hit

Results 1 - 25 of 7785Sort Results By: Published Date | Title | Company Name
By: Termobuild     Published Date: Oct 17, 2013
This whitepaper outline the benefits of thermal energy storage building designs which costs no more than conventional construction, yet offers superior energy management and comfort.
Tags : 
     Termobuild
By: OPOWER     Published Date: Oct 28, 2014
More and more, utilities are choosing demand response (DR) as a way to balance grid operations, lower energy prices for consumers, and integrate renewable resources like solar power. Utilities have traditionally relied on large commercial customers to achieve those results. Yet residential customers represent a huge, untapped DR resource. The Federal Energy Regulatory Commission (FERC) estimates that utilities can deliver 65GW of peak reduction in the residential sector — equivalent to $3 billion worth of annual capacity. But, despite heavy investment, current residential DR programs engage less than 5% of homes and fall far short of FERC’s estimates of achievable potential.
Tags : 
     OPOWER
By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
     Cisco
By: Cisco     Published Date: Mar 22, 2019
Artificial intelligence (AI) and machine learning (ML) are emerging technologies that will transform organizations faster than ever before. In the digital transformation era, success will be based on using analytics to discover the insights locked in the massive volume of data being generated today. Historically, these insights were discovered through manually intensive data analytics—but the amount of data continues to grow, as does the complexity of data. AI and ML are the latest tools for data scientists, enabling them to refine the data into value faster.
Tags : 
     Cisco
By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
     Cisco EMEA
By: Here Technologies     Published Date: Mar 29, 2019
Advertisers have made great strides in understanding consumers’ digital journeys. But in order to truly map the steps of the consumer, including bridging the journeys between digital and physical worlds, you need advanced location-enabled intelligence. Find out how precise real-world geometry gives you the context you require to create personalized consumer experiences with the HERE and Location-Based Marketing Association (LBMA) white paper. HERE Technologies gives you the location context you need to make sense of your dynamic user data. Mapping consumer movements to real-world elements such as points of interest, retailers and their building shapes allows you to observe consumer journeys to within meters, and deliver more timely, accurate campaign messages.
Tags : location data, ad tech, location targeting
     Here Technologies
By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : data, backup, recovery, virtualization, solutions, cloud, architectures
     Rubrik EMEA
By: CloudHealth by VMware     Published Date: Apr 15, 2019
Whether you’re a leader of Infrastructure & Operations for a large enterprise or a mid-sized business looking to scale, you’ll likely have similar questions about multicloud that need answers. Read this eBook for a better understanding of multicloud architecture, and get answers to questions such as: What’s the difference between hybrid cloud and multicloud? What are the top benefits and challenges of multicloud? What is the value proposition of multi cloud management? What is a multicloud strategy? Download this free eBook today to get started on your multicloud management journey.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Apr 15, 2019
Whether you’re a leader of Infrastructure & Operations for a large enterprise or a mid-sized business looking to scale, you’ll likely have similar questions about multicloud that need answers. Read this eBook for a better understanding of multicloud architecture, and get answers to questions such as: What’s the difference between hybrid cloud and multicloud? What are the top benefits and challenges of multicloud? What is the value proposition of multi cloud management? What is a multicloud strategy? Download this free eBook today to get started on your multicloud management journey.
Tags : 
     CloudHealth by VMware
By: Unit4     Published Date: Apr 12, 2019
Looking to improve accuracy of enterprise budgeting and financial planning? Just 1% of firms can forecast costs at 90% accuracy 30 days out. This white paper by BPM Partners and sponsored by Unit4 shows how Artificial Intelligence (AI) makes a real impact on budgeting, planning, and analysis, and when complemented with deep machine learning, gives greater accuracy to data, budget rules and budget drivers. Download now and learn how AI can help auto-tune your FP&A.
Tags : 
     Unit4
By: Unit4     Published Date: Apr 12, 2019
Still using spreadsheets for financial planning? With multiple templates? Leading to serious versioning and collaboration difficulties? AI-driven integrated, digitized financial planning is the answer. Helping you spend less time gathering and consolidating data, and more time unearthing the key insights and accurate forecasting hidden within it. Download the white paper and find out how harnessing AI can supercharge FP&A.
Tags : 
     Unit4
By: VMware     Published Date: Apr 09, 2019
Download Infographic.
Tags : 
     VMware
By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
     Gigamon
By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
     Gigamon
By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
     Gigamon
By: Gigamon EMEA     Published Date: Feb 20, 2019
Arrêtez de déployer des outils de prévention des cybermenaces en mode détection. Procurez-vous “Dimensionner les outils de prévention des menaces inline” pour découvrir les avantages d'une architecture de protection inline. Lisez maintenant.
Tags : 
     Gigamon EMEA
By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
     Illusive Networks
By: Forcepoint     Published Date: Mar 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP.
Tags : data protection, data security, critical data, intellectual property, intellectual property protection, dlp, cybersecurity, data loss prevention
     Forcepoint
By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : open source, development, architects, application development, software development
     Black Duck Software
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social and regulatory forces. As artificial intelligence, automation, Internet of Things, blockchain and 5G become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise.
Tags : 
     Group M_IBM Q2'19
By: Domino Data Lab     Published Date: Feb 08, 2019
A data science platform is where all data science work takes place and acts as the system of record for predictive models. While a few leading model-driven businesses have made the data science platform an integral part of their enterprise architecture, most companies are still trying to understand what a data science platform is and how it fits into their architecture. Data science is unlike other technical disciplines, and models are not like software or data. Therefore, a data science platform requires a different type of technology platform. This document provides IT leaders with the top 10 questions to ask of data science platforms to ensure the platform handles the uniqueness of data science work.
Tags : 
     Domino Data Lab
By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
     Domino Data Lab
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com