ces

Results 1 - 25 of 21296Sort Results By: Published Date | Title | Company Name
Published By: Quintiq     Published Date: Nov 25, 2016
Can your rail franchise bid deliver the expectations of rail service owners? Service excellence and punctuality are no longer enough – you need a competitive differentiator that increases efficiency and reduces costs.
Tags : 
    
Quintiq
Published By: Korenix UK Ltd     Published Date: Jul 29, 2014
Bringing the latest security and surveillance systems (e.g. CCTV), as well as onboard entertainment technologies (Infotainment) such as passenger display screens and WiFi services, to the demanding Rail sector is a challenge. Reliability of these onboard technologies is critical for both train operators and passengers, while also improving the maintenance of onboard devices when trains are on the move.
Tags : 
wifi; cctv; onboard technology; trains
    
Korenix UK Ltd
Published By: TCR Agenda     Published Date: Sep 28, 2016
The Northern Powerhouse Rail Conference (NPRC) is the new companion event to the established and successful TransCityRail North networking dinner.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: 02 Business     Published Date: Jan 10, 2014
Untapped Opportunity in the world of passenger services.
Tags : 
    
02 Business
Published By: Hewlett Packard Enterprise     Published Date: Jan 14, 2020
Learn about the HPE Intelligent Data Platform and the new IT realities it addresses. With digital transformation underway in many organizations, more dynamic business models are becoming the key to success. This means infrastructure modernization and the introduction of technologies such as solid state storage, artificial intelligence and machine learning, software-defined infrastructure, and the cloud. At the same time, it means IT infrastructure management becomes much more complex. Enter HPE’s Intelligent Data Platform. With comprehensive coverage and AI/ML-driven real-time optimization that enables intelligent management of the entire data life cycle, the HPE Intelligent Data Platform enables an organization to get the most out of its IT resources while also meeting its evolving needs over time.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 14, 2020
Discover the transformational power of intelligent storage. A company’s competitive success depends greatly on how well it harnesses the value of its data. However, it can be challenging to keep pace with the increases in the scale of data being generated, as well as users’ demands for accessibility. Additionally, maximizing the value of digital information requires data to be leveraged at both the optimal time and the optimal place. With HPE’s intelligent storage portfolio, organizations can modernize their IT to better understand their customers, run more agile IT functions, and improve logistical operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 14, 2020
Companies in every industry and from every corner of the world are increasingly adopting cloud storage, addressing use cases such as backup, archiving and disaster recovery. More than 96% of organizations we recently surveyed are housing at least some of their data in the cloud, up from just 65% five years before. Firms deploying storage in the cloud are looking to increase IT agility and workload scalability, while taking advantage of a more flexible, pay-as-you-go consumption model. But for enterprises and mid-sized organizations alike, the cloud journey nearly always starts on premises. A large majority of organizations still run the core of their business-critical workloads in the data center, supported by significant and proven investments in on-premises hardware, workflows and business processes that support key business apps and ensure maximum value to users and other stakeholders. Not surprisingly, IT decision makers tread carefully when it comes to considering public cloud dep
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jan 15, 2020
"Flash has permeated enterprise storage in small, medium-sized, and large enterprises as well as among webscale customers like cloud and service providers. It is available in a variety of different system architectures, including internal storage, hyperconverged and converged platforms, and shared storage arrays. Revenue driven by shared storage arrays, of both the hybrid flash array (HFA) and the all-flash array (AFA) type, is much larger than from other segments today and will continue to dominate enterprise storage spend through at least 2020."
Tags : 
    
Hewlett Packard Enterprise
Published By: Lenovo     Published Date: Dec 17, 2019
We’re only as good as the tools we use. So, if you’re using Windows 7 on an aging machine, your toolbox is already well out of date. And from 14 January 2020, Windows 7 PCs will no longer receive Windows support. That means no more updates, and no more security patches. Luckily, there are some compelling reasons to modernise your PC fleet with Lenovo devices, powered by Windows 10 Pro, Office 365 and the Intel® vPro™ platform. - More Performance - More Security - More Productivity - More Connectivity - More Efficiency - More Mobility & Durability - More Savings
Tags : 
    
Lenovo
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to explore the five reasons enterprises urgently need a new application access model — one that supports a Zero Trust security framework. The most successful companies continuously evaluate and refine their technology stack to best enable their organization's imperatives and retain their market share. Read this white paper to learn the 5 reasons enterprises need a new application access model that supports a Zero Trust framework."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"While SD-WAN currently enables the corporate network to handle traffic efficiently and move workloads to the cloud, this network model must continue to iterate. The Internet is the corporate WAN of the near future. Using SD-WAN, combined with the appropriate Zero Trust–compliant security and access services, is the first step to transitioning to the Internet as the corporate network. Read this white paper to learn how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers: • Simplified security • Lower latency and better performance • Fewer broken web pages and applications"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats. Read this white paper to learn how to progress your Zero Trust transformation, safeguarding users, applications — and the future of your business — with best practices including: • Isolating your network infrastructure from the public Internet • Enabling WAF to protect corporate applications • Monitoring Internet-bound traffic and activity"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"Phishing is a well-known attack vector in the financial and security industry space. The data shows that, in addition to unique phishing attempts, adversaries also leveraged credential stuffing attacks to the tune of 3.5 billion attempts during an 18-month period, putting the personal data and banking information of financial services customers at risk. Despite massive amounts of effort poured into awareness campaigns, phishing still remains a top threat to financial services organizations including: • 50% of all the unique organizations impersonated by tracked phishing domains were from the financial services sector. • 6% of global malicious login attempts targeted the financial • Financial services industry accounted for 14% of all unique targets between 2017 to April, 2019 Read the 2019 State of the Internet / Security Financial Services Attack Economy Report to learn about lucrative phishing variants, and how criminals stage decoy attacks to distract from their real targets"
Tags : 
    
Akamai Technologies
Published By: Siteimprove     Published Date: Jan 16, 2020
57% der Verbraucher würden ihre Geschäfte mit einem Unternehmen beenden, das ihre personenbezogenen Daten unsachgemäß verwendet. Datenschutz ist nicht nur eine Frage der DSGVO-Konformität, sondern hat auch Auswirkungen auf das Kundenvertrauen, die Reputation und die Wettbewerbsfähigkeit eines Unternehmens. Laden Sie sich das E-Book herunter und erfahren Sie, wie alles zusammenhängt. Dieses E-Book enthält: • Eine Erklärung des Zusammenhangs zwischen Datenschutz, Kundenvertrauen und Wettbewerbsfähigkeit • Vier umsetzbare Schritte, um Kundenvertrauen und Datenschutz zu meistern • Relevante Beispiele zu Best-Practices • und vieles mehr!
Tags : 
    
Siteimprove
Published By: Hitachi EMEA     Published Date: Jan 13, 2020
Cisco and Hitachi have invested significant time and engineering resources to ensure that a large number of deployment options are available to all of our customers and partners. This e-Book includes tips and advice that can help you get the most out of your Cisco and Hitachi Adaptive Solutions for CI deployment. Cisco and Hitachi Adaptive Solutions for Converged Infrastructure will help organizations: Execute data-driven transformation. Simplify IT, improve agility, maintain compliance and ensure reliability. Enable IT to focus on supporting business needs. Download this e-Book now to find out more about the partnership and technology behind Cisco and Hitachi Adaptive Solutions for Converged Infrastructure and to learn how to transform your data center.
Tags : 
    
Hitachi EMEA
Published By: Hitachi EMEA     Published Date: Jan 23, 2020
Find out how Cisco and Hitachi Adaptive Solutions for Converged Infrastructure tackle the problem of data management and help you process, store, analyze, and protect your data.
Tags : 
    
