ctr

Results 301 - 325 of 992Sort Results By: Published Date | Title | Company Name
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo, home networking, texas intruments
    
Texas Instruments
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations are now responsible for delivering seamless customer experiences while preventing outages and managing an increasing number of systems. With growing responsibility placed on IT, there is an opportunity to drive strategy for company-wide business processes and operations. Companies using machine data powered platforms like Splunk collect disparate data types to quickly troubleshoot and monitor systems. By adding predictive capabilities, IT can glean critical insights for the business and develop strategic initiatives on issues that matter. Download the white paper “Embracing the Strategic Opportunity of IT” to learn how to: Enable a business aware IT organization Unlock operational efficiencies Solve problems with predictive analytics
Tags : 
it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms, monitor end to end, itoa, aiops, predictive analysis, machine learning, event correlation, event management, it operations analytics, it analytics, ibm watson, hp monitoring, hp operations manager
    
Splunk
Published By: Dell EMC     Published Date: Mar 18, 2016
Over the past few years, new IT infrastructure options for enterprise transactional applications have arisen thanks to numerous improvements in storage processing power and the robustness of networking protocols. SAN protocols are no longer the only option for IT storage administrations. VMware, Hyper-V, SQL, and even SAP and Oracle deployments have taken advantage of the benefits offered by NFS, and more recently SMB 3, network-attached storage (NAS) protocols. However, support for NAS protocols alone is not enough. EMC and Brocade understand that supporting enterprise applications requires delivering enterprise storage and networking capabilities to maximize resiliency and performance.
Tags : 
emc, vnx, connectrix, transactional nas, enterprise workloads, infrastructure, business technology
    
Dell EMC
Published By: SAS     Published Date: Jun 27, 2019
The health care world is changing. And data has a role to play in that change. Traditional health care systems are becoming more accessible and convenient, while also offering lower priced options. Proactive care — rather than reactive — is expected, including a shift from disease management to disease prevention. Likewise, a greater emphasis on personalized delivery, including understanding populations, has led to increased precision in holistic care management. Combining conventional data sources with data from previously untapped data sources — such as electronic health records, wearables, social determinants, social media, genetics and diagnostics — creates new possibilities for understanding the patterns, relationships, and predictors of wellness and health. Keep reading this e-book to discover how health care leaders are generating new opportunities for innovation and transforming how care is delivered.
Tags : 
    
SAS
Published By: EMC Corporation     Published Date: May 27, 2011
Read this IDC case study to learn how Emerson Electric Co. transformed its IT infrastructure.
Tags : 
emc, idc case study, emerson, it infrastructure, deduplication, efficiency, backup and recovery, disaster recovery
    
EMC Corporation
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software
    
Deep Software
Published By: Schneider Electric     Published Date: May 07, 2019
Empowering 21st Century learning and teaching is a core value of California’s Moreno Valley Unified School District (MVUSD), and its Information Systems Technology Department believes delivering on this mission requires technology to be seamlessly integrated with the educational process.
Tags : 
g-suite, ecostructure, schneider electric
    
Schneider Electric
Published By: Onbase     Published Date: Feb 18, 2016
During the past 10 years, organizations have adopted accounts payable (AP) automation technologies at an accelerating pace. Document imaging, data capture, and other solutions are radically transforming the way AP departments work with their traditionally most common medium, paper. At the same time, the promise of electronic transactions is quickly becoming more of a reality, with growth year after year in the number of transactions sent and received electronically.
Tags : 
accounts payable, account management, business practices, optimization strategies
    
Onbase
Published By: Schneider Electric     Published Date: Apr 20, 2018
Align data center infrastructure strategy to meet business needs.
Tags : 
prefab, data center, bandwidth, security, data center
    
Schneider Electric
Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores common challenges facing E-commerce platform and B2C website managers planning for the holiday shopping rush and bolstering services to meet customer demands.
Tags : 
ecommerce, quality of service, retail economy, application performance, commercialization, online payments, electronic transactions
    
VMTurbo
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
Published By: HP     Published Date: Jun 09, 2014
A brochure on the challenges addressed by HP Records Manager.
Tags : 
records manager, edrm
    
HP
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology, networking, it management
    
Comcast Business
Published By: Schneider Electric     Published Date: May 31, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
As if the selection of manufacturer weren't enough, many encoders offered in today's marketplace are highly configurable. Resolution, shaft size, seal options and connector variations all confront the design engineer with serious choices. Output type is equally important. In this paper, we'll cover some of the more typical applications and common output types.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output, electronics, manufacturing
    
Dynapar Corp.
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output, electronics, manufacturing
    
Dynapar Corp.
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.
Tags : 
digital rights management, locklizard, key management, time limitations enforcement, it management, knowledge management
    
LockLizard
Published By: Spectra Logic     Published Date: Aug 21, 2009
Read how Spectra Logic Corporation's BlueScale Encryption integrates hardware encryption directly into the electronics of a tape library, offering a practical, affordable, & scalable option.
Tags : 
backup, database security, data security, encryption, tape-based backup, tape backup, data encryption, spectralogic, spectra logic, storage
    
Spectra Logic
Published By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : 
hp data center, energy efficiency, data center, high-availability it environments, green initiatives, it infrastructure, epeat, global commerce, hvac, crah, cdpr, power usage effectiveness, pue, go green, dcie, networking
    
HP Data Center
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : 
compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc
    
PTC
Published By: Cisco     Published Date: Nov 18, 2015
Smart technologies are a force multiplier for public safety agencies, allowing them to serve growing populations even as public spending remains constrained. The Internet of Everything (IoE) provides the connective tissue in this evolving operational environment — not only bringing together objects embedded with electronics, software and sensors, but making them work together in the service of better policing. The IoE makes it possible to collect data and share it via the cloud, uniting disparate jurisdictions, agencies and ranks of command in positive ways. These smart and connected technologies promote collaboration and transparency among public safety agencies, revolutionizing how police, fire, courts and corrections do some of the nation’s most important work.
Tags : 
public safety, data, cloud, communication, ioe, networking, it management
    
Cisco
Published By: Schneider Electric     Published Date: Oct 17, 2016
Die Kostenverursacher der TCO warden quantifiziert. Es wird gezeigt, dass der größten Kostenverursacher unnötige Kosten aufgrund einer überdimensionierten Infrastruktur sind.
Tags : 
    
Schneider Electric
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.