iot

Results 1 - 25 of 558Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jul 01, 2019
The first-ever Global Digital Transformation Benefits Report is here. The report analyzes 230 customer stories and 330 data points to provide concrete evidence on digitization's disruptive potential. It examines how digital transformation has driven CapEx and OpEx savings, sustainability initiatives, equipment uptime, and other key business goals. It also includes stories from 34 of our customers, including how: • Tata Power, an Indian power company, cut power restoration times from hours to seconds. • New Belgium Brewing, a US beer company, cut downtime by 50%. • Vitens, a Dutch water utility, shrank deployment times by 65%.
Tags : 
digital, iiot, water, food and beverage
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
Published By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
    
Red Hat APAC
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In our 27-criterion evaluation of global internetof-things (IoT) services for connected business operations providers, we identified the 14 most significant ones — Accenture, Atos, Capgemini, Cognizant, Deloitte, Dimension Data, EY, HCL Technologies, IBM, Infosys, KPMG, PwC, Tata Consultancy Services (TCS), and Wipro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice.
Tags : 
    
Group M_IBM Q3'19
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: Patriot Capital     Published Date: Oct 06, 2011
There are significant tax benefits in the Stimulus Act that are about to expire at midnight on December 31st, 2011. Take advantage of them now!
Tags : 
    
Patriot Capital
Published By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
In April 2016, SAP commissioned Forrester Consulting to evaluate how enterprises are taking advantage of IoT, how IoT fits into broader digital transformation initiatives, and the role of immediate insights in realizing the benefits that IoT can deliver.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Cisco     Published Date: May 24, 2019
Today’s organizations are becoming more innovative and dynamic by adopting mobility, IoT, analytics and cloud technologies. With this, come growing demands for network scale, agility and threat protection which call for an intent-based network. The Cisco® Digital Network Architecture (Cisco DNA) gives you comprehensive intent-based networking across your campus, branch and WAN with robust wired, wireless, and routing solutions.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
    
Lenovo UK
Published By: Lenovo UK     Published Date: Mar 14, 2019
In today’s workplace, work happens where we are, not where we go. To support this you need the four pillars of dynamic IT Download this infographic to find out how Lenovo can help you deliver the dynamic IT your workforce requires.
Tags : 
smarterworking, future-ready, dynamicit, remoteworking, workplaceit, smarterworkforce, dynamicworkplace, mobility, iot, artificialintelligence
    
Lenovo UK
Published By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
Published By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
IoT has proven its value in the private sector. Ever since the 1980’s, US manufacturing has undergone a dramatic transition based on IoT. Machines that where once manually calibrated and maintained began to be controlled by specialized computers. These computers were able to quickly recalibrate tools which allowed manufactures to produce smaller batches of parts, but were also often locked into proprietary computing languages and architectures.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Dec 11, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Jul 30, 2015
Build smarter
Tags : 
manufacturing, business optimization
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.