end end

Results 1 - 25 of 2463Sort Results By: Published Date | Title | Company Name
By: Green Revolution Cooling     Published Date: Feb 20, 2014
This paper examines the advantages of liquid submersion cooling and, in particular, takes a closer look at GreenDEF™, the dielectric mineral oil blend used by Green Revolution Cooling, a global leader in submersion cooling technologies. Further, the paper will address concerns of potential adopters of submersion systems and explain why these systems can actually improve performance in servers and protect expensive data center investments.
Tags : 
     Green Revolution Cooling
By: Altair     Published Date: Jul 15, 2014
NSCEE’s new workload management solution including PBS Professional has reduced overall runtimes for processing workload. Furthermore, NSCEE credits PBS Professional with improving system manageability and extensibility thanks to these key features: • Lightweight solution • Very easy to manage • Not dependent on any specific operating system • Can be easily extended by adding site-specific processing plugins/hooks To learn more click to read the full paper
Tags : 
     Altair
By: IBM     Published Date: Jun 05, 2014
Are infrastructure limitations holding you back? - Users struggling with access to sufficient compute resources - Resources tapped out during peak demand times - Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics and technical computing applications. The offering provides: - Ready to run IBM Platform LSF & Symphony clusters in the cloud - Seamless workload management, on premise and in the cloud - 24x7 cloud operation technical support - Dedicated, isolated physical machines for complete security Join us for this brief 20-minute webcast to learn how IBM offers a complete end-to-end hybrid cloud solution that may be key to improving your organization’s effectiveness and expediting time to market for your products.
Tags : ibm
     IBM
By: IBM     Published Date: Aug 27, 2014
Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics and technical computing applications. The offering provides: Ready to run IBM Platform LSF & Symphony clusters in the cloud Seamless workload management, on premise and in the cloud 24x7 cloud operation technical support Dedicated, isolated physical machines for complete security Join us for this brief 20-minute webcast to learn how IBM offers a complete end-to-end hybrid cloud solution that may be key to improving your organization’s effectiveness and expediting time to market for your products.
Tags : ibm, hybrid cloud
     IBM
By: IBM     Published Date: Sep 02, 2014
Learn how GPFS accelerates data intensive work flows and lowers storage costs in Life Sciences, Energy Exploration, Government, Media & Entertainment and Financial Services by removing data related bottlenecks, simplifying data management at scale, empowering global collaboration, managing the full data life cycle cost effectively and ensuring end-to-end data availability, reliability, and integrity.
Tags : ibm, complete storage solution, gpfs
     IBM
By: IBM     Published Date: May 20, 2015
Are infrastructure limitations holding you back? Users struggling with access to sufficient compute resources Resources tapped out during peak demand times Lack of budget, space or power to the environment IBM recently announced a new Platform Computing cloud service delivering hybrid cloud optimized for analytics and technical computing applications. The offering provides: Ready to run IBM Platform LSF & Symphony clusters in the cloud Seamless workload management, on premise and in the cloud 24x7 cloud operation technical support Dedicated, isolated physical machines for complete security Join us for this brief 20-minute webcast to learn how IBM offers a complete end-to-end hybrid cloud solution that may be key to improving your organization’s effectiveness and expediting time to market for your products.
Tags : 
     IBM
By: General Atomics     Published Date: Jan 13, 2015
The term “Big Data” has become virtually synonymous with “schema on read” (where data is applied to a plan or schema as it is ingested or pulled out of a stored location) unstructured data analysis and handling techniques like Hadoop. These “schema on read” techniques have been most famously exploited on relatively ephemeral human-readable data like retail trends, twitter sentiment, social network mining, log files, etc. But what if you have unstructured data that, on its own, is hugely valuable, enduring, and created at great expense? Data that may not immediately be human readable or indexable on search? Exactly the kind of data most commonly created and analyzed in science and HPC. Research institutions are awash with such data from large-scale experiments and extreme-scale computing that is used for high-consequence
Tags : general atomics, big data, metadata, nirvana
     General Atomics
By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
     Dell APAC
By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
     Cisco EMEA
By: Nuance EMEA     Published Date: Jun 05, 2019
Neue Geschäftsmodelle treiben die Erwartungshaltung der Kunden. Der demografische Wandel und steigende Wettbewerbsdruck verändern die Arbeitsweisen der Mitarbeiter im Finanzwesen. Das Jahrzehnt der künstlichen Intelligenz (KI) und der digitalen Innovationen eröffnen dem Finanzwesen große Möglichkeiten sich für die Zukunft zu wappnen. Nuance zeigt Ihnen auf, wie Sie die neue Lösungen in Ihre bestehenden Prozesse zu integrieren um die Herausforderungen zu meistern. Mit Spracherkennung können Sie Ihre Produktivität steigern, Datenschutzrichtlinien einhalten und Ihren Kundenservice verbessern. Wollen Sie mehr erfahren? Laden Sie unser eBook kostenlos runter.
Tags : 
     Nuance EMEA
By: Nuance EMEA     Published Date: Jun 05, 2019
Neue Marktteilnehmer verschieben die Art und Weise, wie die Branche handelt, neue Geschäftsmodelle verändern die Kundenerwartungen und der demografische Wandel zwingt die Teilnehmer, sich diesen Gegebenheiten anzupassen. Das kommende Jahrzehnt wird geprägt sein von künstlicher Intelligenz sowie digitaler Innovation und es wird darauf ankommen, dem exponentiellen Zuwachs der zur Verfügung stehenden Informationen intelligente Werkzeuge und Prozesse für eine sinnvolle Nutzung dieser. Ressourcen an die Seite zu stellen. Nur so wird es gelingen, gesetzliche Bestimmungen einzuhalten und einen Mehrwert für die Kunden zu schaffen. Um mehr zu erfahren, laden Sie dieses eBook herunter!
Tags : 
     Nuance EMEA
By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
     Dell EMC
By: Workday UK     Published Date: Jun 17, 2019
Looking for a trusted partner for financial management that can help lead your organization today and into the future? Get analysis of the market, key recommendations for evaluating vendors, and more. Download your complimentary copy of the report.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Genesys     Published Date: Feb 12, 2019
Global agierende Unternehmen, die höchste Ansprüche an ihren Kundenservice stellen und ihren Markenwert auf einem konstant hohem Niveau halten möchten, benötigen eine umfassende Suite an CX-Technologien, die sich problemlos implementieren und managen lässt. Allerdings widerstehen die Spitzenreiter in puncto Customer Experience der Versuchung, immer neue technologische Lösungen zur Verbesserung der Effizienz ihrer Serviceprozesse einzuführen – und genau das unterscheidet sie vom Mitbewerb. Den Entscheidungsträgern der führenden Unternehmen ist bewusst, dass sie nicht nur in neue Technologien, sondern auch in ihre Mitarbeiter investieren müssen. Das ist die zentrale Erkenntnis der weltweiten Umfrage, die MIT Technology unter etwa 550 Unternehmensvertretern in leitenden Positionen durchgeführt hat. Im Mittelpunkt standen dabei die Fragen, welche Faktoren die Gestaltung der CX-Prozesse der Unternehmen beeinflussen und welche Tools und Strategien zur Bewältigung der Herausforderungen in d
Tags : 
     Genesys
By: Genesys     Published Date: Feb 12, 2019
Wie werden wir in 7 Jahren mit Unternehmen kommunizieren? Gemeinsam mit seinen Partnern Genesys und IBM hat der der 2b AHEAD ThinkTank mit „Kundendialog 2025 – Der Dialog zwischen intelligenten Systemen“ eine wissenschaftliche Studie dazu veröffentlicht. Sie untersucht den Wandel im Kommunkationsverhalten von Kunden und arbeitet Strategien zur Vorbereitung auf gravierende Veränderungen im Bereich des Kundendialogs heraus.
Tags : 
     Genesys
By: Here Technologies     Published Date: Mar 29, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : here technologies, transport and logistics
     Here Technologies
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
     Group M_IBM Q2'19
By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Für Geschäftsausfälle, oder zumindest für Rentabilitäts- und Gewinnverluste, wurden in den vergangenen 24 Monaten folgende Faktoren verantwortlich gemacht: Die digitale Disruption, wirtschaftliche Instabilität, politische Umwälzungen sowie ein anhaltender Fachkräftemangel. Vermutlich ist es keine große Überraschung, dass eine CEO-Umfrage von Gartner unter Geschäftsleuten ergab, dass das digitale Geschäft im nächsten Jahr oberste Priorität hat. Umfrageteilnehmer wurden gefragt, ob sie eine Management-Initiative oder ein TransformationsProgramm haben, um ihr Unternehmen digitaler zu machen. Die Mehrheit, 62 Prozent, sagte, sie hätten dies. 54 Prozent dieser Unternehmen gaben an, dass ihr digitales Geschäftsziel transformatorisch sei, während 46 Prozent angaben, das Ziel der Initiative sei die Optimierung. * Daher geht es für Unternehmen darum, zu lernen, sich zu entwickeln und agil zu sein. Zudem gilt es für sie, Technologien einzusetzen um effizienter zu konkurrieren und nicht der Trägh
Tags : 
     Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com