things

Results 176 - 200 of 942Sort Results By: Published Date | Title | Company Name
By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
     Intel
By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
     Intel
By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
     BeyondTrust
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
     Fidelis Cybersecurity
By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
     Google
By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
     Google
By: Cisco     Published Date: Oct 08, 2018
Today more than ever, business wins depend on teamwork. And the teams that make things happen are bigger, more diverse, and more distributed than ever. People are working at home, in coffee shops, and on the road. They span multiple time zones. They use every imaginable device, relying heavily on their mobile phones. They grapple with deadlines because their tools don’t connect. With so much to manage, people are challenged to be truly present and focused in the moment. To make the most of each opportunity and maintain business momentum, they need tools that allow them to work intuitively. Effortlessly. That fade into the background, leaving them free to keep focused, stay engaged, get inspired, innovate. That allow them to connect as if they were in person, when they’re not. To learn from industry experts on how collaboration works, Download Report!
Tags : collaboration, workspace transformation, workforce transformation, virtual meetings, digital transformation, webex, webex meeting, webex teams
     Cisco
By: Pure Storage     Published Date: Jan 12, 2018
Interest in machine learning has exploded over the past decade. You see machine learning in computer science programs, industry conferences, and the Wall Street Journal almost daily. For all the talk about machine learning, many conflate what it can do with what they wish it could do. Fundamentally, machine learning is using algorithms to extract information from raw data and represent it in some type of model. We use this model to infer things about other data we have not yet modeled. Neural networks are one type of model for machine learning; they have been around
Tags : learning machines, automated intelligence, scalars, vectors, mathematics, classification, pure storage
     Pure Storage
By: Pure Storage     Published Date: Jan 12, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : automated intelligence, data, industry, autonomous, industrial, pure storage
     Pure Storage
By: AppDynamics     Published Date: Sep 20, 2017
DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles.
Tags : cio, delivers software, business, metrics, automation, digital transformation, appdynamics
     AppDynamics
By: Schneider Electric     Published Date: Apr 23, 2019
The supply chain for manufacturers and distributors is facing challenges around increased analytics, multichannel fulfillment, talent shortages, and the use of new technologies such as wireless, augmented reality, robotics and machine-to-machine (M2M). At the same time, there is continued focus on cost reduction and sustainability. The Industrial Internet of Things is driving a huge transformation as it increases the interconnection between connected devices and analytics. The smart manufacturing enterprise can seize opportunities to maximize efficiency and safety through networking and intuitive collaboration with its users. This eBook shares practical steps to follow for a smart material handling and logistics approach.
Tags : material handling, logistics, conveying
     Schneider Electric
By: Schneider Electric     Published Date: Apr 24, 2019
The fourth industrial revolution is well underway. It focuses on digital transformation and creation of the Industrial Internet of Things (IIoT). A key part of this revolution is technology that enables new realities—including virtual reality (VR), augmented reality (AR), and mixed reality (MR). These new realities are already being applied in industrial settings and are poised to grow exponentially in the next few years. This storyscape dives into use cases for each type of reality and presents the benefits of each in relation to industrial automation.
Tags : augmented reality, industrial revolution
     Schneider Electric
By: Teradata     Published Date: Jan 30, 2015
Data from the Internet of Things makes an integrated data strategy more vital than ever.
Tags : teradata, internet, things, iot, data, warehouse, analytics, patchwork
     Teradata
By: Logicalis     Published Date: Sep 05, 2013
6 Things to Look for in Your Software as a Service partner Start
Tags : logicalis, ebook, saas, saas solution, software solutions, software as a service
     Logicalis
By: Oracle     Published Date: Aug 17, 2017
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
     Oracle
By: Cisco     Published Date: Sep 16, 2015
Help minimize operational expenditures.
Tags : response times, operational expenditures, safety decisions, iot
     Cisco
By: Cisco     Published Date: Sep 17, 2015
The Internet of Things (IoT) stands to fundamentally transform public sector service delivery.
Tags : convergence, iot, government
     Cisco
By: BI WORLDWIDE     Published Date: Dec 22, 2014
Everyone likes to be noticed. Recognition and rewards help people feel good about what they are doing and things they have accomplished. Recognizing employees will keep them focused, directed and willing to repeat the behaviors they were recognized for. Learn 10 reasons why recognizing your employees really works.
Tags : employee engagement, employee recognition, social recognition, mobile recognition, employee awards, employer engagement, incentive programs, employee incentives
     BI WORLDWIDE
By: NetApp     Published Date: Mar 05, 2018
Migrating to a flash storage solution does much more than simply save you money. Read this ebook and learn the top three things to know about modernizing your SAN. Find out how you can accelerate your most important apps by up to 20 times compared to traditional storage—while minimizing downtime.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
     Mimecast
By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
     goTransverse
By: Autodesk     Published Date: May 22, 2017
The future of making things is here, and it is complex. Engineering leaders are under constant and growing pressure to find more innovative solutions for increasingly demanding customers in the context of an extremely competitive global market.
Tags : additive manufacturing, generative design, simulation, high-speed manufacturing, smart manufacturing, enhanced customization, innovation, rapid prototyping
     Autodesk
By: Staples     Published Date: Oct 13, 2016
How are you sitting right now? In your chair? Are you SURE that’s good for your back? This infographic gives you 11 things you could do to reduce workplace soreness and injuries.
Tags : ergonomics, healthier workforce, musculoskeletal disorders, productivity, furniture
     Staples
By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
     CA Technologies
By: Juniper Networks     Published Date: Aug 07, 2017
Für das Internet der Dinge müssen Sie das gesamte Netzwerk sichern (anstatt ein löchriges Netzwerk aufzubauen) Einige Initiativen zur digitalen Transformation konzentrieren sich darauf, die Art zu ändern, wie Mitarbeiter, Kunden, Partner – selbst unbelebte Objekte – mit ihrer technologischen Umgebung interagieren.
Tags : 
     Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com