Whitepaper Library
 

iot

Results 151 - 175 of 425Sort Results By: Published Date | Title | Company Name
Published By: SAP SME     Published Date: Nov 02, 2017
Para el año 2019, 75% de los grandes fabricantes actualizarán sus operaciones y modelos operativos con IoT y conocimiento de situación basado en analíticas para mitigar los riesgos y acelerar el tiempo de llegada al mercado*. La misión de su empresa es transformar lo que diseña, construye, vende y mantiene
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: Nov 02, 2017
Con SAP Leonardo Internet of Things (IoT) las organizaciones pueden aprovechar la Big Data, las analíticas y la tecnología en la nube para alcanzar el éxito.
Tags : 
    
SAP SME
Published By: Mitel     Published Date: Jun 27, 2016
Join Mitel and industry experts on this webcast and learn how Mitel is helping SMBs deliver a seamless experience for their mobile customers through cloud. Topics to be covered in this event: • Why today’s technology fails to deliver the experience you want for your customers • What you should expect and receive from your cloud communication provider now and in the future • The impact of the mobile consumer on small and medium business customer engagement strategies • How consumer expectations have changed the workforce Moderator: Elliot Markowitz, Director, Content Marketing Services, Madison Logic
Tags : 
cloud, telephony, mobile consumer, customization, smbs, seamless experience
    
Mitel
Published By: Genesys     Published Date: Jul 24, 2017
Customer service technology buyers typically plan for the next one to two years. But to truly become customer-obsessed, companies need to understand what new technologies and customer service experiences will seem normal for their customers in five years.
Tags : 
forrester, customer service, customer experience, internet of things, iot, technology
    
Genesys
Published By: Juniper Networks     Published Date: Aug 08, 2017
L'Internet des objets (IoT) exige la sécurisation de l'ensemble du réseau (et non la construction d'un réseau rempli de failles)
Tags : 
    
Juniper Networks
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Zingbox     Published Date: Nov 08, 2017
The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits show that more attention needs to be paid to making the IoT safe. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report describes the challenges inherent in securing the IoT. And explains how IoT security differs from conventional IT security.
Tags : 
    
Zingbox
Published By: B Channels     Published Date: May 01, 2018
Industrial Internet of Things (IIoT) originally described IoT as used across several industries: manufacturing, logistics, oil and gas, transportation, energy/utilities, mining and metals, aviation and other industrial sectors. Download this paper to understand the research insights of the future of IoT.
Tags : 
    
B Channels
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: F5     Published Date: May 12, 2016
App Protection is fraught with complexity and with the growth of IoT and the applications that go along with it, the issues are only growing. By enhancing existing security portfolios with solutions and services focused on the application level, organizations can better protect the applications that can expose their sensitive data.
Tags : 
application protection, app protection, security, cloud, cloud computing, public cloud, security application, virtualization, infrastructure
    
F5
Published By: Riverbed     Published Date: Jun 05, 2017
This IDC Technology Spotlight looks at the role of Riverbed in accelerating digital transformation by addressing the new requirements for a cloud-ready enterprise.
Tags : 
digital transformation, cloud, cloud-ready, iot, internet of things, analytic, mobile, cloud applications
    
Riverbed
Published By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : 
data, sharing, analytics, iot, mit
    
Teradata
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: Ayla Networks     Published Date: Feb 10, 2016
In July 2014, a Forbes business article declared: “The Internet of Things (IoT) is changing manufacturing as we know it.” From boosting efficiency, to reducing costs, and gaining a competitive edge, the IoT is widely seen as the future for manufactured products. But it’s an enormous leap for manufacturers to go from making traditional, everyday products to making connected IoT products.
Tags : 
    
Ayla Networks
Published By: IBM     Published Date: Jan 22, 2016
The Internet of Things (IoT) presents both huge opportunities and huge challenges to the developers of tomorrows 'always-connected' products.
Tags : 
ibm, agile, product, development, iot, connected products
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
IBM Rational DOORS Next Generation is the latest requirements management tool, designed for collaboration and to provide a single platform for managing requirements to help project teams work more effectively.
Tags : 
ibm, iot, management, requirements, rational doors, collaboration
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
The Internet of Things (IoT) offers exciting options for innovation through new business models and services that create new revenue opportunities.
Tags : 
ibm, iot, guide, business, roi
    
IBM
Published By: IBM     Published Date: May 03, 2016
The impact of the Internet of Things on product development: Discover how to transform your engineering processes and tools to gain a competitive advantage from the Internet of Things
Tags : 
ibm, watson, internet of things, iot, product development, continuous engineering
    
IBM
Published By: IBM     Published Date: Aug 08, 2016
Hybrid cloud has emerged as the cornerstone for digital transformation, enabling developers to create unique and compelling mobile, IoT, and web applications while extending their IT investments and capabilities. Attend this webinar to learn how you can leverage your WebSphere Application Server infrastructure and investments to maximize performance, lower costs, and successfully move forward into a hybrid cloud world.
Tags : 
ibm, cloud, hybrid cloud, middleware, application infrastructure, websphere application server, cloud, cloud computing
    
IBM
Published By: IBM     Published Date: Nov 08, 2016
Read this report to learn more on the future of IoT.
Tags : 
ibm, cloud, middleware, iot, data integration
    
IBM
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This spotlight report examines: • How Manufacturing Operations Management (MOM) or Manufacturing Execution Systems (MES) are key enablers of data management and Digital Transformation. Companies can combine many other opportunities with manufacturing operations in a digital journey. • Product lifecycle management (PLM) as a high-value discipline to pair with MOM in discrete manufacturing, and the value of digital continuity across engineering, manufacturing operations, and supply chain. • A robust integration of MOM and PLM technologies and the advent of the Digital Twin (a virtual copy of the product and how it's made) to demonstrate maturity in Smart Manufacturing and the ability to make smart products in smart factories. The IIoT has opened up a world of opportunity for manufacturers. Take advantage of it.
Tags : 
    
Dassault Systèmes
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.