it systems

Results 1 - 25 of 2737Sort Results By: Published Date | Title | Company Name
Published By: Korenix UK Ltd     Published Date: Jul 29, 2014
Bringing the latest security and surveillance systems (e.g. CCTV), as well as onboard entertainment technologies (Infotainment) such as passenger display screens and WiFi services, to the demanding Rail sector is a challenge. Reliability of these onboard technologies is critical for both train operators and passengers, while also improving the maintenance of onboard devices when trains are on the move.
Tags : 
wifi; cctv; onboard technology; trains
    
Korenix UK Ltd
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Most organizations today rely on virtualized IT infrastructures. Veeam® helps them to provide and increase Availability of critical workloads running on their systems. Due to various factors, some physical servers cannot be virtualized, along with endpoints that might not be protectable in their entirety by leveraging back up solutions built for virtualized systems. Thus, everyday occurrences such as lapses in connectivity, hardware failures, file corruption, ransomware or even theft can leave an organization’s data at risk. Veeam Agent for Microsoft Windows solves these issues by closing the gap that some enterprises face with large, heterogeneous environments and further enabling workload mobility by delivering Availability for cloud-based workloads. This paper describes: - the main concepts behind Veeam Agent for Microsoft Windows - how agents can be managed centrally by integration into Veeam Backup & Replication™ - and more!"
Tags : 
    
Veeam APAC
Published By: SAP Concur     Published Date: Apr 13, 2020
Based on IDC’s research, many HR organizations find themselves with older core human capital management systems that are difficult to modernize to meet digital transformation goals. Upgrading these systems will be key to delivering an increasingly important total workforce experience. Read this report to know the risks involved, key challenges, the role of technology & cloud-based systems for better long-term relationships with employees.
Tags : 
    
SAP Concur
Published By: SAP Concur     Published Date: Apr 13, 2020
VFS Global an outsourcing and technology services company that supports its government clients in simplifying and digitalizing their visa application processes. They wanted the same kind of transformation for their HR processes. Read this report to know how they automated systems using SAP SuccessFactors solutions as process enablers, that radically transformed the HR-to-people interface.
Tags : 
    
SAP Concur
Published By: Dell EMC Storage     Published Date: May 13, 2020
Artificial intelligence(AI), machine learning(ML), and deep learning (DL) technologies are expected to permeate day-to-day business as well as customer activity. Industries such as healthcare(advanced diagnosis and treatment), transportation (advanced driver assistance systemsand autonomous vehicles), and life sciences(rare disease treatment research)are some of the early adopters of AI. The goal for any organization adopting AI/ML/DL is to deliver meaningful insights and predictions that can significantly improve products, processes, or services across industries and use cases. Today, as AI becomes mainstream, many organizations find themselves in the initial proof-of-concept (POC) stage;only a few are in full production. IDC's2019Artificial Intelligence Global Adoption Trends and Strategies Survey foundthat 18% of organizations had AI models in production, 16% were in the POCstage, and 15% were experimenting with AI.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: May 13, 2020
With the growing transition to cloud computing, many organizations are looking to leverage the cloud to enhance their disaster recovery (DR) plan. In the past, organizations found DR to be expensive and difficult to manage (servers, backup and systems), but the options to reduce the costs and complexity were limited. Infact, DR testing and recoverability were often manual and did not include a routine checklist with pre-planned activity. Most organizations are not confident of recovering in a timely manner when disaster strikes.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: May 13, 2020
Digital transformation (DX) is a hot topic in most enterprises today. DX drives a host of new business requirements that challenge legacy infrastructure, and information technology (IT) organizations are upgrading to new server and storage platforms at a rapid rate to meet them. Although the enterprise storage market overall continues to grow, revenue for storage systems at midrange price points ($25,000 to $249,999) is growing at the fastest rate – in 2019 this market grew 10.6% to comprise 60.3% of all enterprise storage revenues. Part of the reason this segment leads the entry and high-end enterprise storage segments is that systems whose starting prices are in the $25,000 to $249,999 range are increasingly incorporating the performance, availability, scalability and functionality of higher end systems. For IT organizations looking to streamline costs as well as storage infrastructure, systems at midrange price points meet a broader set of requirements than either of the other t
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: May 15, 2020
Most organizations are currently deploying or planning to deploy mission-critical workloads like ERP, office productivity apps, business intelligence systems and CRM into both public and private clouds. While many organizations use VMware to manage and deploy applications, there is no clear standout in terms of how organizations are protecting VMware workloads across hybrid cloud environments. Additionally, many organizations believe their current data protection technologies will not be capable of protecting the new/emerging technologies that they're investing in.
Tags : 
    
