modern

Results 176 - 200 of 1852Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Organisations that modernise IT with hyper-converged systems from Dell EMC achieve operating and cost efficiencies, allowing them to invest more in innovation, says IDC. Start your IT Transformation with Dell EMC hyper-converged systems. Simplify IT and see real results. Competing in today’s digital economy requires companies to innovate from the infrastructure out. Look for advanced technologies like VxRail and VxRack hyper-converged systems to lower costs, boost revenue and accelerate workloads — so you can set aside more funds for innovation. Start your IT Transformation with Dell EMC hyper-converged systems powered by Intel® Xeon® processors.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
For organisations that aim to modernise their IT environments and limit operational risks that can incur costs, IDC recommends making data protection initiatives a top priority. Modernise data protection to cut IT costs and advance IT Transformation. Modern data protection enables organisations to shrink data backup and recovery windows , which means fewer security breaches and faster resolutions when they do happen. To truly transform IT, modernise your data center to increase IT efficiency and shed technical debt while protecting your bottom line. Drive IT Transformation and results with leading enterprise solutions from Dell EMC powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
Laut IDC erzielen Unternehmen, die ihre IT mit hyperkonvergenten Systemen von Dell EMC modernisieren, Betriebs- und Kosteneffizienzen und können mehr in Innovationen investieren. Um in der heutigen digitalen Wirtschaft wettbewerbsfähig zu bleiben, müssen Unternehmen schon in der Infrastruktur auf Innovationen setzen. Entscheiden Sie sich für fortschrittliche Technologien wie hyperkonvergente VxRail- und VxRack-Systeme, um Kosten zu senken, den Umsatz zu steigern und Workloads zu beschleunigen – und so mehr Mittel für Innovationen bereitzustellen. Beginnen Sie Ihre IT-Transformation mit hyperkonvergenten Systemen von Dell EMC mit Intel® Xeon® Prozessoren.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
IDC empfiehlt Unternehmen, die ihre IT-Umgebungen modernisieren und operative Risiken, die Kosten verursachen können, begrenzen möchten, Data-Protection-Initiativen höchste Priorität einzuräumen. Um Ihre IT wirklich zu transformieren, modernisieren Sie Ihr Rechenzentrum, um die IT-Effizienz zu steigern. Befreien Sie sich aus Ihren technischen Abhängigkeiten und schützen Sie gleichzeitig Ihre Erträge. Treiben Sie die IT-Transformation voran und erzielen Sie Ergebnisse mit führenden Unternehmenslösungen von Dell EMC, powered by Intel®.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Sep 06, 2018
La protection moderne des données permet aux organisations de réduire les fenêtres de sauvegarde et de restauration des données, ce qui donne lieu à moins de violations de sécurité et à des résolutions plus rapides lorsqu’elles se produisent. Pour véritablement transformer l’IT, modernisez votre datacenter afin d’augmenter l’efficacité IT et de réduire la dette technique, tout en protégeant vos résultats financiers. Stimulez la transformation de l’IT et les résultats grâce aux solutions d’entreprise leaders de Dell EMC, optimisées par Intel®
Tags : 
    
Dell EMC & Intel
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: Oracle     Published Date: Aug 01, 2018
Les systèmes de sauvegarde traditionnels ne répondent pas aux besoins des entreprises modernes étant donné qu’ils sont axés sur la sauvegarde, et non sur la restauration. Ils traitent les bases de données comme des fichiers génériques à copier, au lieu de les considérer comme des charges de travail transactionnelles qui présentent des exigences spécifiques d’intégrité, de cohérence, de performance et de disponibilité des données.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
Traditionelle Backup-Systeme können den Anforderungen moderner Unternehmen nicht nachkommen, weil sie auf die Datensicherung (Backup) und nicht auf die Wiederherstellung (Recovery) ausgerichtet sind. Sie behandeln Datenbanken als generische Dateien, die kopiert werden müssen, und nicht als transaktionale Workloads mit spezifischen Anforderungen in Bezug auf die Datenintegrität, Konsistenz, Leistung und Verfügbarkeit.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
I sistemi di backup tradizionali non sono in grado di rispondere alle esigenze delle organizzazioni moderne perché si concentrano sul backup e non sul ripristino. Trattano i database come file generici da copiare anziché carichi di lavoro transazionali con requisiti specifici di integrità dei dati, coerenza, prestazioni e disponibilità. Inoltre, i settori altamente regolati, come i servizi finanziari, sono soggetti a obblighi normativi sempre crescenti che richiedono una protezione rigorosa dalle violazioni dei dati, la perdita di dati, il malware, il ramsomware e altri rischi. Questi rischi richiedono un recupero dati fiduciario per eliminare l’esposizione della perdita di dati garantendone integrità e conformità. Questo libro spiega le sfide per la protezione dei moderni database e il recovery (Capitolo 1), gli aspetti importanti di una soluzione di protezione e del ripristino dei database (Capitolo 2), le soluzioni di protezione e recupero dei database di Oracle (Capitolo 3), e le r
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: SAP Ariba     Published Date: Oct 11, 2018
Last week, SAP Ariba held a human trafficking roundtable event at its SAP Hudson Yards New York City offices. The roundtable focused on the United Nations Global Compact that adopted 17 sustainable development goals for its 2030 agenda two years ago. While most individuals and businesses believe slavery was abolished years ago, there are currently over 40 million forced laborers worldwide. The United Nations Global Compact initiative is assisting in highlighting the problem of modern slavery, forced labor, and noncompliance with human rights. And this initiative lines up quite well with procurement and global supply chains.
Tags : 
    
