dam

Results 51 - 75 of 856Sort Results By: Published Date | Title | Company Name
By: Motorola Solutions     Published Date: Apr 26, 2019
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
     Motorola Solutions
By: Workday UK     Published Date: Apr 25, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle – especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : workday, workforce technology, digital strategy
     Workday UK
By: Anaplan     Published Date: Apr 24, 2019
Die Harvard Business Review befragte 385 Leser von Unternehmen mit über 500 Mitarbeitern, welchen Planungsherausforderungen sie gegenüberstehen und welche Lösungen sie verwenden. Unternehmen müssen mit den gegenwärtigen, noch nie da gewesenen Veränderungen Schritt halten. Während einige schnell reagieren, tun sich andere schwer damit. Was unterscheidet die Gewinner von den Verlierern? Die Harvard Business Review befragte 385 Leser von Unternehmen mit über 500 Mitarbeitern, welchen Planungsherausforderungen sie gegenüberstehen und welche Lösungen sie verwenden. Sie fanden heraus, dass neun von zehn eine Tabellenkalkulation zur Planung verwenden, aber nur 22 % damit zufrieden sind. Fazit: „Eine Planung, die allein auf einer Tabellenkalkulation basiert, … kann mit dem Umfang und Tempo der heutigen Geschäftswelt nicht mehr mithalten.“ Glücklicherweise gibt es eine bessere Möglichkeit. „Der neue Spielplan zur strategischen Planung“ ist das Ergebnis einer intensiven HBR-Recherche. Der Berich
Tags : 
     Anaplan
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: BeyondTrust     Published Date: Apr 11, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage.
Tags : 
     BeyondTrust
By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
     Illusive Networks
By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
     BeyondTrust
By: CheckMarx     Published Date: Apr 03, 2019
Following a paper released by the US Department of Homeland Security, software security is fundamentally a software engineering issue that must be addressed systematically throughout the software development lifecycle.
Tags : 
     CheckMarx
By: Here Technologies     Published Date: Apr 02, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : auto, mapping, location data
     Here Technologies
By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
     Darktrace
By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
     Darktrace
By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : here technologies, transport and logistics
     Here Technologies
By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
     HotSchedules
By: Red Hat     Published Date: Mar 28, 2019
Digital business requires a culture of organizational agility, as the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. Most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, so they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility. The cloud-native approach modernizes existing applications and builds new applications based on cloud principles, using services and adopting processes optimized for the agility and automation of cloud computing.
Tags : 
     Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Technology has fundamentally changed the way we live. Access to data and information anytime, anywhere is no longer a luxury—it is a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver higher-quality applications more often, enabling companies to stay relevant and seize digital business opportunities. Cloud-native is an approach to building applications that takes advantage of cloud computing models and DevOps principles to make the delivery of new features and services faster and more flexible. With a cloud-native strategy, organizations can begin the culture, process, and technology changes needed to meet new demands and become an IT organization that can deliver business innovation faster.
Tags : 
     Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
     Red Hat
By: HERE Technologies     Published Date: Mar 28, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : location data, mapping, here technologies
     HERE Technologies
By: Carbon Black     Published Date: Mar 27, 2019
Cyberattacks are rapidly evolving. It is more critical than ever that your company be protected by the latest innovations in endpoint security. And if you’re dealing with outdated antivirus solutions, your risk of experiencing damaging attacks is increasing exponentially.
Tags : 
     Carbon Black
By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
     Cisco
By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : auto, mapping, location data
     HERE Technologies
By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
     Akamai Technologies
By: SambaSaftey     Published Date: Mar 15, 2019
Regardless of the size of the vehicles, and often despite the utmost caution, operating vehicles can be a risky endeavor. According to the National Highway Transportation Safety Administration, highway accidents accounted for 37,461 deaths in the U.S. in 2016.1 Moreover, a recent study by Motus, a vehicle management and reimbursement platform, found that 40% of all motor vehicle accidents are work-related and cost employers a staggering $56.7 billion in 2017, taking into account medical expenses, property damage, increased insurance premiums, and lost productivity.2 While liability insurance is an important way for employers to address that risk, it’s by no means a panacea. Companies can and should be doing more to lessen the likelihood of accidents in the first place. And given that the vast majority (94%, according to NHTSA’s study) stem from driver-related actions or inactions as opposed to equipment malfunctions, one of the most important ways of doing so is to ensure that the in
Tags : 
     SambaSaftey
By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : fraud, fraud prevention, uk fraud, fraud detection, machine learning
     TIBCO Software
By: Dell EMC EMEA     Published Date: Feb 28, 2019
Im Rahmen der Implementierung von datengesteuerten Strategien in den verschiedensten Unternehmen bleibt der PC in all seinen Varianten das wichtigste Produktivitätstool für Mitarbeiter. IT-Führungskräfte müssen das PC-Management über den gesamten PC-Lebenszyklus hinweg leiten, damit Nutzer möglichst effektiv arbeiten können. Heute gehen IT-Führungskräfte den PC-Lebenszyklus über ein Kontinuum an, das von der Kontrolle bis zur Transformation reicht. Kontrolle ist auf Optimierung ausgerichtet, während der Schwerpunkt der Transformation auf den geschäftlichen Auswirkungen von Technologie liegt. Laden Sie dieses Whitepaper herunter, um weitere Informationen zu Dell Lösungen mit Intel® Technologie zu erhalten.
Tags : 
     Dell EMC EMEA
By: Intel     Published Date: Feb 28, 2019
Keeping the lights on in a manufacturing environment remains top priority for industrial companies. All too often, factories are in a reactive mode, relying on manual inspections that risk downtime because they don’t usually reveal actionable problem data. Find out how the Nexcom Predictive Diagnostic Maintenance (PDM) system enables uninterrupted production during outages by monitoring each unit in the Diesel Uninterrupted Power Supplies (DUPS) system noninvasively. • Using vibration analysis, the system can detect 85% of power supply problems before they do damage or cause failure • Information processing for machine diagnostics is done at the edge, providing real-time alerts on potential issues with ample of lead time for managers to rectify • Graphic user interface offers visual representation and analysis of historical and trending data that is easily consumable
Tags : 
     Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com