Dell EMC Storage
Published By: Oracle     Published Date: May 11, 2020
Without assets, utilities would have very little to do. They are arguably the most important component of the business operation (competing for top place with utility employees and their customers). Despite their critical role, the humble asset has not yet undergone the kinds of transformation in performance management seen in customer engagement or human resource management domains. Approaches in asset management have evolved incrementally over time —with different people, processes and systems accountable for each stage of its lifecycle. This siloed approach results in lack of visibility and missed value at every stage. • How do you work on your assets more efficiently? • Repair vs Replace? How do you answer this question right every time? • You know you need to sit down and plan a better strategy.. but where do you start? We have considered dome of our experts’ deep-dive advice into this e-Book. Download free eBook now
Tags : 
    
Oracle
Published By: HICX     Published Date: May 06, 2020
It’s impossible to overemphasise the impact that an advanced approach to supplier management can have on large organisations. With the right processes, systems and technology in place, procurement functions can claw back huge amounts of time, meaning scarce resources can be put to use on more value-creating activities. New technologies can introduce control and, with that, ensure that suppliers remain compliant with negotiated terms. And streamlined processes that remove vast volumes of administrative tasks from both supplier and buyer can help to provide a platform for more advanced working relationships with key suppliers. It’s this last point that can take procurement to a new level, where it has a significant and lasting impact on the commercial success of a business. But only organisations that invest in the right tools will make it a reality.
Tags : 
    
HICX
Published By: Menlo Security     Published Date: Apr 30, 2020
Credential Phishing—Uniquely Targeting Individuals with Access to Valuable Data and Systems. The most notorious credential phishing campaign was the attack on John Podesta, the chairman of the Hillary Clinton presidential campaign during the 2016 election. But while many know about this attack, few understand what and how it happened. Credential phishing is a rapidly growing form of cyberattack and security professionals need to better understand these increasingly common and destructive forms of cyberattacks. This whitepaper examines: • What is credential phishing? • What are the risks to my organisation? • What can I do to stop them?
Tags : 
    
Menlo Security
Published By: Healthgrades     Published Date: May 12, 2020
If there was ever a time for big data and predictive modeling to shine, it's now. Most health systems have accumulated massive quantities of patient, provider, and market claims data, yet the industry is still learning how to put that valuable data to use to predict who will need care and when. Download this guide to avoid the most common predictive modeling mistakes and better evaluate the behavior and medical needs of healthcare consumers and current patients.
Tags : 
    
Healthgrades
Published By: Hitachi EMEA     Published Date: Apr 24, 2020
Organizations of all sizes are contending with rapid data growth, and this compounds a host of other storagerelated challenges. For many companies, this includes meeting disaster recovery and regulatory requirements, high capex costs and the ability to deliver adequate performance to match the needs of demanding applications and business stakeholders. Midsized organizations and enterprises not only have to address these prominent storage challenges, but they must do so while keeping a careful eye on spending since storage budgets are increasing at less than half the pace of data growth. It will be important to have storage systems with rich feature sets that can allow businesses to adapt to match data growth while providing accessibility, consistency and resiliency
Tags : 
    
Hitachi EMEA
Published By: SAS     Published Date: May 11, 2020
Organizations realize they need analytics to run, grow, and differentiate their products and services. More than just driving strategic decision making, they need to incorporate analytics into their high-volume operational and transactional decisions every minute of every day. This means that analytics is no longer just the responsibility of the data science team. Organizations have to continuously deliver analytics into operational systems in a systemic, high-quality and dependable way.
Tags : 
    
