• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

ios

Results 1 - 25 of 833Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Jun 07, 2019
Descubra cómo sacar el máximo provecho a su futuro. Este informe puede ayudarle a afrontar los desafíos del futuro, superar las expectativas de sus clientes y encontrar maneras de coexistir con las soluciones competitivas de centros de datos. 451 Research reúne información de los compradores y de quienes toman decisiones sobre el tema de los espacios de colocación, y resume lo que debe hacerse en las empresas de centros de datos de colocación.
Tags : 
colocación
    
Schneider Electric
By: Workday APAC     Published Date: May 08, 2019
"Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now."
Tags : 
    
Workday APAC
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19
By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesn’t align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to “do more with less,” while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
By: Zscaler     Published Date: Jun 20, 2019
Las reglas han evolucionado: las aplicaciones migran ahora hacia el cloud, y los usuarios acceden a ellas desde cualquier lugar, sin conectarse más a la red corporativa. Parece entonces esencial reconsiderar el aspecto seguridad de su arquitectura. Descubren con ese libro blanco como proteger sus activos estratégicos con las funcionalidades Zscaler Data Protection y Cloud DLP.
Tags : 
    
Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Descubren gracias a este guía como redirigir de manera óptima el tráfico de sus subsidiarias, para permitir un acceso directo a Internet y a sus aplicaciones cloud. Disminuyan sus costes, obtengan una visión completa sobre sus flujos y mejoren la experiencia de sus usuarios tras securizar sus oficinas remotas.
Tags : 
    
Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Descubren nuestro informe semestral Cloud Security Insights Threat Report 2019 – un estudio de las amenazas basadas sobre los protocolos SSL/TLS, que analiza el trafico encriptado sobre el cloud Zscaler™ entre julio y diciembre de 2018. El informe, recopilado por nuestro equipo de desarrollo del ThreatLabZ, se interesa a la variedad de ataques ejecutados vía SSL y bloqueados por Zscaler, entre las cuales los ataques de phishing, los botnets, la explotación del navegador y el contenido malicioso.
Tags : 
    
Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Aplicaciones como usuarios ya han abandonado la red corporativa. Sin embargo, los sistemas de seguridad siguen todavía en los centros de datos. Ya es hora de repensar su arquitectura y ofrecer una experiencia securizada y optima à sus usuarios, sin que importa donde se encuentran. La seguridad oferta por la plataforma cloud de Zscaler les permite transformar su red para disfrutar de las ventajas de un mundo orientado al cloud y a la movilidad. Descubren más con este libre blanco.
Tags : 
    
Zscaler
By: Zscaler     Published Date: Jun 20, 2019
El concepto de backhauling hacia un centro de datos parece interesante cuando aplicaciones como usuarios residen dentro. Pero con colaboradores en sus diferentes oficinas y aplicaciones que migran hacia el cloud, redirigir el tráfico sobre una red en estrella ofrece una mala experiencia usuario, además de ser caro y de introducir mas riesgos. La red SD-WAN representa una solución a este reto, porque permite poner en marcha conexiones locales a Internet. Y Zscaler se encargar de securizarlas. Descubren como con este libro blanco.
Tags : 
    
Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Una solución para un entorno de TI cambiante Debido al auge de la nube y de la movilidad, el perímetro de seguridad tradicional que antes protegía a los usuarios y los servicios internos dentro de la red corporativa, en gran medida ya no existe. Ha llegado el momento de que la seguridad evolucione, trasladando las protecciones más cerca del usuario y poniendo un nuevo énfasis en la comodidad, flexibilidad y fiabilidad. Descubren más sobre la solución SDP de Zscaler en este libro blanco.
Tags : 
    
Zscaler
By: KPMG     Published Date: Jun 06, 2019
In future, people with IT skills will no longer work only within the IT function. Instead, they’ll be part of an ecosystem of technology talent across the enterprise. How should CIOs respond to this change? Read this briefing to find out: • what the changing status of technology means for the IT workforce • how CIOs can encourage employees to be IT enablers rather than IT ‘doers’ • why we need to rethink IT as a technology talent ecosystem • why IT should no longer be the gatekeeper to technology – and what it needs to become instead.
Tags : 
    
KPMG
By: Workday UK     Published Date: Apr 25, 2019
Technology is now shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san, business process automation, business process management, configuration management, edi
    
NEC
By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, business process automation, business process management, project management, application integration
    
ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
By: MokiMobility     Published Date: Oct 11, 2012
Sports apparel retailer Fanzz uses iPad kiosks to accept in-store orders on their website, increasing the number of sales on their site and keeping more in-store customers.
Tags : 
    
MokiMobility
By: SAP     Published Date: Mar 09, 2017
Learn how CIOs can set up a system infrastructure for their business to get the best out of Big Data. Explore what the SAP HANA platform can do, how it integrates with Hadoop and related technologies, and the opportunities it offers to simplify your system landscape and significantly reduce cost of ownership.
Tags : 
    
SAP
By: Ricoh     Published Date: Mar 11, 2019
Today’s CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIO’s most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation – overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
By: Cisco     Published Date: Jan 04, 2016
Las redes definidas por software (SDN) en la WAN permiten reducir los costes gracias al aumento de la eficacia operativa, una mayor velocidad a la hora de crear servicios, y servicios de redes diferenciados y personalizados.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, it management, wireless
    
Cisco
By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesitó una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integración de los servidores y la infraestructura de la red, así como a capacidades de software más avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless
    
Cisco
By: Lenovo UK     Published Date: Nov 09, 2018
Con una computadora portátil robada a cada minuto, ¿cómo se equilibra la amenaza de seguridad con la creciente necesidad de movilidad de la fuerza laboral y una mayor productividad? Con la ThinkPad impulsada por los procesadores Intel® Core™ i7 vPro™, se beneficia del enfoque de seguridad 360 de Lenovo. Además de la durabilidad para mantener a sus usuarios en movimiento y productivos en cada etapa de su jornada laboral. Aprende más en nuestra infografía. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
    
Lenovo UK
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"Principled Technologies executed four typical deployment and management scenarios using both HPE Synergy and Cisco UCS. They found that HPE Synergy saved 71.5 minutes and 86 steps, and used four fewer tools compared to Cisco UCS. In a hypothetical 200-node datacenter, that’s a total of 9 work weeks, or just over 2 months’ time savings on routine tasks."
Tags : 
    
Hewlett Packard Enterprise
By: Zendesk     Published Date: May 21, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-serv ice leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service,every single day.
Tags : 
    
Zendesk
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter