it monitoring

Results 326 - 350 of 715Sort Results By: Published Date | Title | Company Name

An RFID pilot program can boost inventory accuracy by up to 99.5%. Get started with our free guide

Published By: Zebra Technologies     Published Date: May 02, 2018
Near-perfect inventory visibility is critical to transforming the customer experience and competing in the retail revolution. Yet inventory accuracy across retail sectors hovers at around 60%. That shortfall causes retailers to lose out on potential sales and puts customer loyalty at risk.How do retailers address this issue? RFID—or radio frequency identification—is 10 times more efficient at cycle counting and can increase inventory accuracy across the supply chain by up to 99.5%, enabling retailers to truly compete in the highly competitive omnichannel world. Launch a successful RFID technology pilot program in your retail operation with our free How-to Guide: Five Steps to Piloting RFID for Unprecedented Inventory Visibility. This guide takes you from Step 1 (a KPI checklist) to Step 5 (execution and monitoring), so you can launch a pilot program and effectively measure its ROI before moving to full deployment. Download the free Guide today.
Tags : 
rfid, program, inventory, guide, risk, customer
    
Zebra Technologies

Reduce Complexity in the Data Center with the Right Architecture

Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

How Connected Care Can Save Lives, Digitally

Published By: Infosys     Published Date: May 21, 2018
There are several reasons for this, including the inability of healthcare institutions to constantly monitor post-operative deterioration as well as patient's inability to visit the healthcare center for post-operation followups. Most of the patient data is recorded manually. This data is often weaned from displays of multiple monitoring devices like vitals monitor, infusion pumps, and ventilators. More often than not, these devices do not talk to each other or to a central system. Doctors, nurses, or other care-givers manually note down patient statistics in their files and notepads. Even though the healthcare industry is in the throes of digitization, there's still a lot of paper doing the rounds. eventually, the data from these physical sheets might be fed into an electronic system, but there is a high chance of error in that process.
Tags : 
digital, connected, care, patient, healthcare
    
Infosys

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

Three Reasons Why Turbine Oil Degrades

Published By: Shell     Published Date: Nov 19, 2018
Your turbine operates in tough conditions—running at high temperatures and exposed to a ton of contaminants. As the pressure to perform builds on your turbine, your turbine oil can start to degrade. Read this brief and learn why monitoring turbine oil condition can be critical to preventing unplanned downtime. You'll also: • Discover the causes of sludge and varnish formation that lead to critical component failure • Understand how common contaminants contribute to degradation processes like hydrolysis • Find out why oil additives become depleted, significantly impacting oil life and performance GET THE BRIEF ON CAUSES AND CURES OF OIL DEGRADATION. In the brief, you’ll learn some of the common causes of turbine oil degradation that happen all the time during the course of turbine operation. Download the brief and learn how to avoid problems like contamination and varnish build-up that can really cost your operation money in unplanned maintenance, repairs, and downtime.
Tags : 
    
Shell

The ADC Guide to Managing Hybrid (IT and Dev Ops) Application Delivery

Published By: Citrix Systems     Published Date: Nov 13, 2018
Today, new application architectures like Devops microservices are opening great opportunities for innovation. But you still have traditional IT-managed applications to provide for. How do you bridge the gap between these different architectures? Download “The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery” to learn more. Fill out the form below to receive this eBook. This eBook identifies ADC considerations for: -Managing traditional and microservices apps in a unified environment -Monitoring and troubleshooting your entire application delivery infrastructure -Delivering consistent features and capabilities for all applications
Tags : 
    
Citrix Systems

Ensure App Performance Across Hybrid Environments Challenges and Best Practices

Published By: Riverbed     Published Date: Nov 02, 2016
In its quest to increase agility and reliability, IT is adopting cloud services and related technologies like PaaS, micro-services, and containers to rapidly deliver applications that scale to real-world conditions. Application topology is often transient and unpredictably interrelated with countless other applications and services. This poses a serious challenge for performance monitoring since most techniques are still rooted to tiers or servers. During this webinar, discover: • The benefits and challenges of deploying apps across hybrid environments • Techniques that expose major, but often undiagnosed problems • Real-world examples where major performance issues were resolved"
Tags : 
    
