event

Results 326 - 350 of 1655Sort Results By: Published Date | Title | Company Name
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Whether you are running fleet maintenance using standalone software, pen and paper, or logging detailed spreadsheets, you may be missing a critical piece – the ability to receive real-time data from vehicles. That’s where telematics comes to play. There are hundreds of factors, both expected and unexpected, that could upend your day-to-day maintenance operations resulting in costly vehicle downtime and missed routes. While you can manage fleet preventive maintenance manually, investing in a software solution can automate much of the oversight and management process for fleet maintenance.
Tags : 
    
Vehicle Tracking Solutions
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: NetApp     Published Date: May 29, 2018
Read the IDC research report Shared Storage Offers Lower TCO than Direct-Attached Storage for Hadoop and NoSQL Deployments and learn how to: Unify insights across various data sources and multiple cloud deployments Reduce compute, capacity and operational costs Increase security and prevent data loss Plus, learn about the NetApp in-place analytics solution for your existing NAS data and how it can reduce infrastructure costs
Tags : 
    
NetApp
Published By: CA Technologies EMEA     Published Date: May 23, 2018
CA Live API Creator creates application back-ends exposing enterprise-class REST/JSON APIs, including access to existing data and applications. It enables developers to create new REST endpoints that join data across diverse data sources using a point–and–click approach. API owners can extend the API with declarative business rules, JavaScript event processing, role-based security and interactive testing. The CA Live API Creator Reactive Logic model yields systems that are highly scalable and reliable. Its optimized services run more efficiently and with less fragility than services manually coded by skilled developers and architects.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: May 23, 2018
IBM Planning Analytics is the fast, flexible, planning solution that helps you align financial plans with corporate objectives linked to operational tactics and market events. In this quick, 10- minute guided demo, you’ll get hands-on experience with IBM Planning Analytics by building a book for revenue planning. You’ll play the role of a financial planner and learn how to: • Create a book for revenue planning in Planning Analytics Workspace • Adjust the plan by increasing sales through an online channel by 20% • Review the impact of your changes on net profit
Tags : 
ibm planning analytics, revenue planning, income statement
    
IBM
Published By: Infosys     Published Date: May 22, 2018
When one of our client's most strategic web applications was hacked, it was something of a wake-up call. Application security is surprisingly often an afterthought, and serious investment is only sometimes made when security breaches are discovered. Effectively, companies try to close the stable door after the horse has bolted. However, preventive security maintenance of apps is far more cost-effective and less damaging than reactive security. Our client therefore asked us to put in place an app security testing program early in the development life cycle to reduce the chances of similar breaches in the future.
Tags : 
security, technology, data, app, device, web
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
There are several reasons for this, including the inability of healthcare institutions to constantly monitor post-operative deterioration as well as patient's inability to visit the healthcare center for post-operation followups. Most of the patient data is recorded manually. This data is often weaned from displays of multiple monitoring devices like vitals monitor, infusion pumps, and ventilators. More often than not, these devices do not talk to each other or to a central system. Doctors, nurses, or other care-givers manually note down patient statistics in their files and notepads. Even though the healthcare industry is in the throes of digitization, there's still a lot of paper doing the rounds. eventually, the data from these physical sheets might be fed into an electronic system, but there is a high chance of error in that process.
Tags : 
digital, connected, care, patient, healthcare
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
June 28 is Ukrainian Constitution Day. It is also one of the longer days of the year - and in 2017, for the staff at one multinational corporation, it certainly felt that way. They arrived at work to find computers locked by the Petya ransomware. Would the company grind to a halt? Would they be held to ransom? How could they prevent it from happening again? These were the questions. Infosys was hired to provide the answers.
Tags : 
ransomware, security, computer, corporation, business, enterprise
    
Infosys
Published By: Infosys     Published Date: May 21, 2018
Machines often form the backbone of businesses. Machinery breakdowns are extremely costly and there's never really a good time for these breakdowns. IN response to this challenge, companies have explored a variety of strategies - even preventive maintenance programs - to increase machine uptime. But every strategy - even a combination of strategies - has had only limited success.
Tags : 
strategy, business, machines, maintenance
    
Infosys
Published By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia è la realtà industriale leader mondiale nella trasformazione dell’acciaio che opera dall’Italia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unità e 210 rappresentanze commerciali per un fatturato che, nel 2013, è stato di oltre 4 miliardi di euro nel settore dell’acciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
    
Cisco EMEA
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: ServiceNow     Published Date: May 15, 2018
When mission-critical business services fail, consequences are catastrophic. IT organizations are challenged with service availability issues and dealing with disparate monitoring tools resulting in undetected service issues. Read this eBook and take back control with service-aware event management.
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: May 15, 2018
Highly available business services rely on modern IT operations management. Develop a comprehensive service availability strategy to address IT issues before they become business problems. Learn to improve your ability to analyze, prevent, and address service availability issues before they occur.
Tags : 
    
ServiceNow
Published By: CloudTask     Published Date: May 11, 2018
In a world where every competitor claims to be the best, it's extremely challenging to differentiate yourself as a market leader. Effective differentiation is one of the main challenges businesses face while trying to convert traffic into B2B leads. Essentially, it all comes down to great service and personalization Great service doesn't just include solving problems post sale, it also means being in the right place to answer questions and provide information pre-sale. The more your prospects believe that you are there to serve them and their specifc needs, the more likely it is that they will become genuine leads and eventually customers.
Tags : 
    
CloudTask
Published By: Intel Corp.     Published Date: May 11, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: CrowdStrike     Published Date: May 10, 2018
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the proverbial “needle in the haystack” – the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. In this context, detecting attacks is often difficult, and sometimes impossible. This white paper describes how CrowdStrike solved this challenge by building its own graph data model – the CrowdStrike Threat Graph? – to collect and analyze extremely large volumes of security-related data, and ultimately, to stop breaches. This revolutionary approach applies massive graph-based technologies, similar to the ones developed by Facebook and Google, to detect k
Tags : 
    
CrowdStrike
Published By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara
Published By: Schneider Electric     Published Date: May 07, 2018
Industry demands can punish older physical infrastructure. Low agility and high maintenance costs can be prevented
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: Hewlett Packard Enterprise     Published Date: May 04, 2018
Managing infrastructure has always brought with it frustration, headaches and wasted time. That’s because IT professionals have to spend their days, nights and weekends dealing with problems that are disruptive to their applications and organization and manually tune their infrastructure. And, the challenges increase as the number of applications and reliance on infrastructure continues to grow. Luckily, there is a better way. HPE InfoSight is artificial intelligence (AI) that predicts and prevents problems across the infrastructure stack and ensures optimal performance and efficient resource use.
Tags : 
    
Hewlett Packard Enterprise
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: ADP     Published Date: May 02, 2018
Benefits open enrollment, like music festivals, is an annual event that spans cultures, ages, gender and family size. Getting ready for this event can be challenging. You spend months preparing for annual open enrollment, because you know that benefits are strategic and vital to your organization’s success. You work hard to line up the right mix of core benefits offerings that reflect the needs of your employees.
Tags : 
    
ADP
Published By: Zebra Technologies     Published Date: May 02, 2018
Up to 5% of all hospitalized patients are affected by ADEs. Implementing a comprehensive Barcode Medication Administration (BCMA) program can help, reducing medication errors up to 80%. In this white paper Zebra Technologies uncovers best practices for adopting Barcode Medication Administration, including: The importance of building a multidisciplinary implementation team The role of efficient, well-defined workflows How accurate data management and reporting are essential to ongoing BCMA success
Tags : 
safety, technology, zebra, medical, administration
    
Zebra Technologies
Published By: Oracle     Published Date: Apr 30, 2018
In today’s booming world of dining the competition for loyalty is fierce. In just one city block you might find half a dozen artisan coffee shops, independent diners and high-end restaurants all jostling for customers. Consequently it’s no surprise to find that customer loyalty programs sit at the heart of so many eateries’ business strategies. For cafés, diners and restaurants, repeat business is an imperative. One-off bookings are great, but it’s the regulars who sustain business. Frequent visitor stamps, booking priority, a free glass of wine, invites to one-off events – all these strategies keep customers coming back for more. But how hard are these programs really working for businesses?
Tags : 
restaurants, hospitality, business, customers, strategy
    
Oracle
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Resource Library