"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

tables

Results 1 - 25 of 30Sort Results By: Published Date | Title | Company Name
Published By: Workday France     Published Date: Sep 27, 2018
: Dans le paysage informatique d'aujourd'hui, de nombreuses entreprises envisagent d'adopter une solution Cloud. Mais, étant donné le nombre important d'éditeurs qui proposent des solutions SaaS, comment identifier ceux qui vous permettront de bénéficier des véritables avantages de ce modèle ? Quelles sont les caractéristiques à prendre en compte lorsque vous envisagez d'adopter une solution SaaS, et quels impacts peut-on en attendre ? Dans ce livre blanc consultable gratuitement, vous découvrirez : Ce qui définit le mode SaaS Comment distinguer les fournisseurs d'une véritable solution SaaS et les autres ? La question de la sécurité Les économies potentielles que votre entreprise peut réaliser Comment déterminer si votre entreprise être prête à aller vers le mode SaaS Ce livre blanc s'adresse aussi bien aux professionnels de l'informatique qu'à toute personne cherchant à comprendre les concepts de base du SaaS.
Tags : 
    
Workday France
Published By: TreasureData     Published Date: May 14, 2012
Treasure Data is going to change the way that you think about Big Data and Cloud Data Warehousing. We'd like to get your input on how you see Big Data and Cloud Data Warehousing. Please take our 10 question survey and give us your input.
Tags : 
treasuredata, data warehousing, cloud, big data, solution, data-driven, tables, queries, analytics, infrastructure, storage, billing, visualization, data management, virtualization, cloud computing, design and facilities
    
TreasureData
Published By: Schneider Electric     Published Date: Oct 17, 2016
Cet article explique certaines causes de blocage des capacités d'alimentation, de refroidissement et d'espace dans les centres de données en collocation et comment la distribution d'énergie des racks haute densité, le confinement d'air et d'autres pratiques améliorent la disponibilité et l'efficacité. Des exemples de politiques d'utilisation acceptables réglant ces problèmes sont présentés.
Tags : 
    
Schneider Electric
Published By: SAP SME     Published Date: Apr 10, 2018
Las empresas de servicios públicos, en respuesta a las presiones competitivas y de los clientes, se están embarcando rápidamente en el cambio hacia la digitalización. Y si bien muchas apenas están comenzando este recorrido, otras están muy avanzadas en el proceso, experimentando con diferentes tecnologías con la esperanza de impulsar las innovaciones para que sean más ágiles, competitivas y rentables dentro de la industria.
Tags : 
    
SAP SME
Published By: Dell PC Lifecycle     Published Date: May 22, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
    
Dell PC Lifecycle
Published By: CA Technologies     Published Date: Aug 24, 2017
OAuth ist ein relativ neuer Webstandard zur Autorisierung des eingeschränkten Zugriffs auf Anwendungen und Daten. Er sorgt dafür, dass Anwender Drittanbieterkunden, etwa Fotodruckwebseiten, eingeschränkten Zugriff auf ihre Ressourcen gewähren können, z. B. auf Bilder auf Webseiten wie Flickr oder SmugMug. Bisher forderte der Client den Anwender üblicherweise zur Eingabe von Anwenderrnamen und Passwort auf – eine täuschend einfache Bitte, die ein inakzeptables Security-Risiko birgt. OAuth bietet im Gegensatz dazu ein Modell der geringstmöglichen Zugriffsrechte. Anwender können dabei mithilfe eines funktional begrenzten Tokens eingeschränkten Zugriff auf ihre Anwendungen und Daten gewähren.
Tags : 
    
CA Technologies
Published By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
Schneider Electric
Published By: IBM     Published Date: May 17, 2016
Wikibon conducted in-depth interviews with organizations that had achieved Big Data success and high rates of returns. These interviews determined an important generality: that Big Data winners focused on operationalizing and automating their Big Data projects. They used Inline Analytics to drive algorithms that directly connected to and facilitated automatic change in the operational systems-of-record. These algorithms were usually developed and supported by data tables derived using Deep Data Analytics from Big Data Hadoop systems and/or data warehouses. Instead of focusing on enlightening the few with pretty historical graphs, successful players focused on changing the operational systems for everybody and managed the feedback and improvement process from the company as a whole.
Tags : 
ibm, big data, inline analytics, business analytics, roi, business intelligence
    
IBM
Published By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : 
rackspace, technology, virtual desktop, vdi, infrastructure, data center, desktop management, virtualization
    
Rackspace
Published By: Polycom     Published Date: Oct 17, 2016
To select the group video conferencing systems that best address their requirements, customers should do the following: 1) Understand the types of spaces to be video- (or collaboration-) enabled and the common use cases for each. 2) Review the requirements described in the tables above. 3) Meet with various solution vendors, ask for details about their group video offerings, and see how closely those systems address the needs of each type of space. Download to learn more.
Tags : 
    
