osi

Results 1 - 25 of 2330Sort Results By: Published Date | Title | Company Name
By: Shell U.K. Limited     Published Date: Sep 05, 2019
We harness Shell gas-to-liquids (GTL) technology to create high-purity process oils that open exciting opportunities for your products and operations. Conventional process oils are derived from crude oil, whereas Shell Risella X and Shell Ondina X are made from pure synthesis gas. That frees them from the impurities and large molecular variations found in mineral oils. Using GTL process oils could enhance your processes and final products to give you a competitive advantage. [478] Have you ever experienced product quality issues caused by variations in process oil batches? Do you need a low-viscosity process oil, but have concerns about the effect of volatiles on working conditions? Could you offer enhanced products if you had process oils with distinct characteristics, for example, an extremely narrow hydrocarbon distribution range? Our GTL process oils contain a high proportion of paraffinic hydrocarbons and are very pure, which provides key qualities for many applications. For in
Tags : shell, risella, ondina, process oils, gas-to-liquids, gtl, purity, pure, volatility, colourless, colorless, odourless, odorless, viscosity index
     Shell U.K. Limited
By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
     VMware
By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system – linking those with money to invest with enterprises and activities that require funding – is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of “external” voices – demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms’ mindset and investment offerings is required.
Tags : 
     KPMG
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: SES     Published Date: Aug 01, 2019
Descubra cómo una empresa de comunicaciones está llevando conectividad a las zonas más remotas de Perú. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avión, Axesat está entregando soluciones por satélite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cómo, en asociación con SES Networks, la empresa puede aumentar el comercio y la conectividad en Perú.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
La brecha digital está obstaculizando el uso del potencial de las regiones de pocos recursos en todo el mundo. Este artículo explora cómo una red 5G puede reducir drásticamente la brecha digital y mejorar las condiciones económicas en todo el mundo. Descubra cómo la tecnología satelital puede aumentar la conectividad en regiones de pocos recursos y tener un impacto positivo en la telemedicina, el empleo a distancia y las oportunidades de educación.
Tags : 
     SES
By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
     BehavioSec
By: HERE Technologies     Published Date: Aug 28, 2019
Mapping, tracking, positioning and real-time data arekey to supporting defense and intelligence initiatives. Governments and agencies need location data they can trust to track and adjust fixed and mobile resources to address rapidly changing events and circumstances. With Ovum's Location Platform Index: Mapping and Navigation, agencies can assess location platform industry leaders and identify the platform that best meets their product development demands. This year, HERE Technologies cemented its role as the industry leader, earning the highest ranking, and besting Google, for the second time in a row. Download your free report to learn: The relative strengths and weaknesses of each vendor, including data, enablers and features Vendor strategies to keep up with changes in technologies and trends The specific workings of the location platform market, and to better understand what constitutes a healthy location platform and which provider offers the correct portfolio and the necess
Tags : data, platform, mapping, developers, index, vendors, capabilities, maps
     HERE Technologies
By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
     KPMG
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
     Cisco Umbrella EMEA
By: BillingPlatform     Published Date: Jul 30, 2019
Explore Every Option Before Choosing Your Monetization Strategy When it comes to replacing your billing system or choosing a new billing solution to support revenue management, one of the difficult questions you will face is whether to build a custom software set or purchase a solution from a vendor. There are a variety of factors to consider when making the build vs. buy decision. This whitepaper helps you determine the right path for your organization. Download the full whitepaper to discover a practical approach to weighing your options for billing solutions. The whitepaper covers the following topics: • Question to answer before implementing a billing system • Considerations for building a billing system • Costs of building your own system • Considerations for buying a billing system • Common billing system requirements to consider By reading our systematic exploration of billing options and considerations, you will find the approach that will lend the greatest success to y
Tags : 
     BillingPlatform
By: TIBCO Software     Published Date: Jul 22, 2019
What if you could use just one platform to detect all types of major financial crimes? One platform to handle the analytical tasks of fraud detection, including: Data processing and aggregation Data visualization Statistical/mathematical/machine learning modeling Batch/real-time scoring One platform that could successfully reduce complex and time-consuming fraud investigations by combining extremely different domains of knowledge including Business, Economics, Finance, and Law. A platform that can cover payments, credit card transactions, and know your customer (KYC) processes, as well as similar use cases like anti-money laundering (AML), trade surveillance, and crimes such as insurance claims fraud. Learn more about TIBCO's comprehensive software capabilities behind tackling all these types of fraud in this in depth whitepaper.
