safe

Results 976 - 998 of 998Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: Sep 26, 2018
How do you keep people safe in a ‘once in a 1,000 years’ weather event? Hurricane Harvey was a category four hurricane which struck the coast of Texas, eastern Texas and southwestern Louisiana in August 2017. HERE was able to track the storm and accurately report more than 2,100 road closures and blockages in real-time helping people stay out of harm’s way. HERE is the world’s leading provider of traffic incident information to the automotive industry. This eBook shows how HERE’s deploys its people and artificial intelligence to gather the data, check it for accuracy and produce insights which keeps drivers safe.
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Dec 04, 2018
How does over-the-air technology (OTA) enable innovative solutions for carmakers? How do OTA software and firmware updates work? This whitepaper looks at the benefits of OTA updates to drivers and manufacturers. It also examines how design challenges are overcome, how updates are secured and how OTA technology could be deployed across a fleet of vehicles. As the world’s leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes) HERE is supporting auto manufacturers to develop the navigation services for the future and guide drivers safely and efficiently to their destinations.
Tags : 
    
HERE Technologies
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Sep 27, 2019
Your patients demand excellent quality care. With single patient ID, medical grade hygiene and robust data security from Lenovo, you can offer them the very best outcomes.
Tags : 
    
Lenovo - APAC
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q4'19     Published Date: Sep 17, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper ""Six Steps for Building a Robust Incident Response Function"" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q4'19
Published By: HERE Technologies     Published Date: Feb 12, 2019
Get higher quality, more accurate location data – and a safer, more profitable fleet – by choosing the right location services provider. The true value of a location platform comes from bringing together multiple data sources and presenting them in a meaningful way. Using a platform approach, you can help customers differentiate their service, increase margins and increase safety. So, in this guide, we cover the four key considerations for choosing a mapping and location service platform to ensure a high quality, accurate mapping service for you and your customers. Download the eBook
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 29, 2019
How HERE delivers fresh and accurate traffic data to optimize mobility, road safety, and transport network management
Tags : 
traffic, data, closures, congestion, incidents, road
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jul 11, 2019
Whether you’re a private company moving people or goods, or a governmental organization responsible for managing traffic flow, urban environments present a common set of challenges. Greater safety, reduced congestion and pollution, a better consumer experience, more well-organized networks and intuitive vehicle use are shared goals for all those looking to transform urban mobility. City transportation is about to undergo a seismic change. This presents a huge opportunity for businesses to improve their services and for public sector leaders to understand and manage networks more efficiently. By reading this ebook, you will discover how location intelligence helps: - Meet ever-increasing customer expectations of timely pick-ups and deliveries - Improve safety and congestion across a road network - Reduce operational costs and improve efficiency for movers of people and parcels -Maximize the use of fleet vehicles and drivers by efficiently matching supply to demand
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Published By: Here Technologies     Published Date: Apr 01, 2019
Many on-demand companies are starting to rely on fast, accurate and robust mapping and location technologies in order to stay competitive and to provide superior end-user experience. Leveraging location data can assist you in accurately locating each delivery address, matching demand with available supply and exceeding your customer’s expectations. Discover a variety of ways in which on-demand transportation can be optimized by maps and location services such as those created by HERE. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to improve transportation efficiency and safety.
Tags : 
location data, transport & logistics, location services
    
Here Technologies
Published By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Eaton     Published Date: Jul 01, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June.
Tags : 
    
Eaton
Published By: ttec     Published Date: Jul 24, 2019
Fraud prevention and content moderation take center stage. Trust & Safety is good business Change your password often. Keep your virus software up to date. Beware of so-called princes from Nigeria. These are the costs of doing business online. Since its inception, the internet has always had its share of bad guys. And as nearly all companies move to a more digitally enabled world, the thieves, con artists, and hackers are finding new ways to steal money, information, and disrupt the world in a bad way. Having a trustworthy and safe brand is now a differentiator, especially from companies that operate primarily online. But it’s becoming harder to keep up as technology advances and information moves quicker every day. This eBook details how companies can protect their brand and keep customers safe by enabling fraud prevention and content moderation strategies and tactics.
Tags : 
    
ttec
Published By: NetSpi     Published Date: Sep 20, 2019
All organizations should aspire to have the people, processes, and tools necessary to effectively execute an on-going penetration testing program. Failure to do so may result in poor tool selections, testing mistakes, and faulty interpretation of results that often lead to a false sense of security putting the enterprise at risk. IT security and audit staff, along with their managers and directors, should read this paper to clarify and misunderstandings about penetrating testing - from the true purposes and goals, to important process considerations, to tools and tester selection issues, and finally to safe and effective ethical hacking approaches.
Tags : 
    
NetSpi
Published By: HERE Technologies     Published Date: Oct 01, 2019
Public safety organizations are trying to optimize their dispatch centers in order to minimize response times and maximize the total number of lives saved. Most of these organizations, however, are still using legacy location technology that does not properly address some key factors.
Tags : 
    
HERE Technologies
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.