Hitachi EMEA
Published By: Swimlane     Published Date: Dec 26, 2019
Selecting new software can be tricky, and organizations want to make sure they are getting the best value for their time and money. However, focusing exclusively on a list of available feature sets is not the best way to make a software choice. Products are constantly evolving. Frequently, evaluators are left looking at a checklist of seemingly identical features without a real understanding of how to assess the differences from one platform to the next. But if a side-by-side checklist of required features isn’t the answer, what methods can organizations use to choose the right security orchestration, automation and response (SOAR) platform? When it comes to likely indicators of successful platform deployment, it’s essential to look beyond advertisements and dig into the differentiators. A SOAR platform should optimize the work already being done by the organization—better, faster and smarter. Want to know more? Download the SOAR Platform Buyer's Guide to hear what you need in a plat
Tags : 
    
Swimlane
Published By: Swimlane     Published Date: Dec 26, 2019
Efficiently manage your growing volume of security alerts. Platform preferences vary, but there are certain capabilities SOAR solutions should embody. This free e-book reviews the requirements for success. Download this 15-page e-book to see how Swimlane's SOAR platform meets and exceeds the criteria for effective security automation and orchestration. You will learn: Benefits of SOAR Requirements of SOAR Understanding SOAR vs. SIEM Security orchestration Workflow automation API-first architecture Importance of usability Value of Swimlane
Tags : 
    
Swimlane
Published By: Schneider Electric     Published Date: Jan 09, 2020
The utility industry is under pressure to improve substation automation cyber security. Manufacturers of substation products use proprietary or product-specific methodologies for managing device security. As a result, standardization and ease of management of these devices is lacking. This paper reviews processes and procedures for securing a substation, offers advice for overcoming substation asset management challenges, and describes some of the tools available.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
IIoT concepts are transforming the Oil & Gas industry business model in fast and dramatic ways as a result of three key factors: The cost of connected sensors has plummeted; connectivity is now widespread; and new software analytics programs are transforming the efficiency of the Oil & Gas value chain. This paper reviews these concepts and examines how Oil & Gas upstream, mid-stream and downstream processes are impacted and how these processes can derive benefit from this advanced digitization.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
Arc faults in low voltage electrical installations within buildings pose significant safety risks. Electric arcs in conductors and connections are not detected by existing protective devices such as circuit-breakers or residual current devices (RCDs), even though these arcs cause fires. To minimize the threat of electrical installation-related fires, electricians, contractors and building occupants need to consider deploying new Arc Fault Detection Devices (AFDD). This paper discusses new break-through in the field of electrical protection, and identifies critical application areas where AFDDs enhance safety
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
High penetration of distributed energy resources and the increasingly dynamic nature of distribution systems creates many new challenges for today’s distribution system operators. To cope with these tremendous changes, they need to take an active role in managing their systems and adapt to varying conditions in real time. Only a comprehensive set of specialized software tools integrated into a robust solution can handle these challenges and ensure a smooth transition – from traditional, paper-driven processes to a digital and adaptive way of managing grids in real-time. These capabilities are now offered through an Advanced Distribution Management System (ADMS).
Tags : 
    
Schneider Electric
Published By: Evariant     Published Date: Jan 22, 2020
19.7 million clinically inappropriate network referrals occurring each year, contradictions in referral behavior remain a concern. Further, even clinically appropriate referrals can be directed out-of-network for a variety of reasons. 87% of healthcare executives say patient leakage is extremely or very important to their organization. Strong physician relationships, supported by successful physician relationship outreach efforts and campaigns, can help keep patients within a network for better care coordination, and keep significant revenue within the hospital or health system. The infographic pinpoints shortcomings of the current healthcare referral system and highlights opportunities to solve these obstacles.
Tags : 
    
Evariant
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed-breach world. Credential theft is the leading attack type for causing a data breach, and bots are the driving force behind the majority of them. To defend against credential stuffing, prioritizing secure access and bot protection needs to be part of every organization’s security strategy.
Tags : 
    
F5 Networks Singapore Pte Ltd
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.