Tags : 
     TIBCO Software
By: TIBCO Software     Published Date: Jul 22, 2019
Global producer of polycrystalline silicon for semiconductors, Hemlock Semiconductor needed to accelerate process optimization and eliminate cost. With TIBCO® Connected Intelligence, Hemlock achieved centralized, self-service, governed analysis; revenue gains; cost savings; and more. Fueled by double-digit growth in the markets it serves, Hemlock Semiconductor is adapting to the increasing commoditization within the polysilicon industry and better positioning itself to compete. A key factor in this plan is to equip process-knowledgeable personnel with the skills and tools to accelerate delivery of process optimizations and associated cost elimination. Hemlock turned to a TIBCO® Connected Intelligence solution to address the challenges. By implementing TIBCO Spotfire® and TIBCO® Streaming analytics, TIBCO® Data Science, and TIBCO® Data Virtualization, the company created more self-service analytics. Adding TIBCO BusinessWorks™ integration let the company realize the vision of connect
Tags : 
     TIBCO Software
By: Intel     Published Date: Sep 27, 2019
As data constantly changes and expands, data centers increasingly face capacity, performance, and cost limitations related to existing memory and storage solutions. Intel Optane data center (DC) technology addresses these challenges by placing data closer to the CPU and closing the gap between traditional memory and storage options, thus transforming the memory and storage tier.
Tags : 
     Intel
By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
• Simplify business process modeling: Quickly build processes in a straightforward cloud-based interface designed for both IT and business users • Improve process efficiency and accuracy: A central process repository eliminates version control and consistency issues by providing users real-time access to process workflows • Enhance cross-team collaboration: A shared team workspace engages all business process owners, encouraging cross-team participation and continuous process improvement
Tags : 
     Group M_IBM Q4'19
By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 14, 2019
Databases represent the backbone of most organizations. And Oracle databases in particular have become the mainstream data repository for most mission-critical environments. Some of the largest companies and organizations in the world rely on Oracle databases to store their most important data. The biggest challenge organizations face relative to an Oracle database is to maintain these databases at optimum performance and reliability without breaking the bank. This paper discusses the storage capabilities customers should consider when choosing storage to support an Oracle database environment.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
La trasformazione digitale è un acceleratore di business che, fra le altre cose, sta portando ad un aumento della domanda per ottenere prestazioni migliori e una maggiore capacità di archiviazione. Tale domanda fa sì che le aziende debbano riesaminare la loro strategia di storage, poiché l’aumento della capacità storage non coincide con i sempre minori budget a disposizione del settore IT. Per poter sostenere lo sviluppo della propria attività commerciale e rimanere competitivi all’interno di un mercato digitale globale, ai CIO viene chiesto sempre più spesso di “fare di più con meno risorse” e, al contempo, di migliorare prestazioni e disponibilità.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
Nonostante decenni di progresso industriale e tecnologico, ad oggi non esiste ancora una soluzione storage integrata e universale capace di ridurre i rischi, essere redditizia, eliminare le complessità e integrarsi perfettamente nel modus operandi del business e gestire i dati su larga scala. Per raggiungere questi obiettivi, è necessario contare su determinate capacità, così da raggiungere i risultati ideali al minor costo possibile. Queste capacità includono la disponibilità, l’affi dabilità, le prestazioni, la densità, la facilità di gestione e l’integrazione dell’ecosistema nelle applicazioni. Questo documento presenta una soluzione innovativa nel panorama dello storage. Si possono così risolvere non solo i problemi di oggi, ma anche quelli di domani.
Tags : 
     Infinidat EMEA
By: Look Listen     Published Date: Oct 04, 2019
Simply put: Marketing isn’t what it used to be. If you want to compete in this rapid digital world, you need to make your customers happy. Constantly. We’ll get you started with nine of the most exciting trends developing in the world of marketing in 2019. With this report, you’ll learn: How the new director of marketing data position and GDPR compliance can build customer trust. What it means for customer centricity now that MarTech and AdTech are finally coming together with AI and machine learning. How to adjust your business purpose to create customer loyalty as the attention economy shifts to the emotion economy.
Tags : 
     Look Listen
By: Datastax     Published Date: Sep 27, 2019
Smartphones, smart cities, smart homes, smart cars—IoT has triggered a data explosion, and not every enterprise is prepared to handle it. Beyond collecting and analyzing the increasing volume of data, organizations must figure out how to manage the velocity of that data, as well as how to integrate it with multiple data sources. And that’s just scratching the surface of the IoT challenge. To extract business value out of this inpouring of data, and to take full advantage of IoT boosted by new 5G technology, IT organizations must consider five key technologies. In this ebook, you’ll learn about these five technologies and their benefits. To continue to develop and scale your IoT-driven applications, your infrastructure needs to be able to handle sensor data at velocity, keep data close to the edge, maintain 100% uptime, and make it easy to extract business value. The insights you’ll discover in this ebook will not only help you prepare your organization for this reality; they’ll also
Tags : 
     Datastax
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.