phi

Results 151 - 175 of 1970Sort Results By: Published Date | Title | Company Name
By: Lenovo UK     Published Date: May 15, 2019
Con una computadora portátil robada a cada minuto, ¿cómo se equilibra la amenaza de seguridad con la creciente necesidad de movilidad de la fuerza laboral y una mayor productividad? Con la ThinkPad impulsada por los procesadores Intel® Core™ i7 vPro™, se beneficia del enfoque de seguridad 360 de Lenovo. Además de la durabilidad para mantener a sus usuarios en movimiento y productivos en cada etapa de su jornada laboral. Aprende más en nuestra infografía. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside y Intel Optane son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
De opkomst van mobiliteit zorgt ervoor dat IT-teams overal hoofdpijn hebben, met het potentieel voor hogere kosten en risico's. Maar met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, krijgt u 360 graden beveiliging, betrouwbare duurzaamheid en compromisloze productiviteit op elk apparaat. Lees meer in onze white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
     Lenovo UK
By: HP Inc.     Published Date: May 20, 2019
With a couple of swipes, a like and a share, what’s in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fastspreading global pop culture that determines what’s hot, and what’s not, almost instantly. By creating unique printed and digital assets that engage consumers and drive social media posts (and a whole lot of likes and shares), brands can leverage the “Instagram effect” to attract customers. Start with these trends, and keep reinventing!
Tags : 
     HP Inc.
By: HP Inc.     Published Date: May 20, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
     HP Inc.
By: HP Inc.     Published Date: May 21, 2019
Dans un monde éphémère de swipes, de likes et de shares, ce qui existe aujourd'hui aura disparu demain. Les tendances du design graphique évoluent rapidement pour suivre une culture pop mondiale qui se répand à grande vitesse et qui détermine ce qui est à la mode et ce qui ne l'est pas quasi instantanément.
Tags : 
     HP Inc.
By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
     Limelight Network
By: Dell EMEA     Published Date: Aug 20, 2019
To achieve better outcomes and accelerate innovation in an increasingly digital era, organizations need to align their business strategies to the demands and possibilities of the cloud and tomorrow's digital world. And that means modernizing IT. Improve your SAP experience and innovate faster.
Tags : 
     Dell EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
It’s likely not a matter of if, but when your company will fall prey to targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today’s hyperconnected world.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The challenges that IT security professionals face grow more complex daily: Cyberthreats are sophisticated and ever-evolving, the workforce is varied and mobile, and access to the corporate network must be customized and efficient.
Tags : 
     Akamai Technologies
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
     Delphix
By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
     Delphix
By: Delphix     Published Date: May 03, 2016
Today's test data management (TDM) solutions force teams to work with compromised data sets, and push testing to too late in the software development lifecycle. The end result is rework, delayed releases, and costly bugs that cripple production systems. Furthermore, prevailing approaches to test data management - including subsetting, synthetic data, shared environments, and standalone masking--represent flawed solutions that fail across one or more key dimensions.
Tags : 
     Delphix
By: Delphix     Published Date: May 03, 2016
Looking to streamline processes across development, test, and operations teams with more efficient Test Data Management (TDM)? Don't let antiquated technology and complex processes stand in the way of fast access to high-quality test data. Next-generation TDM transforms how businesses deploy testing environments and the way teams work within them, providing both greater flexibility and increased efficiency.
Tags : 
     Delphix
By: Dell     Published Date: Feb 04, 2016
What exactly is the right PC hardware? There are many great choices, but you have to think carefully through the buying decision. This interactive infographic will help.
Tags : 
     Dell
By: Dell     Published Date: Aug 11, 2015
For every $950 spent on a new system, organizations can spend over $2,400 to support it through a three year lifecycle— that’s why Dell provides systems management solutions that are superior to the competition. Download this infographic to learn why customers buy Dell.
Tags : 
     Dell
By: Dell     Published Date: Aug 10, 2015
Download this infographic to uncover the economic benefits of private cloud and how to see a better ROI while building a solution ready for tomorrow.
Tags : 
     Dell
By: Dell     Published Date: Nov 03, 2015
Download this infographic to learn how Microsoft Azure can benefit your organization and help your organization to: -Extend apps -Simplify protection -Understand the trade-offs
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 02, 2015
Download this infographic to see how how PowerEdge FX takes a more modular approach to converged infrastructure, which gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at: • Super-fast deployment and scalability • Take on enterprise workloads and deliver a smooth yet powerful user experience • Keep peace of mind with accessibility and immediate issue alerts This report shows how you can streamline IT infrastructure, achieve new levels of speed and performance to improve end-user experiences, and allow extra time for innovation. Learn more, read this brief but interesting infographic.
Tags : it infrastructure, hyper-convergence, next-gen, storage, virtual machines, scale-out
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : servers, flash storage, modular platforms, software-defined, networking, infrastructure
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com