ctr

Results 326 - 350 of 1032Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
Published By: HP     Published Date: Jun 09, 2014
A brochure on the challenges addressed by HP Records Manager.
Tags : 
records manager, edrm
    
HP
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology
    
Comcast Business
Published By: Schneider Electric     Published Date: Oct 11, 2019
Colocation facilities are rapidly designing and building new facilities in order to capitalize on market opportunity. Getting the facility up and running is the first challenge. The second? Recruiting, training, and retaining qualified data center staff. In this webinar, co-hosted by Tony DeSpirito, VP & General Manager Data Center Operations at Schneider Electric, & Brian Gisi, Infrastructure Management & Services Manager at IBM, to access field-tested methods & strategies that can help you: 1. Overcome the worldwide shortage of experienced data center professionals 2. Understand how out-tasking data center operations can benefit you & your clients 3. Identify key characteristics of a strong data center operations partner
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
As if the selection of manufacturer weren't enough, many encoders offered in today's marketplace are highly configurable. Resolution, shaft size, seal options and connector variations all confront the design engineer with serious choices. Output type is equally important. In this paper, we'll cover some of the more typical applications and common output types.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
    
Dynapar Corp.
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
    
Dynapar Corp.
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.
Tags : 
digital rights management, locklizard, key management, time limitations enforcement
    
LockLizard
Published By: Spectra Logic     Published Date: Aug 21, 2009
Read how Spectra Logic Corporation's BlueScale Encryption integrates hardware encryption directly into the electronics of a tape library, offering a practical, affordable, & scalable option.
Tags : 
backup, database security, data security, encryption, tape-based backup, tape backup, data encryption, spectralogic
    
Spectra Logic
Published By: TIBCO Software     Published Date: Aug 20, 2019
Endesa is a leading energy company in Spain and Portugal with around 10,000 employees, providing services for over 11 million customers. The company is committed to spreading a more sustainable energy culture and strives to be at the forefront of the technological transformation of the energy industry. To meet this goal, Endesa joined the Enel Group in 2009, a multinational energy company and leading integrated operator in the global electricity and gas markets, with a particular focus on European and Latin American markets.
Tags : 
endesa, endel group, open power concept, spotfire, streaming analytics
    
TIBCO Software
Published By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : 
hp data center, energy efficiency, data center, high-availability it environments, green initiatives, it infrastructure, epeat, global commerce
    
HP Data Center
Published By: FICO EMEA     Published Date: Aug 30, 2019
Telecommunications companies lost more than $29 billion to consumer fraud in 2017 globally (1.27% of their revenues). The largest and most advanced communications service providers (CSPs) have sophisticated fraud detection systems and processes in place, but those organizations are now questioning their fraud readiness. Are they doing enough? Fraudsters may be individuals or increasingly sophisticated criminal networks. They constantly develop new methods and target new lines of business Read this interview where Anat Hoida, Head of the FICO’s Telecom Practice in Europe, Middle East, and Africa, discusses the impacts of the evolving spectrum of fraud risks on the growth and competitiveness of CSPs globally.
Tags : 
telecom subscription fraud, prevent fraud, fight fraud using analytics
    
FICO EMEA
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
Published By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : 
compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc
    
PTC
Published By: Cisco     Published Date: Nov 18, 2015
Smart technologies are a force multiplier for public safety agencies, allowing them to serve growing populations even as public spending remains constrained. The Internet of Everything (IoE) provides the connective tissue in this evolving operational environment — not only bringing together objects embedded with electronics, software and sensors, but making them work together in the service of better policing. The IoE makes it possible to collect data and share it via the cloud, uniting disparate jurisdictions, agencies and ranks of command in positive ways. These smart and connected technologies promote collaboration and transparency among public safety agencies, revolutionizing how police, fire, courts and corrections do some of the nation’s most important work.
Tags : 
public safety, data, cloud, communication, ioe
    
Cisco
Published By: Schneider Electric     Published Date: Oct 17, 2016
Die Kostenverursacher der TCO warden quantifiziert. Es wird gezeigt, dass der größten Kostenverursacher unnötige Kosten aufgrund einer überdimensionierten Infrastruktur sind.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
Dieses White Paper beschreibt Methoden zur Ermittlung des Leistungs- und Kühlungsbedarfs sowie zur Dimensionierung der elektrischen Versorgung für das gesamte Datacenter, inclusive IT-Geräte, Klimaanlagen, Beleuchtung und Notstromversorgung.
Tags : 
    
Schneider Electric
Published By: IFS     Published Date: Aug 15, 2011
In this whitepaper, we'll examine the different enterprise agility barriers reported by study respondents and discuss how energy industry executives can select software for enhanced enterprise agility and change readiness.
Tags : 
ifs, erp, electric power, enterprise resource planning, energy industry, enterprise software, enterprise agility
    
IFS
Published By: Group M_IBM Q1'18     Published Date: Mar 06, 2018
IBM’s Spectrum Protect offering boasts more than 20 years of achievement in data availability.
Tags : 
ibm spectrum protect, data availability, esg, ibm
    
Group M_IBM Q1'18
Published By: Document Cloud for Enterprise     Published Date: Apr 23, 2015
This white paper explores several factors relating to the legality of e-signatures in various applications.
Tags : 
esign law, e-signatures, electronic signatures, digital signatures, e-signature solutions, esign act, law makes digital signatures legal, authentication
    
Document Cloud for Enterprise
Published By: Echosign     Published Date: Oct 07, 2011
Adobe EchoSign is the leading esignature provider, delivering efficiency and security to any signing process. Learn more at a free webinar.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures
    
Echosign
Published By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : 
schneider, electric, data, center, facility, operations, maintenance, management
    
Schneider Electric
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc présente une approche simple, supportée par des outils Web gratuits, permettant l’estimation de l’empreinte carbone d’un datacenter, quel que soit son emplacement à travers le monde.
Tags : 
    
Schneider Electric
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library