image

Results 176 - 200 of 202Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : quocirca, smbs, internet service providers, information technology, security
     Quocirca
By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
     GFI
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
     Borer Data Systems Ltd.
By: Red Condor     Published Date: Mar 17, 2008
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Tags : image-based, image based spam, spam, image spam, red condor, redcondor, security
     Red Condor
By: Viewpointe     Published Date: Apr 15, 2008
As check electronification progresses, image exchange capability is becoming a business imperative for financial institutions of all sizes to remain competitive. It is evident that this is the direction in which the industry is moving.
Tags : viewpointe, lotus, lotus pr, finance, financial institution, banking, bank, check, electronic check, ecp, electronic check presentment
     Viewpointe
By: Bronto     Published Date: Jan 03, 2013
In light of the increasing use of preview panes, filters and the default blocking of images in popular email clients such as Outlook, Gmail and AOL, Bronto has outlined design best practices that will help you successfully reach your audience.
Tags : esp, email marketing, retail, automation, automated, marketing, digital marketing, software
     Bronto
By: KEMP Technologies     Published Date: Aug 04, 2008
The Web experience is changing for consumers. While the National Retail Federation reports that over 90 percent of customers research products on the Web before purchasing, a single product photo and description is not enough to close the sale. Through broadband, with Flash and JPEG product images, retailers are providing information to potential customers which will improve the likelihood of closing the sale.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, retail, ecommerce, e-commerce, ebusiness, e-business
     KEMP Technologies
By: Intermec     Published Date: Sep 07, 2011
This is a guide to 2D bar code imaging technology, including an overview of capabilities and performance in traditional applications.
Tags : intermec, 2d imagers, laser scanners, bar code, qr code, digital imagining, document processing
     Intermec
By: Intermec     Published Date: Sep 07, 2011
Find out what impact this 2D revolution could have on your business.
Tags : intermec, 2-dimensional symbologies, operations, capture information, video, images
     Intermec
By: HTMLcut     Published Date: Sep 10, 2010
The article analyzes changes in the PSD-to-HTML/CSS conversion market happened during the past year.
Tags : web design, image to html conversion, psd to html, psd to css, psd to wordpress
     HTMLcut
By: Movidius     Published Date: Jan 10, 2011
This whitepaper outlines methods for creating high quality HD 3D images and shows the potential of 3D as a new standard for mobile devices
Tags : mobile, autostereoscopic, parallax, convergence
     Movidius
By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. It simplifies and automates backup and restore processes across Windows and Linux environments, and remotely monitors and manages geographically distributed servers and workstations.
Tags : acronis, backup and recovery, 10 advanced server, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
     Acronis
By: Visible Logic     Published Date: Jun 17, 2011
Whitepaper showing results of survey that determined that branded email addresses critical to professional image
Tags : email, branding, survey, whitepaper, startups, entrepreneurs, free email addresses, professional image
     Visible Logic
By: Confident Technologies     Published Date: Jun 29, 2011
Two-factor, mobile authentication using images.
Tags : authentication, two-factor authentication, multifactor authentication, security, website security
     Confident Technologies
By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
     CDW
By: SafeNet     Published Date: Jun 11, 2013
Understanding the Threats Energy and PetrochemicalFace—and How to Protect Against Them.
Tags : safenet, storage, secure, seismic images, data protection, threats energy, petrochemical
     SafeNet
By: IBM     Published Date: Jan 09, 2014
For IT personnel looking to manage cross-platform workloads, IBM VMControl can provide an advanced solution. Read the white paper and learn why this technology beats the competition in terms of automated provisioning, systems integration and resource pooling. Also see how this environment offers advanced image management and higher resilience.
Tags : vmware, ibm, virtualization, director vmcontrol, clabby analytics, platform virtualization, system director, multi-platform, power system, workload optimization
     IBM
By: GE Healthcare     Published Date: Feb 23, 2015
Southwestern Ontario Diagnostic Imaging Network relies on Centricity™ Clinical Archive to connect 62 hospitals with disparate PACS & RIS systems, resulting in reduced storage costs and data duplication and increased productivity and enhanced quality of care. Learn more in this case study. Centricity Clinical Archive includes the following product components: Centricity Enterprise Archive, Universal Viewer ZFP, Caradigm eHIE, Centricity Clinical Gateway, NextGate MatchMetrix EMPI, PACSGEAR PacsSCANTM
Tags : xds, cross enterprise document sharing, unified view of patient images, archive & storage, image sharing & management, vendor neutral archive (vna), centricity clinical archive, mobile image capture, enterprise archive, archiving services, zero footprint viewer, image archive, dicom storage
     GE Healthcare
By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : ge healthcare, clinical data, healthcare technology, image management technology, medical imaging, data management
     GE Healthcare
By: GE Healthcare     Published Date: Feb 23, 2015
This study surveyed radiologists about inefficiencies in their workflows, revealing a number of shortcomings with the information technologies radiologists employ to review, interpret, and report diagnostic imaging examinations.
Tags : enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
     GE Healthcare
By: GE Healthcare     Published Date: Feb 23, 2015
Huron Regional Medical Center added Universal Viewer with Zero Footprint (ZFP), a Web-based image viewing strategy that reliably, timely and financially efficiently delivers images.
Tags : zero footprint viewer
     GE Healthcare
By: BlackLine     Published Date: Apr 10, 2017
For many, the idea of Robotic Process Automation (RPA) might conjure images of large automated assembly line welders and pickers. But RPA actually refers to software robots, or applications that replicate human interaction with a user interface on a computer system. Download now to learn more!
Tags : 
     BlackLine
By: CA Technologies EMEA     Published Date: Oct 19, 2017
OAuth est un protocole Web relativement nouveau qui régit l’octroi d’un accès limité aux applications et données. il a été conçu pour permettre aux utilisateurs d’octroyer un accès restreint aux ressources dont ils sont propriétaires (images résidant sur un site tel que Flickr ou smugMug, par exemple) à un client tiers tel qu’un site d’impression de photos par exemple. ce livre blanc de cA Technologies décrit ce qu’est OAuth et vous montre comment faciliter son implémentation au sein de votre organisation.
Tags : 
     CA Technologies EMEA
By: ChannelAdvisor     Published Date: Jan 17, 2019
"With millions of sellers and billions of products to compete with on marketplaces, it’s easy to get buried in data every day — and still feel behind. And this is now true across almost all product verticals, as more and more niche categories become intense competitive battlegrounds. Shoppers know they have multiple options for purchasing the same item, and it’s no longer your product descriptions and images alone that capture attention. If you want to consistently rise to the top of results, a structured pricing strategy is a must. In this eBook, you’ll learn: - Complications of marketplace pricing - Benefits of strategic pricing - Pricing best practices - And more"
Tags : 
     ChannelAdvisor
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com