guide

Results 1 - 25 of 3715Sort Results By: Published Date | Title | Company Name
Published By: Brady Corporation     Published Date: Mar 30, 2017
In the Rail Vehicle Manufacturing any identifying label, marker or tag has to withstand aggressive solvents such as diesel without suffering losses in visibility or readability. Wide ranges of operating temperatures add to the demand for highly resistant identification products on wires and components in the Mass Transit Industry.
Tags : 
    
Brady Corporation
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Are you looking for information to help you with your artificial intelligence deep learning journey?  This Deep Learning Dummies guide will help you understand what AI, deep learning and machine learning can mean for you and your organization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 25, 2019
Are you looking for information to help you with your artificial intelligence deep learning journey?  This Deep Learning Dummies guide will help you understand what AI, deep learning and machine learning can mean for you and your organization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
    
Entrust Datacard
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how digital technology is integrating real-time monitoring of pump energy usage, maintenance, and operations for maximum payback.
Tags : 
pump, tco, water
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks
Published By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
The impact of chargeback rates is abundantly clear and easily measurable, but the financial impact of false declines - rejecting perfectly good customers over fear of fraud - is largely underestimated by eCommerce merchants. In reality, these mistakes, which are all too common but difficult to track, end up costing merchants significantly more than chargebacks, and are more damaging to the business’ bottom line. This guide is designed to help businesses approve more good eCommerce orders, and to put in place better tracking for ongoing improvement in order decision accuracy
Tags : 
    
Riskified
Published By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
    
ETQ
Published By: ETQ     Published Date: Jul 10, 2019
As demand for QMS solutions grows, so does the vendor landscape, complicating decisions over the right choice that ensures a successful implementation and facilitates mission-critical quality initiatives. Research shows 71% of software rollouts fail, are late or are over budget. Download this paper to learn more about the selection and the 7 key elements for the successful implementation of a QMS.
Tags : 
    
ETQ
Published By: ETQ     Published Date: Jul 10, 2019
Across all industries, document control is one of the most important processes to get right. It ensures documents are updated and revision-controlled, allowing you to effectively route them for review, approval and distribution. Download now to learn more about the key document processes that drive quality: Document Creation Document Routing, Review and Approval Integration with Employee Training Document Change Requests
Tags : 
    
ETQ
Published By: Sage Software     Published Date: Apr 24, 2019
Innovative ways to take your business efficiency and collaboration to the next level.
Tags : 
    
Sage Software
Published By: Flexential     Published Date: Jul 17, 2019
INSIDE THE GUIDE: • Your ticket to edge computing confidence and mastery • Introduction to the concept of Hybrid Edge Computing • Practical use cases for understanding how edge computing is being rolled out today • Top tips for being successful at the edge
Tags : 
    
Flexential
Published By: Flexential     Published Date: Jul 17, 2019
The benefits of colocation are well documented, making it easy for organizations to build a compelling business case. Once the decision is made to outsource some or all of your IT infrastructure, there’s plenty of work to do, including selecting the right colocation provider.
Tags : 
    
Flexential
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research report—presented by Epicor Software—you’ll discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Jamf     Published Date: Aug 06, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf
Published By: Jamf     Published Date: Aug 12, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf
Published By: Apptio     Published Date: Jul 16, 2019
Your business partners need IT to deliver innovation and agility, but traditional budgeting processes struggle to do either. Interested in adopting a zero-based budgeting approach to your organization? Download this eBook to learn: - The limitations of traditional budgeting vs. zero-based budgeting - How to benchmark your budgets against business outcomes - Five myths about zero-based budgeting and why they are wrong - How to confidently build zero-based budgets with the right tool
Tags : 
    
Apptio
Published By: Apptio     Published Date: Jul 16, 2019
In this eBook, we walk you through the four ways to optimize your IT costs and offer up prescriptive questions to make your analysis crisp and your conclusions actionable. Learn more about these four ways to optimize technology costs, including: - Scrutinize to close financial loopholes - Economize to eliminate waste - Rationalize to avoid duplication - Commercialize to curb demand
Tags : 
    
Apptio
Published By: Apptio     Published Date: Jul 16, 2019
With increased adoption, cloud footprints are getting larger and more unwieldy to manage. Organizations know they must analyze and consolidate their cloud bills to stop cloud waste eating into OpEx budgets. Extensive cloud adoption driven by a “cloud-first” mandate isn’t inherently sprawl, but do you know the business initiatives that spend is supporting? What alternatives did you consider? How is spend tracking? Download this guide to stop cloud sprawl from undercutting your IT strategy.
Tags : 
    
Apptio
Published By: Right Networks     Published Date: Aug 13, 2019
A FREE guide to the process of securing your client’s data.
Tags : 
    
Right Networks
Published By: Right Networks     Published Date: Aug 13, 2019
Transforming your firm doesn’t happen overnight. It takes time, patience and planning. However, the value of moving away from the old, transaction-based way of doing business and into a more modern model is immense. Consider getting to a place where you’ve built a cloud technology infrastructure that allows staff and clients to collaborate via access to real-time data and documents. Where you are running at peak efficiency. Build a business that’s modern. One that allows you to be a leader, not mired down in transactional work. It can be a reality. Our 3-step guide, courtesy of our friends at Rootworks, can help you transform your firm into one that will last well into the future and secure your legacy.
Tags : 
    
Right Networks
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.