att

Results 1 - 25 of 4035Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
Organised crime is joining athletes across the globe in training for the Games. And it's your corporate secrets that are up for grabs. In the past 6 months MessageLabs has intercepted 13 separate Olympic-themed Targeted Trojan attacks across several data-rich industries. With Targeted Trojans on the rise and able to evade conventional security mechanisms, MessageLabs is currently intercepting attacks that exploit the Olympics to appear authentic and attractive, but contain dangerous malware designed to steal corporate secrets.
Tags : messagelabs, olympics, secrets, spyware, virus, trojan, trojans, security, internet security, web security, anti spyware, anti virus, email security
     MessageLabs Australia
By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
     Hewlett Packard Enterprise
By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : technology, mapping, location data
     HERE Technologies
By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
     Cisco EMEA
By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
     3D Systems
By: 3D Systems     Published Date: May 15, 2019
La microfusione è un'accurata metodologia di produzione che fornisce valore aggiunto a vari settori, dalle parti meccaniche, ai componenti per automobili e aerospaziali, fino agli intricati modelli per prodotti odontoiatrici, gioielli e sculture. In passato la produzione di parti microfuse lisce e accurate comportava costi elevati e tempi lunghi di consegna legati ai modelli di fusione. Oggi l'evoluzione delle parti sta accelerando drasticamente in molti settori industriali, con conseguente riduzione dei cicli di vita dei prodotti e dei volumi di parti fuse tra un ciclo e l'altro. L’attesa di stampi per realizzare parti obsolete di aerei più vecchi significa anche ritardi nella riparazione degli aerei, con conseguenti costi di tempo e denaro. La domanda di una produzione di fonderia più rapida è in aumento in tutti i settori industriali e le fonderie devono essere pronte a rispondere.
Tags : 
     3D Systems
By: 3D Systems     Published Date: May 15, 2019
Le moulage à modèle perdu est une méthode de fabrication précise qui apporte de la valeur ajoutée dans tous les secteurs, des pièces mécaniques, automobiles et aérospatiales aux traitements dentaires, bijoux et sculptures complexes. Pendant des siècles, les pièces coulées lisses et précises ont été obtenues au prix de coûts élevés et de longs délais de modèles de moulage. À présent, l'évolution des pièces s'accélère de manière spectaculaire dans de nombreux secteurs, ce qui se traduit par des cycles de vie des produits plus courts et des volumes de pièces moulées plus faibles entre les cycles. L'attente de l'outillage pour les pièces obsolètes destinées aux avions vieillissants entraîne également des retards dans leur réparation, ce qui coûte du temps et de l'argent. La demande d'une production en fonderie plus rapide augmente dans tous les secteurs et les fonderies doivent être prêtes à réagir.
Tags : 
     3D Systems
By: Global Payments     Published Date: May 02, 2019
Doing business across borders presents a whole host of unfamiliar challenges to today’s merchant. As technological advancement and increasing globalization unlock international markets, it’s tempting to imagine that a business model successful in one region can simply be transplanted into another. Not so. The logistics of domestic and international transactions have changed, and so too have customer expectations and preferences. Customer and merchants pain points have transformed and multiplied. In this report, we explore some of the core challenges businesses today face in their quest to succeed in global commerce. We offer an overview of how unified commerce can both resolve these issues and offer new advantages and standards of best practice, enabling your business to meet the demands of tomorrow’s customer, no matter their location, preferred payment method, and mode of contact.
Tags : unified commerce, global commerce, payment convenience, payment speed, global payments technology, retail, wechat pay, alipay, chinese wallets, mobile payments, international payment solutions, international payment systems, payments, online payments, omnichannel commerce
     Global Payments
By: 3D Systems     Published Date: May 15, 2019
La tecnologia di sinterizzazione laser selettiva (SLS) è al centro dell'attenzione e in forte crescita nella produzione di massa personalizzata e nella prototipazione funzionale. Le giuste tecnologie additive, i materiali e le finiture stanno trasformando il modo di produrre. La manifattura termoplastica diretta digitale offre una qualità eccezionale che apre la porta a nuovi parametri di design non attuabili con il tradizionale stampaggio a iniezione. La produzione additiva di termoplastici evita anche i lunghi tempi di consegna e gli investimenti iniziali negli stampi e nelle attrezzature per lo stampaggio a iniezione. Se si misurano i pezzi finiti sui tre parametri: qualità, "time to market" e costo per metro cubo, in molte situazioni l'SLS industriale porta a una soluzione globalmente migliore.
