ria

Results 426 - 450 of 1744Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Feb 08, 2018
CNP fraud is showing no signs of deceleration and is, in fact, expanding rapidly. New trends and new threats call for a revolutionary approach to effectively stop fraud. Learn how to deploy solutions that can quickly distinguish between genuine and fraudulent transactions and take appropriate action instantly. Explore the CA Risk Analytics Network.
Tags : 
    
CA Technologies
Published By: Oracle     Published Date: Nov 30, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Creating a highly scalable, reliable, and efficient DNS infrastructure takes time, money, and expertise. You can accelerate your success and contain costs with a cloud-based service. Cloud-based DNS also exposes myriad opportunities to leverage the DNS infrastructure for global load balancing and traffic steering across hybrid environments.
Tags : 
dns, performance, reliability, network, global, anycast, customer, satisfaction, revenues, designing
    
Oracle Dyn
Published By: ABB     Published Date: Oct 31, 2018
In 2017, Europe produced more Of its electricity from solar, wind and biomass resources than from coal. Today's market is more volatile, with greater variability in energy sources due in large part to the desire to reduce environmental damage. The European Union (EU) is on track to achieve its 2020 goal of reducing greenhouse gas emissions by 20% compared to 1990 levels l by reducing its reliance on carbon-based power. This paper examines the five most critical variables that investors, developers, and others must recognise in the due diligence process before investing in a new power generation project in Europe.
Tags : 
energy industry, power market analysis, investor advice, digital technology, automation technology
    
ABB
Published By: Equinix EMEA     Published Date: May 17, 2019
La guía digital para pagos y comercio describe cómo los líderes de la industria están transformando su ventaja digital para aprovechar una cadena de valor basada en el ecosistema y obtener información en tiempo real y una experiencia fluida. Nuestra estrategia simple de tres pasos ofrece las mejores prácticas comprobadas sobre cómo rediseñar su presencia, integrar las capacidades cloud y SaaS y facilitar nuevas ofertas basadas en la colaboración interconectada.
Tags : 
    
Equinix EMEA
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
It is important to understand the different business situations where traditional predictive analytics can be best applied and where anticipatory analytics may be a more appropriate approach to solve the business problem. One is not necessarily superior to the other – it’s about which methodology is best utilized in solving the specific business problem. Conventional response modeling, revenue potential modeling, wallet share analysis, traditional risk scoring and other analytic practices will always be important tools for businesses far-and-wide, but as more companies focus on analytics to inform growth, they’ll have employ the right team and identify the right partners to work with in order to successfully leverage anticipatory analytics to gain a competitive advantage. Looking forward, we anticipate anticipatory analytics playing an important role in your future. Download this white paper to learn more.
Tags : 
    
Dun & Bradstreet
Published By: Schneider Electric     Published Date: May 09, 2017
Many Industrial IoT operations look at energy reduction and efficiency to save money, but Schneider Electric looks at the looming challenge of energy demand outstripping production. Learn what the analysts think in the 451 Research report.
Tags : 
industrial internet of things, industrial automation, smart automation, iiot, energy reduction, efficiency, smart machines, smart operations, productivity, ecostructure, schneider electric, manufacturing, oem
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Empower your workforce to control operational efficiency, reliability, safety, and profitability together — in real time. Ignite your profit engine today through EcoStruxure™ Foxboro DCS.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : 
consulting, protection strategy, schneider electric
    
Schneider Electric
Published By: HERE Technologies     Published Date: Sep 05, 2018
Ovum's 1H18 Location Platform Index is a tool that assesses and ranks the major vendors in the location platform market, with particular reference to the mapping and navigation space. The index evaluates vendors on two main criteria: the completeness of their platform and their platform's market reach. It considers the core capabilities of a location platform along with the information that the platform opens to developers and the wider location community. The index provides an overview of the market and assesses the strengths and weaknesses of each player. It also highlights the key trends in the mapping space that vendors must keep up with if they want to stay ahead of the game.
Tags : 
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
“Does Cisco Umbrella block ransomware?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider — including Cisco — is seldom an absolute “yes” or “no.” It really depends on how each variant arrives onto your systems, as well as its order of operations for encrypting data for ransom. However, with Cisco you can significantly reduce the number of ransomware infections across your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: Juniper Networks     Published Date: Feb 01, 2016
Juniper’s integrated security solutions are known for successfully protecting some of the world’s most demanding mission-critical environments, based on four core criteria from TechTarget: Breadth of capabilities in one solution Mission-critical performance and reliability Threat intelligence: open source and expertise
Tags : 
    
Juniper Networks
Published By: SAP     Published Date: Nov 22, 2017
In today’s market, discrete manufacturers must stay focused on traditional objectives — increasing uptime and throughput in the plant and closely managing costs throughout their operations. At the same time, they must also create and offer more integrated products and services and even new business models to enhance the customer experience. These new offerings incorporate increasing amounts of technology — including Internet of Things. Indeed, by 2018, nearly one-third of industry leaders will be disrupted by competitors that are digitally-enabled. For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing.
Tags : 
market, traditional objectives, uptime, plant, managing, costs, operations, offerings
    
SAP
Published By: Oracle     Published Date: Nov 09, 2016
As projects become larger and more complex, the variation in contracting standards around the world makes compliance increasingly challenging to maintain—especially when project teams are often operating in different time zones. Easy access to tools that streamline compliance with a range of contracting standards enables construction firms to rapidly improve communication, optimise efficiency and mitigate risk.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Mar 28, 2017
Great food and great service, delivered consistently, are at the heart of any successful restaurant business. But success — and survival — also depend on being profitable. Every restaurant owner, whether independent or part of a large chain, understands that labor and inventory costs represent a significant variable expense to the business. Keeping control of those costs is as critical as the culinary magic that occurs in the kitchen. After all, how can a restaurant expect to make a profit when they are regularly overstaffing or running out of ingredients?
Tags : 
food, service, restaurant, oracle, profi
    
Oracle
Published By: Aerohive     Published Date: Oct 27, 2015
Questo webinar è rivolto a specialisti IT interessati ad apprendere, implementare ed espandere le reti wireless nella propria organizzazione.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
El seminario es para profesionales de IT que deseen aprender, implementar o ampliar redes inalámbricas en sus organizaciones.
Tags : 
networking
    
Aerohive
Published By: IBM     Published Date: May 19, 2016
In our 21-criteria evaluation of the dynamic case management (DCM) market, we identified the 14 most significant software vendors — Appian, bpm’online, Column Technologies, DST Systems, Eccentex, IBM, Isis Papyrus, Lexmark Enterprise Software, MicroPact, Newgen Software, OnBase by Hyland, OpenText, Pegasystems, and TIBCO Software — and researched, analyzed, and scored them. The evaluation focused on providers’ adaptive, analytics, and mobile features, all critical to helping enterprises tackle increasing volumes of varied and unstructured work. This report helps enterprise architecture (EA) professionals select the best providers to meet their unique needs.
Tags : 
ibm, forrester, forrester wave, dynamic case management, dcm, software vendors, software, business technology
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Today, all consumers can obtain any piece of data at any point in time. This experience represents a significant cultural shift: the beginning of the democratization of data. However, the data landscape is increasing in complexity, with diverse data types from myriad sources residing in a mix of environments: on-premises, in the cloud or both. How can you avoid data chaos?
Tags : 
data analytics, product refinement, business exploration, advanced prototyping, analytics, data preparation, customer support, sales relations, market research, model management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.