SAP Ariba
Published By: insightsoftware     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line.
Tags : 
    
insightsoftware
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
Abbiamo individuato tre diversi tipi di dipendenti che rappresentano la forza lavoro moderna. Ciascun tipo ha esigenze specifiche in termini di hardware. In un contesto in cui il lavoro da remoto sta diventando un aspetto quotidiano del business moderno, il rischio che dati critici vengano compromessi aumenta notevolmente. La perdita dei dati può essere paralizzante, determinando perdita di opportunità di business, danneggiamento della reputazione e anche sanzioni punitive. Scopri di più sulle soluzioni Dell in collaborazione con Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
De traditionele vorm van levenscyclusbeheer voor pc’s is een inefficiënt en duur proces dat uw bedrijf veel tijd en geld kost. Met de PCaaS-oplossing van Dell EMC (PC-as-a-Service) kan de zakelijke aanpak van uw IT-infrastructuur worden getransformeerd. Externe werkzaamheden vormen een dagelijks aspect van het moderne bedrijfsleven en daarmee is het risico op inbreuk van kritieke data enorm toegenomen. Gegevensverlies kan uw bedrijf stilleggen en leiden tot zakelijk verlies, reputatieschade en zelfs boetes. Leer meer over Dell oplossingen powered by Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
In order to keep pace with the growth of business mobility without falling prey to its potential risks, IT must be able to efficiently address complex issues ranging from service provisioning, device procurement, and security oversight. Why? Information workers need access to often sensitive information across a wide range of business applications and devices from wherever they are. In other words, security and privacy policies that doesn’t impede end-user productivity will empower workers and boost their performance. Download this whitepaper to learn more about Dell solutions powered by Intel® such as how to boost your workers performance.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
`Um mit dem Wachstum der geschäftlichen Mobilität Schritt zu halten, ohne dabei den potenziellen Risiken zu erliegen, muss die IT in der Lage sein, komplexe Probleme wie Servicebereitstellung, Gerätebeschaffung und Sicherheitsüberwachung effizient anzugehen. Warum? Information Worker benötigen in einer Vielzahl von Geschäftsanwendungen und -geräten Zugriff auf häufig vertrauliche Informationen, unabhängig von ihrem Standort. Mit anderen Worten: Sicherheits- und Datenschutzrichtlinien, die die Produktivität der Endbenutzer nicht beeinträchtigen, werden die Mitarbeiter stärken und ihre Leistung steigern. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Afin de tenir le rythme de la croissance de la mobilité des entreprises, en évitant ses risques potentiels, le service informatique doit être capable de traiter efficacement les problèmes complexes, allant de la prestation de services, à l'acquisition d'appareils, en passant par la surveillance de la sécurité. Pourquoi cela ? Les travailleurs de l'information ont besoin d'accéder à des informations souvent sensibles sur une grande diversité d'applications métier et d'appareils, où qu'ils soient. En d'autres termes, les politiques de sécurité et de confidentialité qui ne nuisent pas à la productivité des utilisateurs finaux permettront d'habiliter les employés, tout en optimisant leurs performances. En savoir plus sur les solutions Dell en collaboration avec Intel®
Tags : 
    
Dell EMC EMEA
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Con el fin de seguir el ritmo del crecimiento de la movilidad empresarial sin ser víctima de riesgos potenciales, la TI debe ser capaz de resolver, de forma eficaz, problemas complejos que van desde el aprovisionamiento de servicios, a la adquisición de dispositivos y la supervisión de la seguridad. ¿Por qué? Los trabajadores de la información deben acceder a información, que a menudo es confidencial, en una amplia gama de aplicaciones y dispositivos empresariales y desde cualquier lugar. En otras palabras, las políticas de seguridad y privacidad que no obstaculizan la productividad del usuario final facultarán a los trabajadores y mejorarán su rendimiento.. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.