Riverbed

Achieving End to End UC Visibility

Published By: Riverbed     Published Date: Nov 02, 2016
When apps run efficiently, employees are more likely to use them. The promise of unified communications (UC) is that it is supposed to increase efficiencies and make internal operations more seamless. But that only happens when it’s working properly. According to Robin Gareiss, president and founder of Nemertes Research, “Companies devote 33% more IT staff to managing IP telephony and 31% more to UC when they don’t use monitoring tools. The tools are instrumental to identifying, isolating, and resolving performance issues—and preventing them from happening again. When apps run efficiently, employees are more likely to use them.” That’s one reason 36% more people actually use UC in large companies that use monitoring tools. Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC—network probes vs endpoint telemetry—and why taking a combined approach hel
Tags : 
    
Riverbed

Intrusion Prevention Services for midsized businesses

Published By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : 
isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security
    
Dell SecureWorks

Security Analytics Team of Rivals

Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA

Cyber-bullying: A Digital Epidemic

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
WatchGuard Technologies

SAS Grid Computing: Faster processing, increased resilience and improved hardware utilization

Published By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : 
grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management
    
HP SAS

Best Practices for Database Activity Monitoring and Blocking

Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security, compliance, security management, infrastructure
    
Oracle Corp.

Legal Risks of uncontrolled email and web

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering, web service security
    
Symantec.cloud

Bandwidth Bandits

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.
Tags : 
messagelabs us, symantec hosted services, internet bandwidth, security, data protection, employee misuse, security safeguard, employee monitoring
    
Symantec.cloud

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool

Published By: EMC Corporation     Published Date: Mar 20, 2014
This ESG Lab review documents hands-on testing of RSA Enterprise Compromise Assessment Tool (ECAT), a signature-less malware detection tool with a focus on endpoint compromise assessment and monitoring.
Tags : 
emc, rsa, ecat, enterprise compromise assessment tool, malware threats, malware detection, compromise assessment, compromise monitoring
    
EMC Corporation

Vulnerability Management-Assess, Prioritize, Remediate, Repeat

Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement, monitoring
    
Shavlik Technologies

PCI X-Ray: File Integrity Monitoring (Forrester)

Published By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
    
NetIQ

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
    
NetIQ

How to Understand Network Dependencies: Best Practices for Automation and Limiting Risk

Published By: EMA     Published Date: Oct 21, 2014
Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Historically, going the next step requires manually building and maintaining the knowledge of how those disparate elements are connected and how they interact with one another to deliver applications and communications. In other words, you need to understand network-level dependencies.
Tags : 
network management, network monitoring, network dependencies, network discover tools, network automation, network performance management
    
EMA

How To Gain a 360 Degree View of Your Competitors' Marketing

Published By: Hubspot     Published Date: Apr 23, 2013
Effective marketing starts with understanding the buyer, but also understanding your competitors. It's important to see where your competitors are succeeding, and where they're failing. Download this guide to help you stay up to speed with what your competitors are doing while staying on track for your own business strategy.
Tags : 
marketing software, competitive intelligence, competitive marketing, marketing audit, marketing strategy, monitoring and benchmarking, tracking competitors, hubspot
    
Hubspot

How Waggener Edstrom Turned Social Data into Valuable Strategic Insights

Published By: Brandwatch     Published Date: Jun 17, 2013
To demonstrate its prowess as an insight-driven agency, Waggener Edstrom used Brandwatch to monitor and analyze the social “buzz” around the 2012 London Olympic Games—and turned social conversations into meaningful insights for its client brands.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch

Best Practices for Becoming a Successful Social Brand

Published By: Brandwatch     Published Date: Jun 17, 2013
An introduction to using social media in business, this eBook discusses the importance of setting social media goals and how to foster a positive brand experience, along with tips to become a thriving social enterprise.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch

Brandwatch Report: Analyzing Customer Service on Social Media

Published By: Brandwatch     Published Date: Jun 17, 2013
Consumers now expect good customer service via social media…so Brandwatch analyzed 40 leading brands to see which brands were delivering the best social customer service.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch

Transforming Social Analytics into Competitive Advantage at Sky News Arabia

Published By: Brandwatch     Published Date: Jun 20, 2013
For Sky News Arabia, using social media monitoring & analytics to “sense-and-respond” to viewers is a critical component to increasing viewer-to-viewer engagement and gaining extended market reach in an established market.
Tags : 
social media monitoring, social media analytics, social media intelligence, social listening, social media strategy, social media insights, brand monitoring, twitter tracking
    
Brandwatch
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.