SAS
Published By: Workday APAC     Published Date: Apr 03, 2020
Netflix is the world’s leading internet television network with over 109 million members in over 190 countries enjoying more than 125 million hours of TV shows and movies per day, including original series, documentaries, and feature films. Netflix consolidated 11 systems into one with Workday Financial Management and Human Capital Management. Riaan du Preez and Shome Mukherjee talk about utilizing Workday's Full Suite of applications and how Workday's true cloud solution has helped both sides of the business partner more efficiently. See to learn more about the benefits Netflix has experienced with Workday.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: May 13, 2020
"AI innovations are disrupting everything about the way we work—especially ERP systems. Read this whitepaper to learn how machine learning is helping make business systems smarter and more agile and how our approach to AI implementation ensures Workday delivers value you can trust."
Tags : 
    
Workday APAC
Published By: Hitachi Vantara     Published Date: May 01, 2020
Organizations of all sizes are contending with rapid data growth, and this compounds a host of other storagerelated challenges. For many companies, this includes meeting disaster recovery and regulatory requirements, high capex costs and the ability to deliver adequate performance to match the needs of demanding applications and business stakeholders. Midsized organizations and enterprises not only have to address these prominent storage challenges, but they must do so while keeping a careful eye on spending since storage budgets are increasing at less than half the pace of data growth. It will be important to have storage systems with rich feature sets that can allow businesses to adapt to match data growth while providing accessibility, consistency and resiliency.
Tags : 
    
Hitachi Vantara
Published By: IBS Software     Published Date: Apr 08, 2020
Cancellations, delays, diversions – commercial aviation moves to the constant beat of irregular operations (IROPS) and other disruptions. Each yeah the cost of disruption to airlines and their customers runs into an estimated $60 billion. IROPS pose a constant challenge to profits and maintaining customer satisfaction. Survival amid these challenges requires the right technology and effective communication between personnel. With this white paper, IBS Software aims to create inroads to bridge this disconnect between supporting IT systems and the reality of dealing with IROPS. We examine the impact of disruption across operations and the services provided to passengers and transported cargo and propose an integrated solution to aid the execution of successful contingency plans supporting both airlines and their customers.
Tags : 
    
IBS Software
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: McAfee EMEA     Published Date: May 12, 2020
Sutherland Global Services helps over 100 Fortune 1000 companies in 16 countries rethink and rebuild business processes for the digital age using data analytics and other technologies, design thinking expertise, and industry-specific knowledge. The Pittsford, New York-based company invested in transformation of its own endpoint security, dramatically improving its overall security posture while saving time and money. In addition, by leveraging the Open Data Exchange Layer (OpenDXL), the company is creating a unified defense in which diverse security systems work together to support and strengthen one another.
Tags : 
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: May 12, 2020
If you work in infosec and haven’t been living under a rock, you have undoubtedly heard of EDR. EDR, or endpoint detection and response, promises to revolutionize the way security analysts neutralize attacks. Unfortunately, like many other solutions in the infosec space, EDR has fallen short of the promised hype. A typical sales pitch for an EDR goes something like this: “Sure, we all know you can check for alerts in the SIEM, open an escalation ticket in your productivity software suite, and alert a systems administrator to take action. But in the time that all takes, the attacker may well have performed a smash and grab, thus stealing your data. The problem isn’t that you don’t have enough detection capability; the problem is that it’s all over the place. Even then, how are you going to respond? Time is money, and time favors the attacker. That’s why you need EDR. It consolidates the detection functions and the response functions into one platform.” But as you’ve probably guessed, ED
Tags : 
    
McAfee EMEA
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: TIBCO Software     Published Date: May 05, 2020
A recent focus by the US Food and Drug Administration (FDA) on process monitoring and verification has highlighted a need in the biopharmaceutical industry for better collection, categorization and analysis of manufacturing data. Manufacturers are increasingly being challenged to show their systems implement some form of continued process verification and demonstrate how their data systems can provide deeper insights into the process.. However, there are a wide variety of approaches to meet this requirement. Continued Process Verification (CPV) is a business process and set of tools for improving manufacturing and product quality. It uses manufacturing data, coupled with a number of statistical signal detection algorithms to detect variations in the process that may impact product quality or process consistency. When used correctly, it allows a manufacturer to understand whether their production process is consistently delivering product with acceptable quality attributes in a repeata
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.