at

Results 1 - 25 of 43333Sort Results By: Published Date | Title | Company Name
Published By: Quintiq     Published Date: Nov 25, 2016
Can your rail franchise bid deliver the expectations of rail service owners? Service excellence and punctuality are no longer enough – you need a competitive differentiator that increases efficiency and reduces costs.
Tags : 
    
Quintiq
Published By: Brady Corporation     Published Date: Mar 30, 2017
In the Rail Vehicle Manufacturing any identifying label, marker or tag has to withstand aggressive solvents such as diesel without suffering losses in visibility or readability. Wide ranges of operating temperatures add to the demand for highly resistant identification products on wires and components in the Mass Transit Industry.
Tags : 
    
Brady Corporation
Published By: Korenix UK Ltd     Published Date: Jul 29, 2014
Bringing the latest security and surveillance systems (e.g. CCTV), as well as onboard entertainment technologies (Infotainment) such as passenger display screens and WiFi services, to the demanding Rail sector is a challenge. Reliability of these onboard technologies is critical for both train operators and passengers, while also improving the maintenance of onboard devices when trains are on the move.
Tags : 
wifi; cctv; onboard technology; trains
    
Korenix UK Ltd
Published By: TCR Agenda     Published Date: Sep 29, 2016
Leaders from across the region responsible for devolution, infrastructure investment, supply chain engagement and Northern programmes will use this lively and engaging networking dinner and panel discussion to network with new clients and learn if the strategy for the North from HS2, Network Rail, Operators and more.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Mar 08, 2017
TransCityRail North explains how you can engage with major contractors and the wider supply chain whilst gaining clear, concise and business-critical information on how organisations can do business with the region’s stakeholders and Network Rail.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Jul 20, 2018
Who attends TransCityRail?
Tags : 
    
TCR Agenda
Published By: Veeam APAC     Published Date: Apr 26, 2020
Takeaways from downloading the executive brief:Broaden the conversations with cross-section stakeholders to address business impactLeverage operational metrics and translate technologies/issues into dollarsUnderstand data and downtime loss to determine the best strategy and solution choiceDefine a strategy to ensure data protection and AvailabilityWhy wait until something fails, breaks, is overwritten or corrupted accidentally/on purpose? Help your teams learn to quantify the full business impact of downtime and data loss, so that an informed decision is made for your data protection.
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"The key to accelerating your data protection in 2020 is to go beyond backup and recovery to achieve unparalleled data availability, visibility, automation and governance across your cloud, virtual and physical environments. As modern IT organizations look to innovate at a quicker pace, legacy backup and recovery infrastructures just can’t support these forward-looking initiatives. This report covers five principles to success to help drive real, impactful change inside your organizations in 2020."
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Most organizations today rely on virtualized IT infrastructures. Veeam® helps them to provide and increase Availability of critical workloads running on their systems. Due to various factors, some physical servers cannot be virtualized, along with endpoints that might not be protectable in their entirety by leveraging back up solutions built for virtualized systems. Thus, everyday occurrences such as lapses in connectivity, hardware failures, file corruption, ransomware or even theft can leave an organization’s data at risk. Veeam Agent for Microsoft Windows solves these issues by closing the gap that some enterprises face with large, heterogeneous environments and further enabling workload mobility by delivering Availability for cloud-based workloads. This paper describes: - the main concepts behind Veeam Agent for Microsoft Windows - how agents can be managed centrally by integration into Veeam Backup & Replication™ - and more!"
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
Organizations have data in many different places that all must be made available and resilient. Physical systems and the cloud aren't exceptions from this requirement. Despite obvious differences, these types of environments are still much alike in terms of data protection and they demand a proper backup strategy. Luckily, Veeam has an answer to this challenge. Join this session where Andrew is going to showcase how Veeam Agents can play a major role in physical and cloud environments’ data Availability.
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
Enterprise-grade companies used SAP HANA worldwide, SAP HANA is the application directly related to customers core business functionality.It’s mission critical for the companies to have proper disaster recovery strategy for the SAP HANA, in case of any disaster they can restore SAP HANA services and application with less efforts.Veeam well known as Hyper-Availability Platform to simplify the backup and recovery of virtual, physical and cloud workload and provides availability to all mission critical applications.To know more about SAP HANA backup & recovery please read the blog.
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Microsoft Active Directory is the basis for every Microsoft?oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Join this webinar to benefit from their best practices, including: - Protecting and (automatically) expiring passwords - Leveraging the Protected Users group and other protections - Using the Active Directory Recycle Bin - Putting Veeam Backup & Replication™ to good use"
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Ransomware is here to stay. As much as no one likes to hear that, we have to admit that it’s no longer a question of ‘if’ but rather ‘when’ and ‘to what’ extent your business might be affected. Rather than hope it won’t get you, let’s explore all the options that exist to prevent, locate, disarm and mitigate ransomware risks. We’ll go over some essential strategies you can implement today and also review what a comprehensive backup software can offer you, such as: - Simple things to implement right away: 3?2?1 rule, air gapped backups and access policies - Ransomware myths: what really should be taken seriously? - What today’s backup technologies can offer: in?flight malware check, immutable backups - And more!"
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Join us for a webinar discussing business continuity and disaster recovery in Hyper?V environments from a general perspective. More specifically, we’ll cover: - Trends and common backup pitfalls to avoid - Different types and methods of Hyper?V replication - How to keep your backups secure - And more!"
Tags : 
    
