overview

Results 251 - 275 of 666Sort Results By: Published Date | Title | Company Name
Published By: Epson     Published Date: Jul 27, 2017
From assembly and pick-and-place to material handling and packaging, the use of robots is on the rise in factory automation. Extremely customizable in even the most complex applications, automation systems are beneficial for a wide variety of reasons. Taking the plunge into automation, however, can be confusing and daunting. With so many factors to consider, you may be wondering, “Where do I start?” With over 35 years of experience in the automation industry, we have broken down the process, step-by-step, to guide you on your journey. Keep in mind that this guide is a broad overview, but can serve well as a starting point for those new to automation.
Tags : 
automation, robotics, tutorial, efficiency, assembly, packaging
    
Epson
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Intellectual Property (IP) is the life-blood of your Aerospace & Defense business. It’s the product designs that required thousands of man-hours and millions of dollars to create, or the 10-year strategy overviews that can give a competitor a huge advantage. The stakes for safeguarding IP within the Aerospace & Defense industry are at an all-time high, given the costs, complexity and potential military applications of their products. Read this White Paper to learn how you can secure and manage your IP by implementing the right strategy.
Tags : 
intellectual property, aerospace, defense business, product design, security
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: May 29, 2018
From startups to established companies, containers help meet the demands of a modern digital business –supporting massively scalable, portable and fast to deploy apps. Engineered for the Modern Applications, Built by Modern Teams. Yes, it’s complex. And yes, there is much to consider. Start here for a quick overview of the essentials of container monitoring.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Sprinklr     Published Date: Mar 13, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
    
Sprinklr
Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider
    
Arbor Networks
Published By: Marketo     Published Date: Jun 26, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
enterprise management, marketing roi, best practices, integration, lead generation
    
Marketo
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
    
ArcSight
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip
    
F5 Networks Inc
Published By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : 
ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions
    
VMware
Published By: BMC Control M     Published Date: Dec 07, 2009
Watch a 2-minute overview of BMC CONTROL-M and make the switch to enterprise workload automation.
Tags : 
bmc control-m, enterprise workload automation
    
BMC Control M
Published By: Zebra Technologies     Published Date: Mar 25, 2010
Mobile printing provides a series of quality improvements and timesaving benefits that are often overlooked in route automation, but can have a significant impact on the bottom line. This white paper will: • Describe uses for mobile printing in route accounting applications; •Provide return on investment calculation tools to measure the financial impact mobile printing can have; • Demonstrate how mobile printing processes can improve billing, distribution, and customer service operations; • Detail how on-demand thermal printing can reduce forms expenses; • Provide an overview of mobile printer and wireless communications options for route accounting systems. Read on to see how your route delivery and sales staff can make more stops and fewer errors each day by using mobile printing to support their work.
Tags : 
zebra technologies, dsd, manufacturing, mobile printing, wireless printing
    
Zebra Technologies
Published By: Cisco Systems, Inc.     Published Date: May 25, 2010
This document provides a technical overview of the Cisco Digital Media System for Cisco Desktop Video and its main components.
Tags : 
cisco digital media, desktop video, digital signage, multimedia, video management software
    
Cisco Systems, Inc.
Published By: VMware     Published Date: Apr 08, 2011
Watch this video for an educational overview that explains how virtualization can help your business.
Tags : 
vmware, vm ware, dell, layered tech, virtualization
    
VMware
Published By: Citrix Systems and Wyse     Published Date: Jun 07, 2011
In this whitepaper, IDC explores the challenges facing companies looking to implement the technology, discusses the market forecast and provides an overview of the benefits of Virtual Client Computing.
Tags : 
citrix, wyse, thin client, desktop virtualization, zero client, xendesktop, virtual client computing
    
Citrix Systems and Wyse
Published By: YouSendIt     Published Date: Apr 19, 2012
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it.
Tags : 
yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing
    
YouSendIt
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Jack Porco from William Beaumont Hospital and Mike Stephens from Atkins give an overview of their use of IBM Maximo Asset Management for facilities management and how it helped them run their buildings... smarter.
Tags : 
ibm, smarter buildings, solutions, asset management
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
This high-level Flash video provides an overview of how the IBM Smarter Planet campaign can help improve facilities management. By using IBM Maximo Asset Management, facilities managers are enabled to create smart buildings that reduce overall energy use and are operationally efficient.
Tags : 
ibm, asset management, maximo, flash video, smarter planet, energy, efficiency
    
IBM US Smarter Buildings
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage is a critical factor when virtualizing your business-critical applications like Exchange, SharePoint, SQL Server, and Oracle databases. What features should you look for when selecting a storage vendor? Download this tech overview to learn how flash-optimized Nimble Storage accelerates performance, maximizes utilization, and cost-effectively protects your mission-critical data.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Nimble Storage’s patented Cache Accelerated Sequential Layout (CASL™) is the industry’s first flash-optimized storage designed from the ground up to maximize efficiency. In this product brief, you’ll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications
    
Aruba Networks
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.