new technology

Results 651 - 675 of 746Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Jun 27, 2016
NetApp has acquired SolidFire, and combined the performance and economics of all-flash storage with a webscale architecture that radically simplifies data center operations and enables rapid deployments of new applications. Hear IDC's view about the NetApp Flash Portfolio and the integration of SolidFire technology.
Tags : 
    
NetApp
Published By: AdRoll     Published Date: Jan 21, 2016
A closer look at retargeting, programmatic advertising, and performance marketing. Due to its prevalence, it's easy to lose track of how new the programmatic advertising industry is. And as with any new industry driven by a disruptive technology, things are changing quickly. We surveyed 1,050 US marketers across industries to uncover how businesses are adopting new marketing opportunities brought about by programmatic advertising.
Tags : 
adroll, retargeting, programmatic advertising, performance marketing, programmatic advertising, marketers spend
    
AdRoll
Published By: AdRoll     Published Date: Jul 11, 2017
Account-based marketing (ABM) has recently become a popular term among business-to-business (B2B) marketers. ABM refers to a marketing practice where efforts focus on a predetermined set of customers who meet certain criteria. A set of customers can be narrowly defined and specific—like CIOs, or decision makers at Fortune 100 companies. It also can be more fluid and based on a set of parameters—like marketing directors at financial institutions or technology companies. At its core, ABM combines long-standing marketing best practices with new technologies. It allows marketers to target the right prospects with personalized marketing messages and then automate their entire customer acquisition process
Tags : 
account-based marketing, new technology, automation, business-to-business, personalized marketing
    
AdRoll
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10
    
A10 Networks
Published By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : 
internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi
    
Alacritech
Published By: Schneider Electric     Published Date: Feb 12, 2018
Technology is infiltrating K-12 classrooms at a rapid clip as educators find new ways to employ computing devices and online resources to improve education and learning. Overall, the global market for education-related technology, services and content is expected to grow from $193 billion in 2016 to $586 billion in 2021, a compound annual growth rate of nearly 25%, according to the market research firm Research and Markets.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for “Industry 4.0” is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
smart machines, industry 4.0, smart factory, iiot, opc ua, data, analytics, machine services
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
The industry of tomorrow will be different. More volatile markets, new technology capabilities, and increased pressure on performance will precipitate the change. But with change comes opportunity…the Industrial Internet of Things (IIoT) has unleashed huge potential for industrial customers. There is a reported $14 trillion of new business growth up for grabs – and your goal of better business performance can help you earn your fair share of that growth. How can you make the most of this potential? Read the rest of this eBook to learn more.
Tags : 
vsd, vfd, variable speed drives, variable frequency drives, iiot, water, wastewater, oil & gas
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: IBM     Published Date: Sep 18, 2008
Retailers regularly adapt to customer trends by investing in new systems technology. But they may not be aware that a system's initial purchase price is only 20 to 45% of the total cost of ownership of their system, and there's more to understand about the true cost of your purchase. Find out more on investing in the information system for your unique business.
Tags : 
ibm, ibm mmdg, infrastructure, networking, tco, total cost of ownership
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Server technologies and storage technologies are converging, enabling a powerful new era of information on demand. IBM System Storage solutions are supporting companies’ green initiatives with energy efficient tools and technology that reduce cooling costs and take up less space. The solutions are also resilient enough to grow and adapt with you.
Tags : 
ibm, express seller, server technology, storage technology, ibm system storage, energy efficient, virtualization products, storage manage software
    
IBM
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture
    
Objectivity
Published By: Envisional     Published Date: Dec 21, 2006
The Internet's reach and anonymity have played a big part in the 100-fold growth of counterfeiting since the 1980s. The web provides a shop window on the world, yet it's impossible to police.
Tags : 
counterfeiting, hacker, counterfeit, brand infringement, branding, copy, envisional
    
Envisional
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking
    
Provenir
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : 
fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency
    
WorldTelemetry, Inc.
Published By: HP     Published Date: May 10, 2011
This IDC white paper discusses the elements of power/cooling expenses, the management challenges of attaining new efficiencies, and HP's holistic approach to reducing energy consumption with Thermal Logic technology.
Tags : 
power and cooling efficiency, energy efficiency, datacenter, tco, jed scaramelia, energy consumption reduction, thermal logic technology
    
HP
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security
    
CopiaTECH
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media, software development
    
Integration New Media
Published By: Diligent Technologies     Published Date: Apr 11, 2008
New technologies exist that can radically slim down the physical storage requirements for secondary disk storage. Taneja Group refers to these technologies as Capacity Optimization (CO) technologies. In this technology brief, we will examine what IT teams should be looking for in a capacity optimization solution, and then share our perspective on the Diligent HyperFactor technology.
Tags : 
deduplication, minimizing storage, minimize storage, diligent technologies, diligent, storage
    
Diligent Technologies
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.