pto

Results 1 - 25 of 443Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Mar 27, 2014
Locala wanted to improve healthcare by integrating technology more deeply into the provision of services. A key goal was boosting caregiver access to real-time patient data while in the field. The healthcare provider chose a private cloud solution with single-service desk from Dell. Clinicians also gained Dell Latitude laptops to connect to their cloud-based systems and for web conferencing.
Tags : 
    
Dell
By: Dell     Published Date: Mar 27, 2014
A community healthcare services provider extends consultation times, increases patient-facing time by 5 per cent and the number of virtual contacts by 20 per cent with Dell private cloud solution and Dell laptops
Tags : 
    
Dell
By: Dell     Published Date: Apr 01, 2014
A community healthcare services provider extends consultation times, increases patient-facing time by 5 per cent and the number of virtual contacts by 20 per cent with Dell private cloud solution and Dell laptops.
Tags : 
    
Dell
By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
By: ALE USA, Inc     Published Date: Nov 01, 2019
Today, most students in primary and secondary schools have never experienced life without the internet or smartphones. This reality is reflected in the classroom where digital learning processes and experiences are enhancing traditional textbooks and upending conventional classroom teaching methods. Online lessons, testing and assessments are now part of most curricula. Laptops, tablets and smartphones have become primary instruction tools for students, who are downloading an increasing number of online apps to enhance their digital learning experience. Teachers and lecturers alike rely on robust, reliable Wi-Fi across their campus to access the full range of teaching tools available to them.
Tags : 
    
ALE USA, Inc
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
By: Lenovo UK     Published Date: Nov 09, 2018
Kopfschmerzen mit dem Potenzial für erhöhte Kosten und Risiken. Mit ThinkPad, das auf Intel® Core™ i7 vPro™ Prozessoren basiert, erhalten Sie 360-prozentige Sicherheit, zuverlässige Haltbarkeit und uneingeschränkte Produktivität für jedes einzelne Gerät. Erfahren Sie mehr in unserem Whitepaper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività, mobilità, lenovo x1, mobilità della forza lavoro
    
Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
Avec un ordinateur portable volé chaque minute, comment conciliez-vous la menace pour la sécurité et le besoin croissant de mobilité de la main-d'œuvre et d'une productivité accrue? Avec le ThinkPad optimisé par les processeurs Intel® Core™ i7 vPro™, vous bénéficiez de l’approche 360 de Lenovo en matière de sécurité. Plus la durabilité pour garder vos utilisateurs en mouvement et productifs à chaque étape de leur journée de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, lenovo x1, workforce mobility
    
Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core™ i7 vPro™ Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
Con un laptop rubato ogni minuto, come bilanci la minaccia alla sicurezza contro il crescente bisogno di mobilità della forza lavoro e una maggiore produttività? Con ThinkPad basato su processori Intel® Core™ i7 vPro™, puoi beneficiare dell'approccio 360 alla sicurezza di Lenovo. Inoltre, ti aiuta a mantenere i tuoi utenti in movimento e produttivi in ogni fase della loro giornata lavorativa. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività, mobilità, lenovo x1, mobilità della forza lavoro
    
Lenovo UK
By: Lenovo UK     Published Date: Nov 09, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA
By: Dell     Published Date: Sep 24, 2018
As the shift into a digital economy continues to accelerate, companies must out-innovate, outthink, and outpace their competition. Businesses must embrace change and transform to become the disruptors in their industries rather than wait to be disrupted by their competitors. In the face of this pressure to evolve, organizations need to transform IT to reduce both the capital and operational costs of legacy IT. They must offload repeatable and time-intensive manual tasks like backup, disaster recovery, and service deployment to software and policy-driven automation.
Tags : 
economic, value, cloud, data, protection, dell emc
    
Dell
By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
In this paper, Stratecast discusses the technologies that are disrupting how business is conducted— and how they impact and are impacted by your data center infrastructure. We define the ideal IT environment, and present ways to achieve it with flexible, composable infrastructure.
Tags : 
    
Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
It seems strange to think that just a few years ago, the IT department was considered a supplier to the organization. Today, IT leaders are at the forefront of their companies’ march into the digital age. Technology is now recognized as a key enabler for achieving strategic business goals, including revenue growth, market expansion, and customer satisfaction; and IT leaders have risen to the challenge of simultaneously running the organization while identifying and leveraging innovative solutions that can drive growth.
Tags : 
it leaders, business goals, innovative solutions, customer satisfaction, infrastructure improvement
    
Hewlett Packard Enterprise
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
By: Cisco     Published Date: Jul 08, 2016
Disruptors now harness the power of digital to create new sources of value that reduce costs, improve the customer experience, and scale their offerings. Digital disruptors also enjoy a decided innovation advantage over established companies: they are better able to identify new opportunities, and move faster to take advantage of them. In this intensely competitive environment, startups and agile firms are overturning incumbents with digital business models, products, and services.
Tags : 
    
Cisco
By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
By: Lenovo and Intel     Published Date: Jan 20, 2017
We all love laptops, tablets, and mobile devices; but, sometimes you need a powerful desktop that still fits neatly in small, awkward, or even non-traditional spaces. Enter Tiny. In this eBook, we dive into the diverse settings where Tiny has proven to be the better fit. Get the eBook now.
Tags : 
lenovo, government technology, infrastructure, hardware
    
Lenovo and Intel
By: VMware AirWatch     Published Date: Jul 19, 2017
How can your business support new identity-defined workspaces across a variety of users — retail store associates checking inventory on a PC and a smartphone, hospital clinicians entering test results into a mobile workstation and an iPad, or financial advisors placing trades from Android devices and laptops? The answer is the digital workspace.
Tags : 
    
VMware AirWatch
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.