Whitepaper Library
 

aci

Results 1 - 25 of 2052Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Jan 11, 2017
The rack power distribution unit (rack PDU) has emerged from obscurity. As the last link of the elaborate data center power chain, the traditional role of the rack PDU has been to deliver stable, reliable and adequate power to all the devices in the rack or cabinet—servers, storage, network equipment—which are plugged into it. Although it provides the electrical heartbeat to all the systems that run the critical applications that support the operation of the business (or that, in some cases, are the business); it was often considered a simple commodity, just a power strip. Typically, IT merely told facilities how much power was needed, based on device nameplate specs—and often with redundancy, so there was plenty of headroom and minimal risk of downtime. Little thought was given to efficiency or what other value a rack PDU could provide.
Tags : 
data center
    
Raritan
Published By: Raritan     Published Date: Jan 11, 2017
Sensors are an easy to install, cost-effective way to reduce energy costs, improve reliability, and increase capacity for future data center growth. See why you should be using them.
Tags : 
data center, energy efficiency, data center power, infrastructure, design and facilities, power and cooling
    
Raritan
Published By: Raritan     Published Date: Jan 11, 2017
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb ports, pdu, data center power, infrastructure, design and facilities, power and cooling
    
Raritan
Published By: Server Technology     Published Date: Mar 04, 2014
This white paper will discuss how to successfully build capacity planning into your new build or retrofit project
Tags : 
capacity planning, data center, virtualization, cloud computing, infrastructure, design and facilities, power and cooling, green computing
    
Server Technology
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Bandwidth. Speed. Throughput. These terms are not interchangeable. They are interrelated concepts in data networking that help measure capacity, the time it takes to get from one point to the next and the actual amount of data you’re receiving, respectively. When you buy an Internet connection from Spectrum Enterprise, you’re buying a pipe between your office and the Internet with a set capacity, whether it is 25 Mbps, 10 Gbps, or any increment in between. However, the bandwidth we provide does not tell the whole story; it is the throughput of the entire system that matters. Throughput is affected by obstacles, overhead and latency, meaning the throughput of the system will never equal the bandwidth of your Internet connection. The good news is that an Internet connection from Spectrum Enterprise is engineered to ensure you receive the capacity you purchase; we proactively monitor your bandwidth to ensure problems are dealt with promptly, and we are your advocates across the Internet w
Tags : 
    
Spectrum Enterprise
Published By: Sage     Published Date: Nov 26, 2018
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organizations to explore their views around these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals. Read our report to learn more and discover what you can do to become a People Company.
Tags : 
    
Sage
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Digital transformation (DX) — a technology-driven business strategy — enables firms to gain or expand their competitive differentiation by embracing data-driven decision-making processes, whether for increasing operational efficiencies, developing new products and services, increasing customer satisfaction and retention, or getting a better intelligence on the market. Big Data and analytics (BDA) applications form the foundation for enterprisewide digital transformation initiatives. To find out more download this whitepaper today.
Tags : 
    
Cisco EMEA
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Workday France     Published Date: Sep 27, 2018
La procédure d'audit ne devrait pas être un frein à la planification stratégique et au développement de la rentabilité. Avec un système de gestion financière unique basé dans le Cloud, toutes vos capacités de conformité, de contrôle et d'audit sont regroupées en une seule solution. Vous pouvez ainsi rationnaliser les processus d'audit et assurer la sécurité. Concentrez-vous sur l'entreprise et laissez Workday s'occuper du reste.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Sep 27, 2018
Explorez les stratégies mises en place par les entreprises pour gérer le changement dans ce rapport Harvard Business Review Analytic Services, sponsorisé par Workday. Découvrez comment les entreprises utilisent un système Cloud Finance et RH unifié pour prendre des décisions basées sur des données, améliorer la collaboration et développer des méthodes de planification alliant visibilité, vitesse et précision.
Tags : 
    
Workday France
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
IDC considera que RR. HH. es responsable de abordar y entregar los elementos clave de la transformación digital, así como de cambiar la función de RR. HH. en sí. Para ayudar a las organizaciones en este proceso, IDC ha identificado cinco tendencias y acciones claves que apoyan la transformación digital y el desarrollo de RR. HH. Esta herramienta permite a los profesionales de RR. HH. entender las hojas de ruta de entregas para lograr estos objetivos de transformación claves, empezando hoy mismo.
Tags : 
    
SAP SuccessFactors
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
La transformación digital se está produciendo cada vez en más organizaciones y las pequeñas y medianas empresas no pueden permitirse el lujo de ignorarla. En el caso concreto de RR. HH., las barreras para el éxito de la transformación son las personas, el conocimiento y la cultura. Guste o no, el negocio confiará en que el departamento de RR. HH. apoye estas iniciativas y haga que esto suceda desde la base de empleados.
Tags : 
    
SAP SuccessFactors
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
¿Está usted planificando en forma activa para la revolución digital de RR. HH.? La revolución digital de RR.HH. ha llegado y está avanzando a gran velocidad, y las organizaciones están buscando formas nuevas, efectivas y productivas de cumplir con las crecientes exigencias del negocio: agilidad, acceso global 24x7, velocidad y precisión. Las organizaciones líderes saben que necesitan generar disrupción o verse afectados por ella, por lo tanto han comenzado a crear entornos de trabajo completamente nuevos a los que llamamos la revolución digital en el trabajo. Está cambiando la forma en que pensamos y nos relacionamos con el trabajo cotidiano.
Tags : 
    
SAP SuccessFactors
Published By: Workday Nordics     Published Date: Sep 19, 2018
Explore the strategies companies are pursuing to manage change in this Workday-sponsored Harvard Business Review Analytic Services report. See how organisations use a single cloud-based system for finance and HR to create data-led decision-making, support C-suite collaboration, and develop planning methods with better insight, accuracy, and speed.
Tags : 
workday, workday technology, digital strategy, workday finance
    
Workday Nordics
Published By: Workday France     Published Date: Sep 27, 2018
Lisez le dernier « Magic Quadrant Gartner des solutions Cloud HCM » pour obtenir une comparaison objective des fournisseurs actuels et découvrir les raisons pour lesquelles Gartner a positionné Workday comme leader du quadrant pour notre capacité de mise en œuvre pour la 3e année consécutive.
Tags : 
    
Workday France
Published By: VMware     Published Date: Dec 10, 2018
As agencies continue to modernize data center infrastructure to meet evolving mission needs and technologies, they are turning to agile software and cloud solutions. One such solution is hyper-converged infrastructure (HCI), a melding of virtual compute, storage, and networking capabilities supported by commodity hardware. With data and applications growing exponentially along with the need for more storage capacity and flexibility, HCI helps offset the rising demands placed on government IT infrastructure. HCI also provides a foundation for hybrid cloud, helping agencies permanently move applications and workloads into public cloud and away from the data center.
Tags : 
    
VMware
Published By: Workday UK     Published Date: Sep 18, 2018
Explore the strategies companies are pursuing to manage change in this Workday-sponsored Harvard Business Review Analytic Services report. See how organisations use a single cloud-based system for finance and HR to create data-led decision-making, support C-suite collaboration, and develop planning methods with better insight, accuracy, and speed.
Tags : 
    
Workday UK
Published By: Workday Netherlands     Published Date: Sep 20, 2018
Ontdek de strategieën die bedrijven gebruiken om veranderingen de baas te blijven. Lees het door Workday gesponsorde Harvard Business Review Analytic Services-rapport. Leer hoe organisaties één cloud-based systeem voor finance en HR gebruiken om beslissingen te nemen op basis van data, samenwerking tussen C-level executives te ondersteunen en planningsmethoden met meer inzicht, nauwkeurigheid en snelheid te bieden.
Tags : 
    
Workday Netherlands
Published By: Sage Software (APAC)     Published Date: Nov 28, 2018
Replacing your legacy ERP solution is easier than you think. In our Buyer’s Guide, you’ll find out how to choose the right solution, what to look out for and find out how companies like yours made the switch.
Tags : 
    
Sage Software (APAC)
Published By: Carbon Black     Published Date: Nov 26, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
    
Carbon Black
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.