var

Results 1 - 25 of 1335Sort Results By: Published Date | Title | Company Name
Published By: Daniels Trading     Published Date: Mar 02, 2012
Learn how and when to use various conditional settings beyond the typical close period used exclusively by many traders
Tags : 
    
Daniels Trading
Published By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: 3D Systems     Published Date: May 15, 2019
La microfusione è un'accurata metodologia di produzione che fornisce valore aggiunto a vari settori, dalle parti meccaniche, ai componenti per automobili e aerospaziali, fino agli intricati modelli per prodotti odontoiatrici, gioielli e sculture. In passato la produzione di parti microfuse lisce e accurate comportava costi elevati e tempi lunghi di consegna legati ai modelli di fusione. Oggi l'evoluzione delle parti sta accelerando drasticamente in molti settori industriali, con conseguente riduzione dei cicli di vita dei prodotti e dei volumi di parti fuse tra un ciclo e l'altro. L’attesa di stampi per realizzare parti obsolete di aerei più vecchi significa anche ritardi nella riparazione degli aerei, con conseguenti costi di tempo e denaro. La domanda di una produzione di fonderia più rapida è in aumento in tutti i settori industriali e le fonderie devono essere pronte a rispondere.
Tags : 
    
3D Systems
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
    
MalwareBytes EMEA
Published By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : 
consulting, protection strategy, schneider electric
    
Schneider Electric
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: CheckMarx     Published Date: Apr 03, 2019
Dinosaurs are super cool. That’s an indisputable fact. There are some places though, where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. Early on, in the days before DevOps and Continuous Integration, one of the original players in the AppSec space produced an early SAST tool, offering a wide variety of supported languages, and they quickly built name recognition and a large install base of customers. Yet, 15 years and two acquisitions later, that company has become a software dinosaur – a mere relic – maintaining a product that is too big, too slow, and too clunky to deliver the innovation needed to protect its customers in the 21st century.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
Published By: Motorola Solutions     Published Date: May 21, 2019
When it comes to worker safety, efficiency and production, nothing is faster than right now. Organizations across various energy segments — oil, gas, petrochemical, electric utilities, water utilities and mining — are currently juggling a mix of communications solution devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. The power of now puts instant communications at your workers’ fingertips — because when communication slows, operation slows. Citizens rely on their homes being heated in the winter, clean running water and lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for energy workers day-in and day-out. So workers can communicate safely in hazardous environments. So precious resources are not wasted and efficient operations are maintained. So energy companies can continue to exceed expectations. Unified communicati
Tags : 
    
Motorola Solutions
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : 
asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
    
ASG Software Solutions
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: LSSiDATA     Published Date: Feb 05, 2010
New movers are ideal targets for Direct Marketers. New homeowners and renters invariably purchase a wide range of products and services. According to moving.com "People who are moving spend more during the 3 months surrounding their move than non-movers spend in 5 years."
Tags : 
lssidata, data, direct marketers, marketing, super consumers, new mover, clv, clec, firstconnex, line
    
LSSiDATA
Published By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Tags : 
    
Entrust Datacard
Published By: HPE APAC     Published Date: Jun 16, 2017
This white paper examines the various threats faced by mid-sized businesses and explains why a comprehensive approach to protection and resilience makes good business sense, and helps IT managers benchmark their company’s security posture against their peers’.
Tags : 
    
HPE APAC
Published By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Oct 24, 2016
All of these elements of growing connectivity have the potential to significantly increase productivity, streamline operations and enhance service levels to citizens and stakeholders. But these benefits are only one side of the story. The added complexity of the new eGovernment environment also creates many new challenges, as government agencies search for effective ways to secure and control access to the rapidly growing number and variety of gateways to their ecosystems.
Tags : 
    
Entrust Datacard
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : 
big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Nov 15, 2017
A new Harvard Business Review Analytic Services global study of more than 300 midsize to large enterprises finds that many executives believe current collaboration tools fall short on supporting the depth, pace, and style of teamwork now required to keep up with today’s most important business imperatives.
Tags : 
collaboration, collaboration tools, harvard business review, team work, teams
    
Cisco EMEA
Published By: goTransverse     Published Date: Oct 15, 2015
Stratecast regularly examines the monetization processes and functions within the communications service provider (CSP) sector. This week’s SPIE looks at how other industries are now benefiting from monetization concepts first developed within telecom; and how taking advantage of the details within the monetization process itself enables innovation in surprising new ways. This report also assesses how one company—goTransverse—is enabling a variety of customers across various industries to change how they do business; applying monetization principles in somewhat unconventional ways.
Tags : 
    
goTransverse
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.