucoes, banco, dados
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.