techniques

Results 1 - 25 of 423Sort Results By: Published Date | Title | Company Name
Published By: ASME     Published Date: Oct 22, 2019
In this four-part series, explore how product development is changing, its challenges, and the new technologies being developed to transform design workflows. You will discover the new visualization techniques that drive new levels of collaboration and enable critical product decisions to be made earlier in the design process. Download the latest reports in this series, and learn how to improve design reviews, enhance decision making, and optimize your product designs.
Tags : 
    
ASME
Published By: Shell U.K. Limited     Published Date: Oct 16, 2019
La réussite de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de votre équipement, en particulier lors du semis et de la récolte. Pourtant, deux exploitants sur cinq (41 %) déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 62 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité et de productivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. En savoir plus: Recherche et expertise.
Tags : 
    
Shell U.K. Limited
Published By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
    
Barracuda
Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de vos équipements. Pourtant, près de la moitié (43 %) des entreprises du secteur de la construction déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 72 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. Lisez notre nouveau rapport dédié au secteur de la construction, Une efficacité accrue pour de meilleurs rendements : construction européenne, lub
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
La réussite de votre activité repose sur votre capacité à veiller au bon fonctionnement et à la fiabilité de votre équipement, en particulier lors du semis et de la récolte. Pourtant, deux exploitants sur cinq (41 %) déclarent subir des pannes régulières en raison d'une mauvaise lubrification, et 62 % affirment que leurs équipes de maintenance ont besoin d’être davantage formées. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des conseils d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité et de productivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus de 68 millions de dollars reportée par les clients professionnels de Shell. Consultez les conclusions de nos dernières études mondiales sur le coût total de possession (TCO) et la maintenance du matériel agricole. Découvrez commen
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre parc d'autobus repose sur votre capacité à allier fonctionnement optimal et approche novatrice. Gardez vos véhicules sur la route et gagnez en rentabilité. Pourtant, 70 % des exploitants de parcs de véhicules craignent que le coût d’investissement dans les nouvelles technologies soit plus important que les avantages, ce qui explique que les deux tiers (69 %) d'entre eux ne souhaitent pas moderniser leur parc actuel tant que celui-ci est opérationnel. 77 % des responsables de parcs déclarent vouloir dispenser une formation supplémentaire à leur équipe de maintenance. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des services d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économie de plus
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Oct 08, 2019
Le succès de votre parc de véhicules lourds repose sur votre capacité à allier fonctionnement optimal et approche novatrice. Gardez vos véhicules sur la route et gagnez en rentabilité. Pourtant, 70 % des exploitants de parcs de véhicules craignent que le coût d’investissement dans les nouvelles technologies soit plus important que les avantages, ce qui explique que les deux tiers (69 %) d'entre eux ne souhaitent pas moderniser leur parc actuel tant que celui-ci est opérationnel. 77 % des responsables de parcs déclarent vouloir dispenser une formation supplémentaire à leur équipe de maintenance. C'est pourquoi nous avons créé Shell Driveline : une gamme de lubrifiants haute performance et des services d'experts qui représentent bien plus d'avantages que la somme de ses composants, pour plus d’efficacité, de productivité et de compétitivité. Ainsi, les clients qui choisissent les services techniques de Shell ont pu constater une nette amélioration de leurs résultats, avec une économi
Tags : 
    
Shell U.K. Limited
Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to give the best possible defense? This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.
Tags : 
    
Pine Cove Consulting
Published By: BehavioSec     Published Date: Sep 30, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: HERE Technologies     Published Date: Sep 30, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: Find out why de-identification does not always mean anonymity Understand how privacy by design can be used for standards and product or service creation Discover how gathering just data you need will minimize the privacy impact of collection Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: Anaplan     Published Date: Sep 19, 2019
Réalisée par Mint Jutras, cette étude analyse la plateforme de planification intégrée d’Anaplan, sa proposition de valeur et ce qui la différencie des solutions du marché. « Le moteur de planification en mode cloud d’Anaplan peut conjuguer les avantages de deux mondes : il est déployé en tant que plateforme suffisamment souple pour s’adapter à vos besoins spécifiques. Mais au delà d’un outil technique, c’est une plateforme métier dont la facilité d’utilisation permet aux utilisateurs dépourvus de compétences techniques de concevoir, de modéliser et de configurer des applis… Cette plateforme métier dispose d’un plan vivant et dynamique qui s’adapte à l’évolution des objectifs et des conditions du marché. L’analyse prédictive renforce cette approche, ce qui permet non seulement d’adapter les plans aux changements lorsqu’ils surviennent, mais également d’anticiper au mieux les évolutions qui se profilent. Voulez-vous en savoir plus ? Téléchargez le rapport dès maintenant.
Tags : 
    
Anaplan
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
Online credentials have been stolen and compromised for almost as long as the Internet has existed. But in the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. Theft of user credentials has ramped up significantly for a number of reasons including: Users are reusing the same usernames and passwords across multiple sites Automated tools can take stolen credentials and test them on other sites at a massive scale Many customers have high value assets that are extremely lucrative targets for cyberattacks In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Tags : 
    
Shape Security
Published By: FICO EMEA     Published Date: Aug 28, 2019
Synthetic Identity Fraud is growing in both scope and complexity. As your fraud protection efforts succeed in some areas of your business, fraudsters are devising new ways to penetrate your defenses. Do you understand the concepts of Bust Out Fraud, Data Furnishing, and Piggybacking? These are just some of the new techniques that fraudsters are using to exploit the holes in your fraud defenses. Download the eBook "Synthetic Identities: Are You Chasing Invisible Footprints?" This insightful eBook illustrates the aggressive techniques that fraudsters are using and answers questions such as: What are the six major factors driving the growth in Synthetic Identity Fraud? How are synthetic identities used? What are Bust Out Fraud, Data Furnishing, and Piggybacking, and how do they work? Perhaps more importantly, what are the state-of-the-art strategies used to fight these increasingly sophisticated fraud techniques?
Tags : 
synthetic identity fraud, manage fraud
    
FICO EMEA
Published By: TIBCO Software     Published Date: Aug 26, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro
Published By: SAP Concur     Published Date: Aug 07, 2019
"Creating an expense policy can be a time-consuming process, but when you consider that almost 20% of T&E expenses fall outside of policy it makes sense to invest the time and effort. This template walks you through how to build a best-practice expense policy and also explains what each section should cover. In the template you will find: Explanations for each expense category in plain language Lists of common questions about expense policies, pitfalls 11 tips for creating a straight-forward policy that increases compliance Get started on your expense policy today."
Tags : 
    
SAP Concur
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: MeQuilibrium     Published Date: Jul 31, 2019
More people suffer from anxiety than ever before, and it’s deeply affecting companies like yours. Many organizations are stuck wondering what to do. In this white paper, “The Triple A Threat,” we explore the Triple A Threat of anxiety, anger, and aggression. We’ll explain what impact these issues have on your workplace and your bottom line. You’ll also learn: ? The debilitating impacts of anxiety, which can lead to workplace anger and aggression ? Why resilient employees suffer less anxiety and can rebound after a setback ? How to build a habituated, protective shield through proven prevention techniques Resilience can equip your people with the skills to address stress and the challenges that work presents every day. With more resilient employees, organizations can dramatically reduce the threats of anxiety, anger, and aggression. Download Now
Tags : 
    
MeQuilibrium
Published By: TIBCO Software     Published Date: Jul 22, 2019
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today’s market. Now there has been a shift away from these “black box” applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.