Veeam APAC
Published By: Veeam APAC     Published Date: Apr 26, 2020
"More and more companies come to understand that server virtualization is the way for modern data safety. VMware is still the market leader and many Veeam® customers use VMware vSphere as their preferred virtualization platform. But, backup of virtual machines on vSphere is only one part of service Availability. Backup is the foundation for restores, so it is essential to have backups always available with the required speed. This white paper discusses best practices with Veeam Backup & Replication™ and VMware vSphere, such as: - Planning your data restore in advanceKeeping track of your data backup software updates and keeping your backup tools up-to-date - Integrating storage based snapshots into your Availability concept - And much more!"
Tags : 
    
Veeam APAC
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
How Will Composable Infrastructure Help Healthcare Organizations Achieve Quadruple Aim Objectives?
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
Building A Smart Foundation For A Successful Hybrid Transformation
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
451 Research Report: Industrial IoT and the IT/OT Operational Edge
Tags : 
    
Hewlett Packard Enterprise
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
In today’s information-flooded business world, access to sufficient data isn’t a problem. But we often struggle with a different challenge—inefficient data. Data and analytics are increasingly important tools that help us decide where to invest and develop. They are a critical means of measuring the success of current strategies, justifying decisions, and building confidence in plans for growth. Engagement with customers is what matters, and that engagement is often measured in clicks. We track where site visitors are coming from, how many pages they visit, whether they click on ads and banners, and how long they ultimately choose to interact with our site or service. Without this information, we’d be making decisions in the dark. The hidden ROI of an advanced WAF solution: - Advanced security solutions can help you manage the explosion of bot traffic, while cutting costs and improving overall business outcomes – finding ROI in the automation age. - Eliminating bot traffic results i
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Mar 04, 2020
Application security is hard. We see headlines about data breaches almost daily. According to F5 Labs, web application attacks are the #1 single source entry point of successful data breaches. Additionally, the fallout from application attacks come with high costs. Insecure software makes web applications so precarious. Always-on, always-connected apps can help power and transform your business–but they can also act as gateways to the data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read this eBook to review the OWASP Top 10 Injection attacks and how to protect your enterprise.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Atlassian     Published Date: May 19, 2020
x
Tags : 
    
Atlassian
Published By: CheckMarx     Published Date: Mar 04, 2020
https://info.checkmarx.com/wp-financial-services-china?utm_source=madisonlogic&utm_medium=content%20syndication &utm_search_query=WP-CX-Financial-Services&utm_campaign=FinServAPAC
Tags : 
    
CheckMarx
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.