intelligent

Results 101 - 125 of 478Sort Results By: Published Date | Title | Company Name
Published By: Mitutoyo     Published Date: Aug 24, 2018
Today’s factory intelligence is the collaborative orchestration of people and machines. By blending intelligence from multiple sources, factories are truly becoming smarter. But it’s not just about the machines. Rather, people are improving machines through a true partnership that turns human experience into smarter machines. This shift marks a re?orientation to a thought process that’s more natural to people. After decades of working with 2D blueprints, designs and dimensioned drawings, factory intelligence leverages 3D models that are easier for people to comprehend and use. Plus, many people find more satisfaction in intelligent factory work that challenges them to manage relationships among machines, rather than repeatedly working on a single piece in a line. In smarter factories, people direct machines to adjust for shifting customer requirements and market demands.
Tags : 
factory intelligence, 3d models, market demands, model-based enterprise, supply chain, precision metrology, cmm
    
Mitutoyo
Published By: Gigamon     Published Date: Dec 13, 2018
Perimeter-based solutions for network security do not work, leading to tool sprawl and performance issues. Read CSO Magazine’s interview with Gigamon CISO, Simon Gibson, to learn why a new, more intelligent approach is needed to build resilience into technology operations. “Security Should Be an Enabler” talks about an architectural approach that distributes only relevant data to appropriate tools, enabling an adaptable, simplified model at a reduced cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Cisco     Published Date: Dec 27, 2017
Digital transformation is reshaping the business landscape faster than at any time in history. It used to take decades to disrupt a market, but natively digital companies such as Uber and Airbnb have disrupted their industries in just half a decade. Digitization is creating new winners and losers at an unprecedented rate. Organizations that adopt a digital strategy will leapfrog the competition, while those that do not will risk becoming irrelevant within five years. One important step in becoming a digital enterprise is becoming an agile organization—that is, having the ability to take advantage of market opportunities faster than the competition. This shift to being an agile business has now become a top initiative for IT and business leaders. However, business agility cannot be achieved without having an agile IT infrastructure to enable it. This is why businesses spent more than $12 billion on technology to make IT more agile in 2014, according to ZK Research.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Nov 30, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
Companies are looking to their CFOs for strong leadership in developing corporate strategies and achieving growth. CFOs can meet these rising expectations by leveraging their knowledge of corporate data to extract valuable insights about customers, suppliers, partners and other stakeholders. Supported by analytics, CFOs can help their companies create a global, unified and clear view of their many relationships with customers and others to guide intelligent risk-taking and thoughtful investment—both necessary catalysts for growth. This capability will also enable the company, particularly its sales and marketing functions, to move faster and adapt more quickly to changing conditions. The 21st-century CFO is not only concerned with controlling costs and minimizing risk, but also with maximizing opportunities and generating growth. The right foundational technologies and organizational processes for data-driven decision making can help them achieve all of these strategic goals.
Tags : 
    
Dun & Bradstreet
Published By: Cisco     Published Date: Sep 17, 2015
This paper explores how service providers are unleashing the power of their networks to improve agility and become more efficient.
Tags : 
simplifying the network, service providers, network, intelligent network, network architecture, cisco evolved services platform
    
Cisco
Published By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: Zscaler     Published Date: Oct 26, 2018
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them. Download this whitepaper today to find out more.
Tags : 
    
Zscaler
Published By: IBM     Published Date: Feb 02, 2016
Read this report to gain more insights from the Telecoms.com Intelligence survey, and learn why telecommunications operators need analytics to understand their customers—and maintain their loyalty.
Tags : 
ibm. telecom, data, analytics, customer management, customer loyalty
    
IBM
Published By: IBM     Published Date: May 17, 2016
Analyst Mike Ferguson of Intelligent Business Strategies writes about the enhanced role of transactional DBMS systems in today's world of Big Data. Learn more about how Big Data provides richer transactional data and how that data is captured and analyzed to meet tomorrow’s business needs. Access the report now.
Tags : 
ibm, intelligent business solutions, big data, transaction data, business analytics
    
IBM
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Get enterprise-class encryption to help meet regulatory demands and secure data in on-premises, cloud and hybrid cloud environments.
Tags : 
encryption, regulatory demands, ibm encryption
    
Group M_IBM Q1'18
Published By: Schneider Electric     Published Date: Apr 20, 2018
Provide stable data center and network services across a multi-building, multi-campus school district.
Tags : 
data closets, cloud management, remote visibility, it staff, data center
    
Schneider Electric
Published By: BMC Software     Published Date: Jul 24, 2014
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center.
Tags : 
intelligent, compliance, breach, security, data center, control
    
BMC Software
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks, data center
    
Noction
Published By: NetApp     Published Date: Sep 21, 2017
This brief explains SolidFire's solution to the modern data center's struggle that exists between applications and storage, and how it offers a distinct scale-up storage application that intelligently dictates system performance in real time.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire
    
NetApp
Published By: Mitel     Published Date: Apr 07, 2017
Für intelligentere Geschäfte Die heutige Geschäftswelt wird zunehmend schnelllebiger, wettbewerbsorientierter und globaler, außerdem nimmt der Einfluss von Technologie immer mehr zu. Kulturelle, technologische und physische Elemente greifen ineinander und treiben den Wandel voran wie nie zuvor. Gefordert wird eine freiere Arbeitsgestaltung, der Trend zur „BYOD“-Praxis (bring your own device) setzt sich immer weiter durch, echnologieinnovationen und neue Geräte, Plattformen und Anwendungen halten immer weiter Einzug und internationale und regionale Grenzen werden überwunden.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
De nos jours, le monde des affaires est rapide, compétitif, mondial et fondé sur la technologie. Des éléments culturels, technologiques et physiques collaborent pour accélérer le changement comme jamais auparavant. De la demande pour plus de liberté dans notre façon de travailler et la tendance de l’AVEC (« Apportez Votre Équipement personnel de Communication »), à l’innovation technologique et à l’adoption croissante de nouveaux appareils, plateformes et applications, en passant par la suppression des barrières internationales et régionales.
Tags : 
    
Mitel
Published By: Arrow Electronics     Published Date: Oct 28, 2015
The Internet of Things enables a level of communication, collaboration and interaction between devices, sensors, machines and people that has never before been possible. This connectivity is what is called an intelligent system, and it’s revolutionizing the way we think about edge products.
Tags : 
    
Arrow Electronics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.