part design

Results 1 - 25 of 74Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jan 11, 2018
This white paper reports on the development of HP Multi Jet Fusion technology, which includes new HP Jet Fusion 3D Printers and an Open Platform that will revolutionize the design, materials, manufacturing, and distribution of 3D parts to drive the digital transformation of manufacturing.
Tags : 
3d printing, open platform, 3d printers, parts design, manufacturing materials
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking
    
Cisco
Published By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment, networking
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
business models, development, business solutions
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
    
Cisco
Published By: Teradata     Published Date: Jan 30, 2015
It is hard for data and IT architects to understand what workloads should move, how to coordinate data movement and processing between systems, and how to integrate those systems to provide a broader and more flexible data platform. To better understand these topics, it is helpful to first understand what Hadoop and data warehouses were designed for and what uses were not originally intended as part of the design.
Tags : 
teradata, data, big, data, analytics. insights, solutions, business opportunities, challenges
    
Teradata
Published By: BI WORLDWIDE     Published Date: Dec 22, 2014
As a manufacturer, your uncontrolled distribution channel has a lot of places to focus their attention. So how do you break through the clutter? Reward and recognition programs have long been used to engage channel partners and align their activities with manufacturers’ goals. Applying behavioral economics to your program design will drive extra focus and effort. Learn ten best practices to follow when designing your next channel reward and recognition program.
Tags : 
customer loyalty, loyalty program, customer engagement, brand loyalty, brand advocacy, channel engagement, channel incentives, channel loyalty
    
BI WORLDWIDE
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: Salesforce.com     Published Date: Sep 20, 2013
In 2013 Salesforce.com partnered with Fifth Quadrant to conduct quantitative and qualitative research into the customer service space in Australia and New Zealand. The research was designed to specifically examine new channels for service delivery such as Mobile Devices, Social Media to name a few and the maturity level of Australian organisations in regards to Customer Experience Strategy.
Tags : 
salesforce, crm, crm solutions, research, best practices, ces, technology
    
Salesforce.com
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
The United States’ largest department store, Macy’s, took to the stage at Oracle OpenWorld to talk about its shift from on-premise to the cloud, which is being facilitated by its need to completely redesign its HR function. See why Macy’s is calling Oracle’s HCM Transformation approach the model of the future.
Tags : 
    
Oracle HCM Cloud
Published By: HP Inc.     Published Date: Jul 17, 2017
Three-dimensional printing of useful objects and machine parts is becoming a reality. 3D printing offers the ability to produce—both rapidly and at low cost—short runs or one-of-a-kind parts. HP’s development of HP Multi Jet Fusion technology includes new HP Jet Fusion 3D Printers and an Open Platform that will revolutionize the design, materials, manufacturing, and distribution of 3D parts to drive the digital transformation of manufacturing. This technical white paper provides details on HP Multi Jet Fusion and HP’s strategies and vision to introduce a new era of digital manufacturing.
Tags : 
print services. hp technology, 3d printing, printer, digital manufacturing, printing solution, digital materials, production software, 3d technology
    
HP Inc.
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Over the last several years CA Technologies has acquired a number of companies and their respective products, to augment its continuous delivery suite and, especially, its DevTest portfolio. In particular, it has recently acquired Grid-Tools and Rally Software. Bloor Research has been asked to explore how Grid Tools’ products – now known as CA Test Data Manager (formerly Datamaker and CA Datafinder) and CA Agile Requirements Designer (formerly Agile Designer) expand and augment the capabilities provided by CA Service Virtualization (previously iTKO’s LISA) and CA Agile Central (formerly Rally), making the whole greater than the sum of the parts.
Tags : 
technology, business value, ict investments, research services, consultancy projects, bloor research, continuous testing, testing effort
    
CA Technologies EMEA
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
    
Sophos
Published By: hybris software     Published Date: Aug 01, 2012
It's true that deploying B2B e-commerce platform involves many unique requirements not commonly found in B2C operations, such as incorporating a complex product port-folio, multiple distribution channels, and integrating with third party systems And yet, it's possible to complete an initial out-of-the-box B2B implementation within three months, if all the right critical path steps are followed. Additional features and functionality can be added after the initial launch, provided that the chosen out-of-the-box platform is designed to be used over the long run.
Tags : 
information technology, finance, analytics, maerchandising, product management, marketing, mapping, requirements gathering
    
hybris software
Published By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : 
mcafee, intel, security, threat, strategy
    
Intel Security
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Today, as IT departments struggle to design and implement solutions capable of managing exponential data growth with strict requirements for application scale and performance, many of them are turning to in-memory data grids (IMDGs).
Tags : 
it departments, data growth, managing data growth, application scale, application performance, in-memory data grids, imdgs, big data
    
Red Hat, Inc.
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare
    
STANLEY Healthcare
Published By: OpenText     Published Date: Sep 27, 2017
The global nature of today’s manufacturing industry means that it is more important than ever to ensure that all participants in the design and engineering process are able to access digital information relating to a product any time, or anywhere around the world.
Tags : 
opentext, manufacturing, design, engineering, digital
    
OpenText
Published By: Juniper Networks     Published Date: Aug 03, 2017
Give it a task, and it does it flawlessly. It even responds to events without staff having to intervene. When automation is part of a network’s design, the entire business flourishes. Here’s how it all happens.
Tags : 
automation, network design, business efficiency, network improvement
    
Juniper Networks
Published By: Singularity University     Published Date: Oct 20, 2017
Shines a light on Singularity University's valuable partnership with the city of Columbus for a very important mission, to help design smart cities of the future.
Tags : 
    
Singularity University
Published By: NuView     Published Date: Jun 07, 2011
Is your HR department equipped to handle the Health Care Reform Changes? NuView is the only vendor that offers this level of flexibility and configurability designed to help you adapt to the healthcare reform changes. Download to see the changes and timeline for important issues planned during each calendar year.
Tags : 
nuview, health care reform, president obama, ppaca, hceaa
    
NuView
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : 
foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: Citrix     Published Date: Apr 06, 2017
Local governments face a growing public demand for services, and unprecedented cuts in expenditures. Consequently, their IT departments need to start thinking fresh.This includes supporting fundamental change in council operations, enabled by digital transformation. IT leaders must not only understand what technology can be harmonized and shared, and what must be designed individually for specific needs, but also where legacy IT has become a barrier to change.
Tags : 
digital, transformation, government, citrix
    
Citrix
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.