Tags : 
     3D Systems
By: 3D Systems     Published Date: May 15, 2019
3D printing emerged as a prototyping technology in the 1980s, and has been rapidly evolving ever since. The ongoing developments of the last few decades have transformed 3D printing (also called additive manufacturing), into a viable and cost-effective technology throughout the production environment: from prototyping, to production enablement, to direct 3D production. Companies that utilize 3D printing can attain and cement a leadership position in their industry through the time, cost, and capability advancements 3D printing makes possible. This ebook provides an overview of the 3D printing technology and material advancements in 3D Systems’ plastic additive manufacturing that extend the addressable range of production applications.
Tags : 
     3D Systems
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Construction BUSINESS CHALLENGE Proactively prevent business disruption as a result of cyberattacks IT ENVIRONMENT Kaspersky antivirus, layered enterprise security SOLUTION Malwarebytes Endpoint Protection RESULTS Detected and eliminated thousands of threats that other solutions missed Delivered visibility into entire installed base of endpoints, regardless of location Saved time and accelerated response via the cloud console Prevented PUPs and exploits from gaining entry
Tags : 
     MalwareBytes EMEA
By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
     MalwareBytes EMEA
By: ServiceNow     Published Date: May 14, 2019
A major service outage can cost your business millions of dollars. It’s a constant battle to keep critical business services available. A healthy CMDB helps you to prevent outages, identify and respond to outages quickly, and diagnose and fix outages faster. Learn more with this eBook.
Tags : 
     ServiceNow
By: Nice Systems     Published Date: Feb 26, 2019
NICE has made a significant investment into AI and ML techniques that are embedded into its core workforce management solution, NICE WFM. Recent advancements include learning models that find hidden patterns in the historical data used to generate forecasts for volume and work time. NICE WFM also has an AI tool that determines, from a series of more than 40 models, which single model will produce the best results for each work type being forecasted. NICE has also included machine learning in its scheduling processes which are discussed at length in the white paper.
Tags : 
     Nice Systems
By: 3D Systems     Published Date: May 24, 2019
Per più di due secoli la produzione industriale in fabbrica si è distinta in quattro aspetti chiave: ripetibilità del processo, durata delle parti prodotte, produttività nel flusso di lavoro e un costo totale operativo ridotto. I flussi di lavoro in fabbrica sono stati ottimizzati per produrre le parti migliori in grande quantità e nel modo più economico possibile. Qualsiasi nuovo metodo di produzione o processo del flusso di lavoro che si proponga di affiancarsi a questo processo standard deve soddisfare o altrimenti migliorare questi elementi, che sentono ormai il peso del tempo.
Tags : 
     3D Systems
By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
     Fidelis Cybersecurity
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
     Fidelis Cybersecurity
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Cybercriminals have been upping their game this year; the use of file-less attacks with macros and PowerShell scripts to evade preventive defenses and sandboxes mean that they are getting better than ever at using phishing, social engineering and drive-by techniques to gain initial footholds in private domains – and once they arrive, they are often avoiding detection for extended periods of time. Between April and July 2018, Fidelis interviewed over 580 security professionals from around the globe to understand how they are shifting their detection strategies and how confident organizations are in their ability to not only prevent targeted attacks – but root out threats that have by-passed traditional preventive defenses.
Tags : 
     Fidelis Cybersecurity
By: Gigamon EMEA     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
     Gigamon EMEA
By: Manhattan Associates     Published Date: May 15, 2019
For retailers and brands looking to transform their customer experience through improved in-store selling, engagement and fulfillment, this buyers’ guide will help translate critical business needs into prioritized criteria for point of sale software selection.
Tags : 
     Manhattan Associates
By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
Leading multinational corporation and technology company wanted to simplify, streamline and automate their highly complex & business-critical processes, and improve SLA compliance. LTI provided 24x7 support with distributed teams across the onsite/offshore locations. Our Design-Thinking-led approach for the next-generation platform, using Altassian Jira, helped connect the client’s multiple systems through microservice integration patterns. Download full case study
Tags : 
     Larsen & Toubro Infotech(LTI)
By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : modernization, electrical distribution system, schneider electric
     Schneider Electric
By: HSBC     Published Date: May 07, 2019
Simply put, sustainability in business matters. From greater employee satisfaction to higher operating efficiencies, having a focus on sustainability is changing the way that organizations work, and succeed. The evidence is clear. Those organizations that put sustainability at the heart of their business outperform those who don’t by 16%.
Tags : 
     HSBC
By: Here Technologies     Published Date: Mar 29, 2019
Discover the four big trends in fleet management being powered by location services. Trends to help you differentiate your solutions and enable transportation companies to overcome their logistical challenges and increase asset utilization. Discover what’s making the biggest impact, together with how, by integrating some of these trends into your solutions, you can position yourself as the service provider of choice in fleet and transportation management solutions. And find out how HERE is delivering features, from comprehensive mapping capabilities and real-time location data, to truck-specific attributes, to help you do just that. Download the eBook now
Tags : here technologies, transport and logistics
     Here Technologies
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
     Group M_IBM Q2'19
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.