att

Results 1 - 25 of 4088Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
     Cisco EMEA
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: 3D Systems     Published Date: May 15, 2019
La microfusione è un'accurata metodologia di produzione che fornisce valore aggiunto a vari settori, dalle parti meccaniche, ai componenti per automobili e aerospaziali, fino agli intricati modelli per prodotti odontoiatrici, gioielli e sculture. In passato la produzione di parti microfuse lisce e accurate comportava costi elevati e tempi lunghi di consegna legati ai modelli di fusione. Oggi l'evoluzione delle parti sta accelerando drasticamente in molti settori industriali, con conseguente riduzione dei cicli di vita dei prodotti e dei volumi di parti fuse tra un ciclo e l'altro. L’attesa di stampi per realizzare parti obsolete di aerei più vecchi significa anche ritardi nella riparazione degli aerei, con conseguenti costi di tempo e denaro. La domanda di una produzione di fonderia più rapida è in aumento in tutti i settori industriali e le fonderie devono essere pronte a rispondere.
Tags : 
     3D Systems
By: 3D Systems     Published Date: May 15, 2019
Le moulage à modèle perdu est une méthode de fabrication précise qui apporte de la valeur ajoutée dans tous les secteurs, des pièces mécaniques, automobiles et aérospatiales aux traitements dentaires, bijoux et sculptures complexes. Pendant des siècles, les pièces coulées lisses et précises ont été obtenues au prix de coûts élevés et de longs délais de modèles de moulage. À présent, l'évolution des pièces s'accélère de manière spectaculaire dans de nombreux secteurs, ce qui se traduit par des cycles de vie des produits plus courts et des volumes de pièces moulées plus faibles entre les cycles. L'attente de l'outillage pour les pièces obsolètes destinées aux avions vieillissants entraîne également des retards dans leur réparation, ce qui coûte du temps et de l'argent. La demande d'une production en fonderie plus rapide augmente dans tous les secteurs et les fonderies doivent être prêtes à réagir.
Tags : 
     3D Systems
By: 3D Systems     Published Date: May 15, 2019
La tecnologia di sinterizzazione laser selettiva (SLS) è al centro dell'attenzione e in forte crescita nella produzione di massa personalizzata e nella prototipazione funzionale. Le giuste tecnologie additive, i materiali e le finiture stanno trasformando il modo di produrre. La manifattura termoplastica diretta digitale offre una qualità eccezionale che apre la porta a nuovi parametri di design non attuabili con il tradizionale stampaggio a iniezione. La produzione additiva di termoplastici evita anche i lunghi tempi di consegna e gli investimenti iniziali negli stampi e nelle attrezzature per lo stampaggio a iniezione. Se si misurano i pezzi finiti sui tre parametri: qualità, "time to market" e costo per metro cubo, in molte situazioni l'SLS industriale porta a una soluzione globalmente migliore.
Tags : 
     3D Systems
By: CyberSource     Published Date: Apr 25, 2019
Download this white paper to find out how you could augment your fraud management with Decision Manager machine learning insights from more than 68 billion annually processed Visa and CyberSource transactions – matched with flexible rules-based fraud strategies. • Detect fraud more accurately with robust data and insights on ever-changing fraud patterns • Protect your bottom line by reducing fraud and chargebacks • Increase acceptance rates with the only fraud solution that uses machine learning to generate and test new rules-based strategies from your historic data …and more.
Tags : 
     CyberSource
By: Intapp     Published Date: May 20, 2019
Pricing matters and engagements accurately and profitably poses a challenge to many firms. However, developing effective pricing strategies has become more important than ever, as clients demand more transparency and alternative fee arrangements become more popular. Technology can help law firms develop both tactical and strategic approaches to pricing. Download this ebook from Intapp, a leading provider of business applications for professional services firms, to learn how an AI-enabled approach to pricing can help your firm: • Price matters more accurately and profitably • Scope and resource matters to ensure better margins • Monitor engagements as they proceed and track budget to actuals • Improve client relationships with more transparency, accountability, and success
Tags : pricing, profitability, alternative fees, artificial intelligence, engagement monitoring, professional services, legal
     Intapp
By: Nice Systems     Published Date: Feb 26, 2019
NICE has made a significant investment into AI and ML techniques that are embedded into its core workforce management solution, NICE WFM. Recent advancements include learning models that find hidden patterns in the historical data used to generate forecasts for volume and work time. NICE WFM also has an AI tool that determines, from a series of more than 40 models, which single model will produce the best results for each work type being forecasted. NICE has also included machine learning in its scheduling processes which are discussed at length in the white paper.
