van

Results 1 - 25 of 4442Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 12, 2015
Data Center Infrastructure Management (DCIM) has become more vital than ever to data center operations as efficiency and technology advancement cycles move at an increasingly rapid pace. The insight provided by these essential systems has historically only been accessible to the data center operations team, not the end user or for that matter – the colocated customer. Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
    
FORTRUST
Published By: CommScope     Published Date: Apr 15, 2016
Multimode fiber (MMF) cabling is the workhorse media of local area network (LAN) backbones and data centers because it offers the lowest cost means of transporting high data rates for distances aligned with the needs of these environments. MMF has evolved from being optimized for multi-megabit per second transmission using light emitting diode (LED) light sources to being specialized to support multi-gigabit transmission using 850 nm vertical cavity surface emitting laser (VCSEL) sources. Channel capacity has been multiplied through the use of parallel transmission over multiple strands of fiber. These advances have increased multimode supported data rates by an astounding factor of 40,000 — from 10 Mb/s in the late 1980s to 100 Gb/s in 2010, with 400 Gb/s in development in 2015. Today, these extraordinary rates are created from collections of 25 Gb/s lanes carried on either four or sixteen strands of fiber in each direction
Tags : 
    
CommScope
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Inleidende woorden van Steven Heinsius: In dit e?book komen de basisbeginselen van wifi aan bod, en de veelvoorkomende fouten die worden gemaakt bij draadloze implementaties. Dit e?book gaat over het opzetten van ‘goede wifi,’ ook zonder de duurste apparatuur, en het behalen van de beste resultaten met wat u ter beschikking hebt. Het is tevens een tool waarmee u fouten in wifi kunt uitleggen aan mensen zonder kennis van draadloze technologie. Het is educatief en het is leuk. Samen kunnen we de wereld van wifi voor onze gebruikers iets beter maken.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Deze gids geeft u alle belangrijke informatie die u over hyperconvergence moet weten: • Een overzicht van de technologie • Hoe het werkt • Waarom u het nodig hebt • Waar u op moet letten wanneer u gaat aanschaffen Als de nieuwste generatie van zakelijke computing biedt hyperconvergence u een eenvoudige en kosteneffectieve oplossing als u wordt geconfronteerd met een groeiende vraag naar IT-services. Deze gids gebruikt voorbeelden uit de praktijk om u te tonen hoe andere kleine bedrijven het volgende hebben bereikt: • Lagere totale eigendomskosten • Grotere efficiëntie • Betere prestaties
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Een robuust netwerk opent de deur naar succes en Cisco is wereldwijd marktleider op het gebied van netwerktechnologie. Onze portfolio voor kleine bedrijven levert de betrouwbare, schaalbare en sterk beveiligde IT-infrastructuur die uw bedrijf nodig heeft. Uw IT-teams moeten uw infrastructuur operationeel houden, op urgente verzoeken reageren en nieuwe technologieën implementeren – zelfs als er sprake is van een beperkt aantal IT-medewerkers. Cisco Small Business-oplossingen zorgen ervoor dat u deze uitdagingen een stap voor kunt blijven. Het resultaat: IT-resources komen vrij, zodat u zich kunt richten op projecten met meerwaarde.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Leer hoe het huidige MKB-landschap van cyberbedreigingen eruitziet, zodat uw bedrijf kan overleven, operationele kosten kan terugdringen en beveiligd kan groeien. Maak van beveiliging een prioriteit van iedereen en bescherm uw bedrijf met Cisco. Naarmate uw bedrijf groeit, trekt het de aandacht. Maar niet alle aandacht is welkom. Steeds meer geraffineerde criminele bendes hebben hun pijlen gericht op MKB-bedrijven.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Het merendeel van deze statistieken over de toekomst van IT en netwerken is waar. Maar sommige zijn dat niet. Ontdek welke niet waar zijn en hoe u de waarheid in uw voordeel kunt gebruiken.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
De Cisco-ervaring voor vergaderingen en teamsamenwerking De werkplek is veranderd en bedrijven met de meest flexibele werknemers presteren beter dan traditionele bedrijven. Maar de realiteit van het moderne bedrijfsleven is dat u een cultuur van innovatie zelf moet stimuleren. Teams hebben een werkvloer nodig die is toegespitst op innovatie en snelheid. Maak kennis met Cisco Webex Teams, een platform dat teams helpt het allemaal te doen. Dit is een essentieel gereedschap voor vooruitstrevende MKB-bedrijven.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Wat is netwerkbeveiliging? Netwerkbeveiliging omvat elke activiteit die is bedoeld om de bruikbaarheid en integriteit van uw netwerk en gegevens te beschermen. Dit betreft zowel hardware- als softwaretechnologieën. Met effectieve netwerkbeveiliging wordt de toegang tot het netwerk beheerd. Hierbij worden diverse bedreigingen gestopt zodat deze zich niet verder kunnen verspreiden op uw netwerk en hackers geen toegang krijgen.
Tags : 
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Businesses of all sizes and industries have struggled to implement a hybrid IT environment that can meet their most critical needs, without disrupting business. The challenge is especially acute for midsized firms whose limited IT resources are facing pressure to adopt a never-ending torrent of technology innovations. In an effort to create a hybrid IT environment, many businesses end up with a multiple siloed infrastructure deployment options that consume increasing amounts of management time, effort and budget, while never quite meeting business needs.
Tags : 
    
