cement

Results 226 - 250 of 524Sort Results By: Published Date | Title | Company Name

F5 BIG-IP v10

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
enhancement, feature, big-ip, application delivery controller, adaptable, dynamic, device, system
    
F5 Networks Inc

Gartner: Magic Quadrant for Application Delivery Controller

Published By: F5 Networks Inc     Published Date: Feb 19, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
application, delivery, controllers, evolved, data center, adcs, advancements
    
F5 Networks Inc

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Published By: F5 Networks Inc     Published Date: Jun 24, 2015
To succeed in this dynamic environment, organizations must create networks that combine core layer 4-7 functionality, programmability, and application fluency into a scalable Application Delivery Network. While these components all bring their individual benefits, the real lasting value lies in the resulting synergy of the combined solution. Read this whitepaper to learn about the five advantages of F5 when evaluating a replacement for Cisco ACE.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency
    
F5 Networks Inc

How Quantum Computing Will Change Browser Encryption

Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc

FRP Solutions for Seismic Rehabilitation of Unreinforced Masonry Walls in Nuclear Power Stations

Published By: FIBRWRAP     Published Date: Jan 08, 2016
This paper will explore the advancements made in retrofitting unreinforced masonry walls with fiber reinforced polymer (FRP) systems to withstand the lateral loading induced by a seismic event.
Tags : 
fibrwrap, fiber reinforcedpolymer, frp, urm, unreinforced masonry, structure, engineering, fibre channel
    
FIBRWRAP

Pressure Barrier Replacement of Circulating Water Piping Discharge Headers in Nuclear Power Plants

Published By: FIBRWRAP     Published Date: Jan 08, 2016
Decades of continuous service of large diameter pressure pipelines leads to deterioration that threatens the structural integrity of piping systems. This white paper highlights the project background for repairing cement mortar lined steel piping discharge headers.
Tags : 
fibrwrap, cfrp, cement damage, repairs, engineering, construction, water pipes, fibre channel
    
FIBRWRAP

Technology Lead Generation The Way You Want It

Published By: Find White Papers     Published Date: May 07, 2008
Learn how leading vendors in the technology space are reaching IT professionals through dedicated email blasts, contextual email placements, co-branded directories, and contextual placements. Reach millions of IT buyers on a cost per lead basis, paying for only the leads that download your research and that fall within your specified target audience.
Tags : 
fwp, find white papers, directories, white papers, whitepapers, libraries, research, research library
    
Find White Papers

Lifting the Veil – Why Understanding Beneficial Ownership Is Now Essential for AML Compliance

Published By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures
    
Fiserv

Why Now is the Time to Move Your Enterprise Contact Center to the Cloud

Published By: Five9     Published Date: Jun 14, 2019
Cloud contact center has been a hot topic in the industry for some time, but moving your contact center to the cloud is no small decision. We understand that migrating your contact center is not something to jump into without considerable due diligence. We also know from our experience working with leading brands, however, that moving the contact center to the cloud pays off and is fast becoming the only way for an organization to embrace the advancements in self-service, intelligent routing and agent assistance that artificial intelligence (AI) will soon deliver. This paper is designed to help evaluate your current contact center as you consider a move to the cloud. Our goal, as always, is to enable you to deliver exceptional customer experiences, and we are here to assist you at every step as you transition to the cloud.
Tags : 
    
Five9

5 Ways A Security Architecture Will Save Your Organization

Published By: Forcepoint     Published Date: Apr 19, 2016
Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
    
Forcepoint

Why more Tools Won’t Protect Your Network

Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection, access control, anti spam, anti spyware
    
Forcepoint

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Accelerate Cloud App Adoption without Compromising Security

Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint

Unified Data Protection for Hybrid IT – Exec Summary

Published By: Forcepoint     Published Date: Oct 03, 2019
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. This webinar explores how companies should rethink data security, focusing on the following three principles: Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of context and user intent Learn more about how to embrace a risk-adaptive approach to data protection.
Tags : 
    
Forcepoint

Unified Data Protection for Hybrid IT: Part 2

Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint

The Pragmatic Path to Achieving NAC Results: Essential Implementation, Process and Control

Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout

Tolly Report: Comparative NAC: ForeScout, Bradford, Cisco & Juniper

Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout

Frost & Sullivan: Continuous Compliance and Next Generation NAC Report

Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout

Designing Drives for a Competitive Edge

Published By: Gates     Published Date: Aug 12, 2011
Field redesigns point the way to next-generation machines. This paper includes case studies showing how conversions from roller chain or gears to synchronous belt drives improved performance while saving maintenance and replacement costs.
Tags : 
gates, power transmission, engineering, oe manufacturing, field retrofits, field redesigns, drive designs, drive systems
    
Gates

Mastering the EMR Selection Process: Steps to Successful Electronic Medical Record Adoption

Published By: GE Healthcare     Published Date: Jun 04, 2014
A recent KLAS publication reported more than a third of ambulatory practices (ranging from small to large) will replace their current EMR system. Why? Poor functionality, sun-setting products, and concerns about the corporate viability drive replacement needs. KLAS notes that while providers are still evaluating niche EMR products, many organizations are seeking the stability of established vendors. With Health Information Technology, especially EMR, moving from “nice to have to need to have,” selecting the right EMR has become a mission critical business driver.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor
    
GE Healthcare

The Total Cost of Ownership of EHR in a Meaningful Use World

Published By: GE Healthcare     Published Date: Jun 04, 2014
The central theme of industry wide adoption of EHRs is based on the concept of “meaningful use,” which by design is a metric that will connect all the moving parts of this complicated initiative into a system that communicates and delivers high-grade electronic healthcare services. To qualify as a “meaningful user,” eligible providers must demonstrate use of a “qualified EHR” in a “meaningful manner.” It is a lofty and worthwhile goal. This white paper examines the total cost of ownership for “meaningful” EHR adoption in a physician practice.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor
    
GE Healthcare

Filter Press Basics and Issues vs. Alternative Batch or Continuous Replacement Tech

Published By: Genesys     Published Date: Mar 01, 2008
Filtration experts have discussed filter presses and their perceived shortcomings. This article discusses filter presses as well as the batch or continuous filtration alternatives to replace them.
Tags : 
enterprise applications, call center management, call center software, customer interaction service, contact management, customer experience management, sla
    
Genesys

Gartner Report: Gartner Magic Quadrant for Contact Center Infrastructure, Worldwide

Published By: Genesys     Published Date: Feb 21, 2018
The 2017 Magic Quadrant provides Gartner’s annual analysis of the contact center infrastructure vendors. The report examines the innovations driving the market and compares vendors based on completeness of vision and ability to execute. Get the complimentary report now to: • Compare contact center vendors and see which quadrant they are aligned to • Review the latest market outlook including on premise and cloud deployment choices • Learn what critical capabilities to consider when evaluating solutions and legacy system replacement For the ninth year, we are honored to be positioned as a leader in the 2017 Gartner Magic Quadrant for Contact Center Infrastructure, Worldwide. Gartner placed Genesys highest amongst all vendors in ability to execute and completeness of vision. We believe this unique position validates our mission to power the world’s best customer engagement solutions for organizations of all sizes, both in the cloud and on premise.
Tags : 
gartner, contact center, infrastructure, magic quadrant
    
Genesys

Gartner Report: Gartner Magic Quadrant for Contact Center Infrastructure, Worldwide

Published By: Genesys     Published Date: Feb 22, 2018
Get Gartner’s Complete Analysis of The 2017 Magic Quadrant provides Gartner’s annual analysis of the contact center infrastructure vendors. The report examines the innovations driving the market and compares vendors based on completeness of vision and ability to execute. Get the complimentary report now to: • Compare contact center vendors and see which quadrant they are aligned to • Review the latest market outlook including on premise and cloud deployment choices • Learn what critical capabilities to consider when evaluating solutions and legacy system replacement For the ninth year, we are honored to be positioned as a leader in the 2017 Gartner Magic Quadrant for Contact Center Infrastructure, Worldwide. Gartner placed Genesys highest amongst all vendors in ability to execute and completeness of vision. We believe this unique position validates our mission to power the world’s best customer engagement solutions for organizations of all sizes, both in the cloud and on premise.
Tags : 
gartner, contact center, infrastructure, magic quadrant
    
Genesys
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.