event

Results 1 - 25 of 1604Sort Results By: Published Date | Title | Company Name
Published By: UKRIA     Published Date: Jan 09, 2018
The UK Rail Industry Awards is the UK rail industry’s most prestigious annual event! Download the free UKRIA 2018 Media Pack
Tags : 
    
UKRIA
Published By: TCR Agenda     Published Date: Sep 28, 2016
The Northern Powerhouse Rail Conference (NPRC) is the new companion event to the established and successful TransCityRail North networking dinner.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: Dell APAC     Published Date: May 25, 2019
A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies
Published By: ETQ     Published Date: Jul 10, 2019
Product recalls cost food and beverage companies millions of dollars each year, but 56% of last year's recalls across the US, UK and Ireland were preventable. With compliance challenges becoming more complex and public scrutiny exponentially greater, one recall can cause a world of trouble. The new US Food Safety Modernization Act (FSMA) seeks to encourage a more proactive and predictive approach to food safety. Learn how automation can help you comply with this new regulation by 2020 and avoid a costly product recall.
Tags : 
    
ETQ
Published By: Infinidat EMEA     Published Date: May 14, 2019
Data is the DNA of modern healthcare. As healthcare technology continues to evolve at a rapid pace, and patient data management and security evolve, emerging approaches for disease treatment and prevention—like precision medicine and healthcare content management—are becoming more necessary. Precision medicine is about moving from generic to more precise, population-focused diagnostics and treatment by factoring in data from patients’ genes, environment, lifestyle factors and family history, into clinical decision-making for earlier, more accurate diagnoses, and more effective treatment and prevention. Data is at the heart of enabling doctors and scientists to execute on this mission. Additionally, rapidly changing regulations throughout the world are affecting the management of all healthcare data. Infinidat removes data management barriers from this level of data interaction by removing isolated islands of storage and allowing much more data to reside on a single, high-performance, h
Tags : 
    
Infinidat EMEA
Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk when there is an actual emergency. With weather events, ransomware, and other outages distruping your business, you need a modern disaster recovery solution that really works at time of disaster. Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn hoe the commvault platform for data management provides availability for your business against today's real world outages
Tags : 
    
Commvault ABM Oct
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing, load balancer, application delivery, application delivery controller, application delivery network, ssl acceleration, ssl offloading, server offload, server offloading, server acceleration, content switch, content switching.
    
Coyote Point Systems
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
    
ASG Software Solutions
Published By: AWS     Published Date: Jul 10, 2019
Being able to monitor and respond to patient inquiries quickly and effectively is critical to creating a positive clinical experience and delivering successful products. But compiling and monitoring this data to address customer concerns in a timely way is a challenge when you have disparate sources and systems, global teams, and multiple patients. Read how a top 10 global pharmaceutical company worked with Slalom and AWS to design and implement a unified and globally distributed event and inquiry data reporting system. By combining three types of requests into one solution, the company has improved the customer experience and increased call center and data input operational efficiency by 50%. Learn how to Increase access to relevant data to help inform future or ongoing clinical trials Adapt your existing system development processes to an agile approach Engage with Slalom and AWS throughout the lifecycle of a healthcare engagement
Tags : 
    
AWS
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: SAP     Published Date: Feb 03, 2017
The spatial analytics features of the SAP HANA platform can help you supercharge your business with location-specific data. By analyzing geospatial information, much of which is already present in your enterprise data, SAP HANA helps you pinpoint events, resolve boundaries locate customers and visualize routing. Spatial processing functionality is standard with your full-use SAP HANA licenses.
Tags : 
    
SAP
Published By: Spectrum Enterprise     Published Date: Feb 27, 2018
H&S Ventures provides management services for the Anaheim Ducks hockey team and its home-ice venue—the Honda Center. This popular indoor arena hosts scores of events and concerts, and H&S oversees everything from ticket sales to marketing and finance. H&S’s performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans’ satisfaction and their average “spend.”
Tags : 
enterprise, digital, connection, revenues, marketing, tactics, technology
    
Spectrum Enterprise
Published By: Dell APAC     Published Date: May 16, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 25, 2019
"A single partner with a broad portfolio of security products can streamline the processes of purchasing, deployment and support. Dell has conceived and executed an innovative security strategy that provides data protection and threat prevention across an extensive line of products. Dell security technologies satisfy the requirements of both IT leaders and end users by protecting data, defending against threats, and enabling productivity and collaboration. In short, Dell’s approach enables organizations of all kinds to gain highly effective data security that is designed for the way people work."
Tags : 
    
Dell APAC
Published By: Spectrum Enterprise     Published Date: Oct 29, 2018
Network failures are surprisingly common. How can you be sure your enterprise is prepared for unforeseen downtime? Network diversity and redundancy supports business continuity. Learn more about how the right network portfolio can prevent operational interruptions and assist in disaster recovery.
Tags : 
    
Spectrum Enterprise
Published By: IFS     Published Date: Jan 18, 2019
To ensure loyalty and win new customers, leading brands are focusing on the quality of their customer care to stay ahead. This eBook will explain how you can: -Upgrade your support centers to deliver omni-channel customer care. -Introduce self-service and AI without sacrificing the human touch. -Deploy technology to empower support agents to go beyond transactional service and deliver personalized, proactive service. This eBook looks at the barriers which prevent companies delivering omni-channel service and then examines the process and technology changes required to overcome them.
Tags : 
    
IFS
Published By: Cisco     Published Date: May 24, 2019
Prevent breaches, get deep visibility to detect and stop threats fast, and automate your network and security operations to save time and work smart. Here are 5 tips to keep in mind when choosing a Next Generation Firewall for your business.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.