Hewlett Packard Enterprise
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Shell U.K. Limited     Published Date: Sep 05, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage. [478] Have you ever experienced product quality issues caused by variations in process oil batches? Do you need a low-viscosity process oil, but have concerns about the effect of volatiles on working conditions? Could you offer enhanced products if you had process oils with distinct characteristics, for example, an extremely narrow hydrocarbon distribution range? Our GTL process oils contain a high proportion of paraffinic hydrocarbons and are very pure, which provides key qualities for many applications. For in
Tags : 
shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure, volatility, colourless, colorless, odourless, odorless, viscosity index
    
Shell U.K. Limited
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: Dell EMEA     Published Date: Sep 09, 2019
Quando si tratta di longevità, nessuno può reggere il confronto con Dell. Oltre a fornire capacità, gestibilità e funzionalità di protezione scelte dai dipartimenti IT, i nostri computer sono anche progettati per garantire cicli di vita più duraturi, con una conseguente riduzione degli sprechi. Non c'è da stupirsi che riscuotano successo nel mercato da così tanto tempo. Ma basta guardare al passato, parliamo piuttosto delle nuove funzionalità innovative. Il Latitude 7400 2-in-1 utilizza la nuova tecnologia ExpressSign-in di Dell che rileva la presenza dell'utente, attiva il sistema in circa un secondo e consente di effettuare l'accesso mediante riconoscimento facciale con Windows Hello. Gli utenti possono semplicemente sedersi alla scrivania e iniziare a lavorare, senza necessità di utilizzare combinazioni da tastiera per cambiare utente o addirittura toccare il tasto di accensione. Di fatto, è il primo PC al mondo a utilizzare un sensore di prossimità con tecnologia Intel® Context Se
Tags : 
    
Dell EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: KPMG     Published Date: Oct 15, 2019
When we first launched the Women In Alternative Investments Report (WAI Report) in 2001, we were among the few voices talking about women’s advancement in alternative investments. It was a delicate conversation and one that few people were comfortable having. But now, eight years later, the conversation has shifted. The issues have moved mainstream, the dialogue has broadened, and the voices are many, but change is afoot. Investors are pressuring Alternative Investment Firms to increase gender diversity at the funds and portfolios they invest in. Read the KPMG report to understand why achieving gender diversity is a business imperative.
Tags : 
    
KPMG
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: KPMG     Published Date: Jun 06, 2019
HR’s most confident leaders are using data, predictive insights and AI to transform HR into a new value driver. Discover what it takes to become an HR transformation trailblazer. Read this report to discover: • how trailblazers are exploiting uncertainty to drive new competitive advantage • which technologies HR leaders are investing in • what it means to integrate human and digital labour in a collaborative workplace • six priorities for forward-looking HR leaders.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
As advanced technologies catapult manufacturing into the future, find out how to manage the most complex business challenge in generations. Read this briefing to discover: • why I4.0 transformation demands a cross-functional approach • how to get planning for I4.0 transformation the right way round • how to identify the best opportunities to create value • critical enablers for I4.0 transformation • five questions to ask for smarter I4.0.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 31, 2019
From intelligent automation to advanced analytics, disruptive technology will enable the finance function to provide all of its services more effectively and efficiently. Find out how technology will change the way finance delivers transactional services, expert services and business partnering, Read this report to discover: • how automation in finance can deliver expert services more reliably and with smaller workforces • how to design an agile workforce of humans and technologies • how the finance function will shift to be part of a cross-functional analytics model that provides key insights to the business
Tags : 
    
KPMG
Published By: KPMG     Published Date: Sep 05, 2019
Leveraging procurement bots is the next logical step as organisations look to benefit from advancements in digital capabilities. Like every transformative technology, the implementation of procurement bots, while exciting, is not without challenges. Read this report to discover: • the five steps procurement organisations can take to create a partnership between bots and employees • the key characteristics of organisations doing this successfully • a phased methodology to ensure stakeholder change.
Tags : 
    
KPMG
Published By: Jeppesen     Published Date: Oct 01, 2019
"Empower your employees to streamline the process, decrease the risk and improve the cost of flight. Get this infographic to learn how different types of airline personnel use Jeppesen Aviator to boost the efficiency of flight operations."
Tags : 
    
Jeppesen
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com