it systems

Results 1 - 25 of 2454Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
    
Dell EMC
Published By: Schneider Electric     Published Date: Jun 03, 2019
New digital technology makes it feasible to integrate process control and safety instrumented functions within a common automation infrastructure. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Leveraging IIoT advancements, learn how to break traditional barriers between your power and process control systems to solve challenges across the full lifecycle of the plant. Download the white paper to learn more.
Tags : 
power, digital transformation, industrial internal of things, smart control, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, defence in depth, industrial automation, process control, process systems, power and process
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial Internet of Things (IIoT) technologies and concepts can transform and enhance process safety practices if appropriately applied. Download the white paper for guidance on leveraging IIoT tools and techniques to deliver industrial safety in a profitable manner.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
The safety of operations can have a direct, positive impact on the operational profitability of the plant. Environmental health and safety (EH&S) can now be viewed not just as a cost center, but as a profit center, and new levels of both safety and profitability can result. Real-time safe profitability is no longer a dream—it is a reality!
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 03, 2019
New trends in life cycle management of automation assets are paving the way for the “continuously current enterprise”, to improve both availability and utilization of automation assets. Download the white paper today to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Intel     Published Date: Apr 11, 2019
Robots play a major role in making manufacturing processes more efficient and less labor intensive. They can help control costs and improve quality, as well as increase productivity. The complexity of robotic system design, however, creates obstacles for many manufacturers, and this is made more difficult by the need to identify and integrate subsystems from multiple vendors. NexCOBOT, a NEXCOM company, offers a flexible, modular robotics solution integrating artificial intelligence (AI) with machine vision and powered by the new Intel® Vision Accelerator Design products. The solution brings together the insight of artificial intelligence, the mobility of robotics, and the capabilities of machine vision, providing a new level of precision and optimization for manufacturing and industrial implementations
Tags : 
    
Intel
Published By: Gigamon     Published Date: Apr 10, 2019
Download ESG’s Economic Validation Report, “Analyzing the Economic Benefits of Gigamon,” to see how Gigamon reduces false positives by 70%, decreases the cost of security personnel by 50%, eliminates redundant systems and tools and aligns SecOps and NetOps for better collaboration. Learn how a network visibility infrastructure can secure business, enable new ideas and facilitate growth. And, see why ESG believes the Gigamon Visibility Platform is a critical tool for success in today’s digital age.
Tags : 
    
Gigamon
Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC
Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel
Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
Published By: Ahead     Published Date: Jun 05, 2019
Digital Requires a New Level of Insight and Control Digital strategies have caused business executives to intensify their scrutiny of how technology affects bottom line performance. With a growing emphasis on differentiating the customer experience in highly competitive markets, these executives want to understand how their IT systems affect everything from brand perception to customer acquisition and loyalty. 3 | A Guide to Intelligent Operations Meanwhile, those same demanding business leaders lack appreciation and patience for the complexity of today’s digital technology environment. While applications and user experiences are simpler and more intuitive, the backend processing, application interdependencies, and underlying infrastructure are more complex than ever, even in light of the benefits of abstraction, virtualization, and cloud computing (see Figure 1.) While CIOs have long been expected to improve stability and uptime - and done a pretty good job of it - the stakes are much
Tags : 
    
Ahead
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
    
KPMG
Published By: Bell Micro     Published Date: Jun 14, 2010
This paper discusses how the IBM XIV Storage System's revolutionary built-in virtualization architecture provides a way to drastically reduce the costs of managing storage systems.
Tags : 
bell micro, ibm xiv, storage system management, virtualization architecture
    
Bell Micro
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability, replication, storage infrastructure, cloud, hyperconverged
    
DataCore
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
    
Citrix Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.