pin

Results 1 - 25 of 2757Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
Published By: Cyviz APAC     Published Date: Mar 18, 2019
How organizations can navigate digital upheavals and drive disruption through innovation centers.
Tags : 
    
Cyviz APAC
Published By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
With big data, you can understand your consumers better than ever before. But for smarter advertising, you need to harness a more complete view of your consumers, both online and offline. HERE Technologies enables advertisers to make sense of their dynamic user data and build more actionable insights, through audience segmentation, real-time location targeting and attribution.
Tags : 
location data, ad tech, location targeting
    
Here Technologies
Published By: Workday APAC     Published Date: Apr 11, 2019
Whether informing talent strategy or building more effective teams, data-driven insights about your workforce can set you up for success. This eBook from Human Capital Institute explores how people analytics can empower your entire organization. Read now.
Tags : 
    
Workday APAC
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware
Published By: Unit4     Published Date: Apr 12, 2019
Still using spreadsheets for financial planning? With multiple templates? Leading to serious versioning and collaboration difficulties? AI-driven integrated, digitized financial planning is the answer. Helping you spend less time gathering and consolidating data, and more time unearthing the key insights and accurate forecasting hidden within it. Download the white paper and find out how harnessing AI can supercharge FP&A.
Tags : 
    
Unit4
Published By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
o With foot traffic falling and online shopping options growing, retailers must find new ways to “digitize” and understand real-world behavioral data—such as in-store browsing patterns, staff attentiveness, and specific product interest— in the same way that online retail utilizes big data to optimize online experiences. They must also find innovative ways to keep customers engaged with their brands, especially in expensive brick-and-mortar locations. In this environment, managing labor costs is critical, as these costs are second only to real estate. Assigning and enabling sales associates cost-effectively is key to profitability. Retailers have an opportunity to meet their challenges by putting new data and Internet of Things (IoT) technologies to work
Tags : 
    
Intel
Published By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : 
industry 4.0, iiot, smart machines, smart manufacturing, business models
    
Schneider Electric
Published By: Schneider Electric     Published Date: Apr 23, 2019
Energy costs have become an increasing contributor to pumping systems Total Cost of Ownership (TCO). In fact, energy cost represents 40% of the TCO of a typical pump. It is possible to reduce the electrical consumption by at least 30% utilizing Variable Speed Drives while decreasing maintenance costs associated with the mechanical driven system. This paper explains how to reduce TCO with a limited investment focused on three key areas: energy efficiency management, asset management, and energy cost management.
Tags : 
pump, hvac, total cost of ownership
    
Schneider Electric
Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: Loop Commerce     Published Date: Mar 11, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
    
Loop Commerce
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Here Technologies     Published Date: Mar 29, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
    
Group M_IBM Q2'19
Published By: DataCore     Published Date: Apr 23, 2019
In our developing digital economy, IT is a strategic asset. By effectively leveraging data, businesses become more operationally efficient, create more differentiated customer experiences, and develop new products and business models. However, unlocking those benefits requires a higher degree of execution by IT. Simply keeping pace with demand is no longer good enough; IT needs to help drive the business’s digital pursuits. The increased pressure on IT has amplified complexity, as well—66% of IT decision makers surveyed by ESG say IT is more complex than it was just two years ago.1 Demands being placed on IT are scaling relentlessly, and the tools IT teams use are in a constant state of evolution. Integrating and optimizing those new infrastructure technologies while managing existing investments is a perpetual burden. IT organizations, therefore, have two choices: either increase their personnel and budgets enough to survive the evolution with just traditional tools, or redirect those
Tags : 
software defined storage, hyperconverged, storage consolidation, storage management, data migration, storage migration
    
DataCore
Published By: Intel     Published Date: Mar 19, 2019
Digital kiosks are fast becoming ubiquitous in quick-service restaurants, cinemas and retail stores as retailers grapple to embrace automated, digital solutions to keep up with rising labour costs, customer expectations and stiff competition. To maximise the value of self-ordering kiosks, retailers should not perceive digital kiosks as a means to an end but a critical touchpoint within the customer journey. Download the whitepaper to discover how the new generation of self-order kiosks— • Can resolve the challenges of acquiring, training and maintaining a workforce • Can enhance customer experiences throughout the entire shopping and purchasing process • Can facilitate better business decision making through access to valuable customer data
Tags : 
    
Intel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library