Tags : 
     Nice Systems
By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Digital innovation has changed everything: the money is everywhere, so every business is a potential target for fraud. Banks and financial institutions used to be the primary targets of fraud. Why banks? To quote the notorious American bank robber Willie Sutton, “because that’s where the money is.” While banks remain firmly in the crosshairs of fraudsters, the avalanche of digital business innovation has changed everything. Since the money is everywhere, every business is a potential target for fraud. The same technology that helps us find airfare deals, sweet concert seats, or the best prices on the hottest Jordan shoes– that is, bots–can now be used by criminals. Fraudsters employ automated, faceless bots that scour business apps looking for any opportunity to profit. And since fraud targets business-process weaknesses and not just software vulnerabilities, you may not even know when it is happening.
Tags : 
     F5 Networks Singapore Pte Ltd
By: Gigamon     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
     Gigamon
By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
     Gigamon
By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : engage; reviews, review management, reputation management, uberall, online reviews
     Uberall
By: Manhattan Associates     Published Date: May 15, 2019
For retailers and brands looking to transform their customer experience through improved in-store selling, engagement and fulfillment, this buyers’ guide will help translate critical business needs into prioritized criteria for point of sale software selection.
Tags : 
     Manhattan Associates
By: S&P Global Platts     Published Date: May 24, 2019
Only months before the effective date of IMO 2020, there are a surprising number of shipping industry participants who believe that getting customers to pay for increased bunker costs will be smooth sailing. However, the reality may prove to be more complicated. This report explores how a lack of negotiating power and imperfect bunker cost recovery mechanisms could turn this shadow on the horizon into a dangerous storm for the shipping industry.
Tags : 
     S&P Global Platts
By: S&P Global Platts     Published Date: May 24, 2019
A surge in new petrochemical production capacities across China, mainly for paraxylene, is likely to be the key factor that will heavily impact the sector globally, with US-China trade tensions next in line. Both factors have the potential to cause disruptions and change trade flows, while triggering fluctuations in margins. Volatile upstream markets, such as crude oil and naphtha, are not making these markets any more predictable either, and 2019 is set to be a year full of challenges. This special outlook report takes an in-depth look at the key themes expected to shape key Asian petrochemical markets in the months ahead.
Tags : 
     S&P Global Platts
By: Beqom     Published Date: Jun 19, 2019
Les lec?ons ignore?es qui vous aideront a? re?ussir votre passage au nume?rique Les responsables RH et commerciaux doivent rationaliser le processus de re?mune?ration tout en attirant et en gardant les meilleurs e?le?ments, en soutenant la strate?gie commerciale et en assurant la conformite? re?glementaire. Remplissez le formulaire pour télécharger instantanément notre livre blanc gratuit et pour connaître les cle?s de la réussite de votre transition nume?rique de la re?mune?ration globale.
Tags : 
     Beqom
By: HERE Technologies     Published Date: Jun 20, 2019
Driver recruitment and retention are proving to be major problems for the trucking industry. The truck driver shortage is worse than ever. While there isn’t a single root cause, a combination of factors is causing truck drivers and fleet owners alike, to look within the industry to make a change. Truck driver turnover is at an all-time high. At the end of 2018, turnover rates for large truckload carriers was a staggering 87% and for smaller carriers it was 72%. This leaves fleet owners and trucking companies trapped in constant recruitment mode. This eBook empowers fleet owners with effective strategies to improve recruitment and retention within their fleets. Download your free eBook to discover: Effective ways to offer benefits, incentives and competitive pay Strategies to increase truck driver safety with technology How to attract two of the largest groups in the US labor force
Tags : location data, transport & logistics, location services
     HERE Technologies
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
     Group M_IBM Q2'19
By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Die INFINIDAT® Enterprise-Storage-Lösungen basieren auf der einzigartigen und patentierten INFINIDAT Speicherarchitektur - Ein vollständig abstrahierter Satz von Software-De?ned Storage (SDS)-Funktionen wird mit der besten Standard-Hardware integriert. Mit dem Versand der Software liefert INFINIDAT eine ausgiebig getestete Hardware-Referenzplattform mit. Damit stellt INFINIDAT die ersten echten SDS-Lösungen der Enterprise-Klasse bereit.
Tags : 
     Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com