• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

high tech

Results 526 - 541 of 541Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
By: HP Inc.     Published Date: Aug 30, 2018
At HP, we know that in retail and hospitality environments, customers expect a fast and simple way to find information or to complete a transaction. The physical point-of-sale experience must rise to meet the demands of retailers through high aesthetic value and peak performance. From an elegant hotel to a small boutique, a quick-service restaurant to an outdoor garden center—all of these locations require a point-of-sale device that meets specific needs while appealing to any user. My team at HP sought to elevate this experience by redefining the customer experience through a versatile, reliable, and beautiful point-of-sale system. For the new HP ElitePOS, we gained insights from everywhere—designers, technologists, retailers, and consumers—to create a product that is beautifully simple. It started as a sketch on a napkin, and is now part of an iconic portfolio that dissolves barriers during point-of-sale customer interactions.
Tags : 
    
HP Inc.
By: Dassault Systèmes     Published Date: Jun 19, 2018
As more companies compete for business, Original Equipment Manufacturers (OEMs) increasingly demand higher production rates and greater production flexibility from suppliers. If smaller-sized companies want to compete, they need the right tools and latest technology. NC Machining manufactures should ask three primary questions when considering the tools to improve competitiveness and implement Lean practices: • Do the tools provide the means for improved collaboration between engineering and manufacturing, and incorporate manufacturing best practices? • Can all data and program information reside in one database or platform that is accessible concurrently by all enterprise stakeholders—from design engineering to the shop floor? • Is it possible to perform real-time multi-disciplinary simulations to improve performance and manufacturing targets? Discover how to optimize your NC Machine Shop Production, minim
Tags : 
    
Dassault Systèmes
By: CA Technologies EMEA     Published Date: Sep 07, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
By: Bluewater Learning     Published Date: Aug 29, 2018
The focus on employee engagement as a driver of better business results has gotten so much traction it’s spawned an entire category of solutions within the HCM universe. But if you’re a SumTotal client, you already own a tool that has incredible — but often-overlooked — potential for creating an environment in which engagement can not only flourish, but actually be sustained. It’s all about having content that strategically positions your company, is easy to find, and truly engages your employees to seek opportunities to make a difference and to grow professionally. To really shape your SumTotal LMS into the effective piece of technology you know it can be — to see it achieve the results you and your leadership team expect it to deliver — you need to be a content architect and have a great content strategy. Now you can learn the process Bluewater has developed through years of experience helping clients worldwide maximize their SumTotal LMS to drive higher engagement and better business results: • Mapping out a plan for engagement success • Understanding the negative effects when you don’t have a content strategy that makes strategic sense for your organization — on employees, leaders, LMS owners, and learning practitioners • Architecting content for engagement today — and for the road ahead • Building the framework for a rich content ecosystem where learners feel at home • Focusing on people, processes, and technology: an approach to content strategy that supports a culture of engagement It’s all about being ridiculously happy with your SumTotal LMS.
Tags : 
    
Bluewater Learning
By: SAP     Published Date: Oct 11, 2018
For years, high-tech companies have relied on manual, linear, design-to-deliver processes when selecting, managing, and collaborating with suppliers of components and raw materials. But the digital marketplace has transformed the nature of how business gets done. Digital networks are disrupting business and changing the nature of direct spend management – and just in time to deliver new efficiencies and cost savings needed to compete in today’s complex marketplace.
Tags : 
    
SAP
By: Dell EMC Storage     Published Date: Nov 28, 2018
It is now apparent that three specific technology advancements—non-volatile memory express (NVMe), NVMe over fabrics (NVMe-oF), and storage-class memory (SCM)—are transformative and will end up guiding the future of high-end data storage. Each of those technologies reduce I/O latency significantly. However, organizations working to transform their data centers shouldn’t regard performance as the only end goal. Great performance is important because it increases an array’s ability to handle any workload intelligently, scale to meet unpredictable demand, and operate cost efficiently. The Dell EMC PowerMax powered by Intel® Xeon® processor is an impressive example of this type of modern storage architecture. It has been designed deliberately to maximize the speed of NVMe and by extension, offer transformational efficiency benefits and business value.
Tags : 
    
Dell EMC Storage
By: HERE Technologies     Published Date: Jul 11, 2019
On-demand services that transport people in high volumes over short distances have a crucial role to play in changing urban transportation. New technology and data bring a wealth of opportunity for new mobility service providers to optimize, keep customers satisfied and achieve the operational superiority for which they’re all striving. This ebook looks at the critical role location intelligence can play in helping on-demand organizations make that extra drop-off each hour. By reading this ebook, you will discover: - How accurate location, asset and routing data can aid fleet optimization and improve service response times - How accurate pick-up and trip destination ETAs ensure time isn’t wasted connecting users with drivers - How services can calculate the fastest possible route between multiple waypoints to maximize journey efficiency
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
By: Darktrace     Published Date: Jun 17, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Shell U.K. Limited     Published Date: Aug 28, 2019
The success of your agricultural business depends on your ability to keep your equipment working efficiently and reliably, particularly when sowing and harvesting. Yet two in five (41%) farm managers say they often experience breakdowns because of ineffective lubrication – and 62% say their maintenance teams need more training. This is why we’ve created Shell lubricants for Driveline: a suite of high-performing lubricants and expert advice that adds up to more than the sum of its parts - making your equipment much more efficient and productive. Putting this into perspective, customers leveraging Shell Technical Services have seen a marked improvement in their operations. This has delivered over $68M in documented value savings to Shell’s B2B customers.
Tags : 
    
Shell U.K. Limited
By: SDL     Published Date: Sep 20, 2019
In a global and highly regulated marketplace, pharmaceutical and biotech firms face a challenge in managing regulatory labeling submissions that meet multiple country and regional requirements in many different languages. This process has historically required substantial manual intervention and review by highly paid professionals, contributing to unnecessary costs and delays in medicinal product launches. Biopharma executives hope that new, cloud-based tools will help solve this costly dilemma. To market their products globally, biopharmaceutical firms must ensure their product information complies with local regulatory filing requirements. Submissions often need to be revised to reflect in-country linguistic, formatting, and timing mandates. In-country compliance is usually overseen by local affiliates that manage the process internally. Tasks such as translation and formatting are typically outsourced to in-country providers. For the corporate global regulatory affairs (GRA) functio
Tags : 
    
SDL
By: BehavioSec     Published Date: Sep 30, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter