Whitepaper Library
 

aci

Results 1 - 25 of 2007Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Jan 11, 2017
The rack power distribution unit (rack PDU) has emerged from obscurity. As the last link of the elaborate data center power chain, the traditional role of the rack PDU has been to deliver stable, reliable and adequate power to all the devices in the rack or cabinet—servers, storage, network equipment—which are plugged into it. Although it provides the electrical heartbeat to all the systems that run the critical applications that support the operation of the business (or that, in some cases, are the business); it was often considered a simple commodity, just a power strip. Typically, IT merely told facilities how much power was needed, based on device nameplate specs—and often with redundancy, so there was plenty of headroom and minimal risk of downtime. Little thought was given to efficiency or what other value a rack PDU could provide.
Tags : 
data center
    
Raritan
Published By: Raritan     Published Date: Jan 11, 2017
Sensors are an easy to install, cost-effective way to reduce energy costs, improve reliability, and increase capacity for future data center growth. See why you should be using them.
Tags : 
data center, energy efficiency, data center power, infrastructure, design and facilities, power and cooling
    
Raritan
Published By: Raritan     Published Date: Jan 11, 2017
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb ports, pdu, data center power, infrastructure, design and facilities, power and cooling
    
Raritan
Published By: Server Technology     Published Date: Mar 04, 2014
This white paper will discuss how to successfully build capacity planning into your new build or retrofit project
Tags : 
capacity planning, data center, virtualization, cloud computing, infrastructure, design and facilities, power and cooling, green computing
    
Server Technology
Published By: SAP     Published Date: Jul 23, 2018
New market forces are creating unprecedented pressure for companies to move faster, with greater agility, and change in response to new threats and opportunities. Companies that are embracing a new approach built on Intelligent Cloud ERP are gaining valuable advantages — such as boosting profits, growing faster, entering new markets, and disrupting their industries. Learn how Intelligent Cloud ERP empowers you to leverage the opportunities presented by changes to how we work, collaborate and achieve success in this practical, actionable overview.
Tags : 
    
SAP
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Case study briefs for Transguard, BiLFINGER, Aldermore PLC, PinkRoccade, Okinawa Cross Head, Siemens, Sogeti, Norrbottens, Dansk Supermarked Group, ITS Nordic.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Workday France     Published Date: Sep 27, 2018
La procédure d'audit ne devrait pas être un frein à la planification stratégique et au développement de la rentabilité. Avec un système de gestion financière unique basé dans le Cloud, toutes vos capacités de conformité, de contrôle et d'audit sont regroupées en une seule solution. Vous pouvez ainsi rationnaliser les processus d'audit et assurer la sécurité. Concentrez-vous sur l'entreprise et laissez Workday s'occuper du reste.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Sep 27, 2018
Explorez les stratégies mises en place par les entreprises pour gérer le changement dans ce rapport Harvard Business Review Analytic Services, sponsorisé par Workday. Découvrez comment les entreprises utilisent un système Cloud Finance et RH unifié pour prendre des décisions basées sur des données, améliorer la collaboration et développer des méthodes de planification alliant visibilité, vitesse et précision.
Tags : 
    
Workday France
Published By: Dell Server     Published Date: Aug 08, 2018
This paper provides an overview of the changing dynamics in the business world that demand a new approach to IT infrastructure. It provides a perspective for business managers and executives who are looking for a way to align business and IT by facing the challenges of disruption for better business outcomes. We will discuss the Kinetic Infrastructure from Dell EMC powered by Intel® Xeon® Platinum processor, which is designed to support IT flexibility and business agility. In addition, we will describe the first implementation of kinetic infrastructure on the Dell EMC PowerEdge MX system. The paper will explain how Dell EMC is helping businesses to rethink their data center architecture and accelerate their path towards more agility.
Tags : 
    
Dell Server
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
IDC considera que RR. HH. es responsable de abordar y entregar los elementos clave de la transformación digital, así como de cambiar la función de RR. HH. en sí. Para ayudar a las organizaciones en este proceso, IDC ha identificado cinco tendencias y acciones claves que apoyan la transformación digital y el desarrollo de RR. HH. Esta herramienta permite a los profesionales de RR. HH. entender las hojas de ruta de entregas para lograr estos objetivos de transformación claves, empezando hoy mismo.
Tags : 
    
SAP SuccessFactors
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
La transformación digital se está produciendo cada vez en más organizaciones y las pequeñas y medianas empresas no pueden permitirse el lujo de ignorarla. En el caso concreto de RR. HH., las barreras para el éxito de la transformación son las personas, el conocimiento y la cultura. Guste o no, el negocio confiará en que el departamento de RR. HH. apoye estas iniciativas y haga que esto suceda desde la base de empleados.
Tags : 
    
SAP SuccessFactors
Published By: SAP SuccessFactors     Published Date: Oct 04, 2018
¿Está usted planificando en forma activa para la revolución digital de RR. HH.? La revolución digital de RR.HH. ha llegado y está avanzando a gran velocidad, y las organizaciones están buscando formas nuevas, efectivas y productivas de cumplir con las crecientes exigencias del negocio: agilidad, acceso global 24x7, velocidad y precisión. Las organizaciones líderes saben que necesitan generar disrupción o verse afectados por ella, por lo tanto han comenzado a crear entornos de trabajo completamente nuevos a los que llamamos la revolución digital en el trabajo. Está cambiando la forma en que pensamos y nos relacionamos con el trabajo cotidiano.
Tags : 
    
SAP SuccessFactors
Published By: Workday Italy     Published Date: Sep 20, 2018
Per due anni consecutivi, Gartner, società di ricerca indipendente, ha riconosciuto Workday tra i leader per le soluzioni cloud di gestione del capitale umano (HCM) su 11 fornitori esaminati. Registrati per scaricare il report ""Gartner Magic Quadrant for Cloud HCM Suites for Midmarket and Large Enterprises"" (offerto da Workday) e scopri perché per il secondo anno consecutivo abbiamo conquistato la prima posizione nel quadrante dei leader per capacità di attuazione.
Tags : 
    
Workday Italy
Published By: Workday Spain     Published Date: Sep 20, 2018
Aunque muchas empresas todavía no saben exactamente qué significa para ellas la transformación digital, no cabe duda de que los CIO tienen una oportunidad perfecta para liderar la innovación en sus organizaciones. En este informe se analiza la transformación digital con la lupa del CIO para definir lo que significa y explorar los pasos para lograrla. Lea el informe para acceder a insights de CIO en activo y con otros que ya no desempeñan este puesto, académicos, expertos del sector y otras personas que han sido testigos de la transformación digital y saben cuáles son los ingredientes que componen la receta del éxito.
Tags : 
    
Workday Spain
Published By: Workday Spain     Published Date: Sep 20, 2018
En un nuevo estudio global, CIO.com y Workday realizaron una encuesta destinada a conocer mejor la migración fluida de las organizaciones a cloud. Las conclusiones, basadas en los resultados de la encuesta distribuida a 450 ejecutivos de TI y en 10 entrevistas individuales en 17 países, se han publicado en un nuevo informe. Lea este informe para obtener una nueva perspectiva global sobre las diferencias entre Europa y otras regiones en temas como los siguientes: • Los motivos de las organizaciones para trasladarse a cloud • El proceso de toma de decisiones y las partes implicadas • Mejores prácticas de implementación y lecciones aprendidas en el proceso • Beneficios de la migración a cloud
Tags : 
    
Workday Spain
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.