Polycom
Published By: Mitel     Published Date: Apr 25, 2018
In businesses and organizations across the world, rooms once humming with wires, black boxes and blinking lights now sit empty. In a lonely phone closet, there’s only dust, a single lonely terminal, or perhaps a foosball table where IT pros can let off steam. The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud, communications, organizations, landscape
    
Mitel
Published By: McAfee     Published Date: May 19, 2014
Este libro proporciona una visión general de la seguridad de la red y explica cómo los ciberdelincuentes pueden utilizar métodos ocultos o actualmente no detectables para acceder a los sistemas de red protegidos. Las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques) eluden las soluciones comunes actuales de seguridad de red. Pueden transportar cualquier ataque o exploración a través de dispositivos de seguridad de red y firewalls, firewall de próxima generación, detección de intrusos y sistemas de prevención e incluso enrutadores que realizan la inspección profunda de paquetes. En este libro encontrará todo sobre AETs y obtendrá consejos útiles y recomendaciones para ayudarlo a proteger su organización. Si trabaja en el gobierno, el área militar, banca, industria, comercio electrónico o con otras infraestructuras críticas, lea este libro para descubrir lo que se enfrenta y cómo protegerse mejor contra las evasiones avanzadas.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, seguridad, gestión de ti, security, it management
    
McAfee
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices, security, business analytics
    
LogRhythm
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Lifetime Products manufactures tables, chairs, and basketball equipment for customers in more than 50 countries. Its employees in the United States and China depend on messaging technologies to stay connected to customers and the office. To improve productivity, Lifetime deployed Microsoft® Exchange Server 2007 Unified Messaging. Employees can access their e-mail, voice-mail, and fax messages in their inboxes—while at work, at home, or on the road.
Tags : 
microsoft, microsoft exchange, exchange server, messaging, productivity, unified messaging, convergence, collaboration
    
Microsoft Exchange
Published By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : 
whitelisting, endpoint security, av signatures, patch management, encryption, security management
    
Lumension
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions, backup and recovery, storage management, data integration
    
SAP
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: Mitel     Published Date: Sep 18, 2015
Read the white paper "How Cloud Communications Is Opening Up Possibilities (and Floor Space)" to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud communications, server rooms, wireless, cloud technology, networking, security, it management
    
Mitel
Published By: Cylance     Published Date: Sep 13, 2017
AV-TEST performed an advanced threat prevention test of enterprise endpoint protection software to evaluate and compare its ability to detect and prevent new and unknown malicious executables.
Tags : 
    
Cylance
Published By: Mitel     Published Date: Jun 29, 2016
The cloud – and more specifically, cloud communications – is the source of the transformation, which has fundamentally changed the IT landscape. Some IT pros have embraced it. Some are working on migrating to the cloud over time. And others, through choice or necessity, are sticking with a premises-based approach. Read on to find out why some IT pros are shopping for game tables to go in empty server rooms while others are untangling wires and watching blinking lights—and which cases make the most sense for each approach.
Tags : 
cloud management, cloud services, cloud management, best practices, communications, business intelligence, cloud computing
    
Mitel
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: HP Virtualization     Published Date: Mar 22, 2010
This IDC White Paper presents a detailed analysis of the value proposition associated with moving across different virtualization adoption maturity levels. The following figures and tables compare business value accruing from the move from an unvirtualized environment to a virtualized environment or from a basic virtualization scenario to an advanced virtualization scenario.
Tags : 
virtualization, integrated solutions, storage virtualization, application integration, data integration
    
HP Virtualization
Published By: SAS     Published Date: Nov 16, 2018
Medicaid fraud is prevalent, costly and difficult to prevent. With a combination of more integrated data and advanced analytics, state agencies can turn the tables on fraudsters. They can accelerate the transition from detection to prevention, as new forms of fraud are recognized faster and fewer improper payments go out the door. This IIA Discussion Summary explores the challenges and opportunities in preventing Medicaid fraud in an interview with SAS’ Ellen Joyner-Roberson, Principal Marketing Manager for Fraud and Security Intelligence, and Victor Sterling, Principal Solutions Architect.
Tags : 
    
SAS
Published By: SilverSky     Published Date: May 09, 2014
This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.
Tags : 
silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges, insource vs outsource, internal situation, leverage compliance experience, networking, security, it management
    
SilverSky
Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables, queries, data platform, big sql architecture, programming language, relational database management system, rdbms, database development, analytical applications, business intelligence, data warehousing
    
IBM
Previous   1 2    Next    
Search      

Special Report

What does it take to succeed in today’s hypercompetitive and hyperconnected digital economy? Keep reading to find out.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory