safe

Results 26 - 50 of 916Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 30, 2015
Leverage the full potential of IoE.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Better protect citizens and communities safer.
Tags : 
    
Cisco
Published By: Avaya     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget.
Tags : 
new technology, best practices, competitive advantage, smart campus
    
Avaya
Published By: HERE Technologies     Published Date: Dec 05, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and find out how governments can harness the benefits and apply them across regions to enhance mobility, experiences and safety. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich and always up-to-date, is a leader in the location data arena.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 05, 2018
Get higher quality, more accurate location data – and a safer, more profitable fleet – by choosing the right location services provider. The true value of a location platform comes from bringing together multiple data sources and presenting them in a meaningful way. Using a platform approach, you can help customers differentiate their service, increase margins and increase safety. So, in this guide, we cover the four key considerations for choosing a mapping and location service platform to ensure a high quality, accurate mapping service for you and your customers. Download the eBook
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 05, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of how fleet and logistics software providers can deliver more value in their solutions to enhance efficiency, productivity, and safety. In this report by Counterpoint Technology Market Research, learn why the HERE Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: Schneider Electric     Published Date: Feb 08, 2018
This paper contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 26, 2018
This on demand webinar contrasts the features of medium voltage fixed circuit breaker switchgear (FCBS) and existing withdrawable circuit breaker switgear (WCBS) designs. Modern FCBS design elements that are discussed include an internal disconnect for isolation and grounding of circuits and interlocked operation among disconnect, breaker, and grounding switch for improved safety. Furthermore, features such as lower maintenance, smaller footprint, and reduced life cycle costs that result from its simpler design will be explored. By comparing the traditional ANSI WCBS technology to that of the FCBS, this paper will demonstrate that the fixed design, which has gained widespread acceptance in global markets outside the United States, is a viable alternative to the withdrawable designs.
Tags : 
fixed circuit breaker, withdrawable circuit breaker, medium voltage, switchgear, arc flash, air insulated switchgear, gas insulated switchgear, ansi
    
Schneider Electric
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The world set a new record for data breaches in 2016, with more than 4.2 billion exposed records, shattering the former record of 1.1 billion in 2013. But if 2016 was bad, 2017 is shaping up to be even worse. In the first six months of 2017, there were 2,227 breaches reported, exposing over 6 billion records and putting untold numbers of accounts at risk. Out of all these stolen records, a large majority include usernames and passwords, which are leveraged in 81 percent of hacking-related breaches according to the 2017 Verizon Data Breach Investigations Report. Faced with ever-growing concerns over application and data integrity, organizations must prioritize identity protection in their security strategies. In fact, safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in 2017.
Tags : 
data breach, credential stuffing, system security, security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
In today’s digital marketplace, your applications are your business. They fuel innovation and are the driving force for staying competitive in an always-on, always-connected world. Apps are the way you build relationships with your customers, empower your employees, facilitate growth, and so much more.
Tags : 
cloud risk, application safety, corporate data risk
    
F5 Networks Inc
Published By: Aria Systems     Published Date: Jun 15, 2016
Overcoming the obstacles to deliver the modern learning demands of a smart campusFrom secure BYOD to robust WiFi and comprehensive video surveillance, the IT challenges schools face to ensure smart, safe campuses are not minor. This on-demand webinar details how schools like yours seamlessly integrated new technology on a budget >
Tags : 
    
Aria Systems
Published By: Epicor     Published Date: Aug 14, 2018
As an automotive parts or components manufacturer, you may be both encouraged and challenged by a growing number of trends in the automotive marketplace. From disruptive trends in product developments—such as electric vehicles, advanced assistance and safety capabilities, and driverless vehicles—to trade tariff increases, regulation changes, and higher interest rates, it’s apparent that change is in the air Download now to learn more!
Tags : 
    
Epicor
Published By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware AirWatch
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Epson     Published Date: Mar 15, 2019
Learn how augmented reality glasses and drones are being used in advanced search and rescue operations. Epson’s Moverio smart glasses allow drone pilots to have a heads-up, line-of-sight flight experience, resulting in safer, more productive operations. Moverio enables real-time access to aerial sensor data from a DJI enterprise drone, allowing operators to see: Temperature data Imagery through smoke Locations of victims How full a tank is Make the most out of your Enterprise DJI drone with Epson’s Moverio Augmented Reality glasses. Click now to schedule a demo
Tags : 
    
Epson
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Adobe     Published Date: Mar 27, 2018
Imagine a young, urban couple with their third baby on the way. They’re ready to make the oft-dreaded leap to a minivan, and it’s time to decide on a brand and a model. While dad checks safety ratings and online reviews, mom calls her friends to ask how they like their own vans. Together, they review and compare features on the manufacturer’s website and later “build” their dream minivan, choosing colors, fabrics, floor mats, and other accessories—all without leaving their living room. Perfect car in hand and confident that they’ve chosen the best one for their needs, they arrive at the dealership and walk onto the showroom floor, ready to finally meet their salesperson.
Tags : 
    
Adobe
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
    
SAP EMEA Global
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Eaton     Published Date: Jul 09, 2018
Code updates happen for one main reason: safety improvement. NEC (National Electrical Code) Article 408.3 helps take electrical safety for service entrance panels to a new level. The code, updated in 2017, includes provisions to provide shock protection via panelboard barriers. The barriers protect from energized conductors on the line terminals of the main overcurrent protection device (OCPD) in a panelboard. When the main circuit breaker in a panel is turned off, line side terminals and conductors remain energized from upstream via the utility or another panelboard. With these barriers in place and the main OCPD turned off, installers are better protected when pulling wires into the panelboard. Today, all panelboards are shipped with shock-protective barriers. However, barriers are new to installation procedures, so contractors may not recognize them and accidentally throw them out—easily and often.
Tags : 
    
Eaton
Published By: T Systems     Published Date: Nov 19, 2018
If only there was a whitepaper that could explain how digitalization is changing the retail landscape while advising retailers on how they can embrace this driving force to excel in the industry. Here at T-Systems, we have produced a whitepaper that provides a detailed look into what is required for your retail business to succeed in the digital age. Our ‘Shaping Retail’s Future, Understanding & Delighting Customers in The Digital Era’ provides you with the means to safely navigate and prosper from the effect that digitization is having upon the industry. In a retail world that demands engaging with an ever more sophisticated level of consumer, those whom exhibit less brand loyalty year-on-year – the window for error has become decisively small. Our whitepaper enables your business to identify your digital needs for more effective retail operations by asking critical questions to reveal and plug your capability gaps. We examine the importance of developing the right omnichannel strateg
Tags : 
retail, sales, whitepaper, t-systems, omnichannel, data analytics, touchpoints, digitization, iot
    
T Systems
Published By: Dell EMC Storage     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC     Published Date: Mar 27, 2019
The automotive industry is in the midst of a highly competitive transitional period, with the ultimate goal of fully autonomous or “driverless” vehicles likely to be realized within a decade. The scale and intensity at which OEMs and Tier 1 suppliers must bring innovations to market – while containing costs, mitigating risks, managing product complexity and maintaining compliance – is challenging. The emergence of Advanced Driver Assistance Systems (ADAS), designed to enhance passenger, vehicle and road safety, introduces disruptive requirements for engineering IT infrastructure – particularly storage, where even entrylevel capacities are measured in petabytes. This paper will explore the infrastructure challenges facing OEMs and Tier 1 suppliers in developing and validating ADAS technologies, and propose a storage solution that is optimized for such workloads, delivering high performance, high concurrency and massive scalability.
Tags : 
    
Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee