production

Results 176 - 200 of 517Sort Results By: Published Date | Title | Company Name
Published By: Thomson Reuters     Published Date: Aug 10, 2018
Documents reviewed for production are the facts that underlay all claims and defenses and they matter. But with volumes and costs exploding, its harder than ever to find the needle in the haystack. Join litigation experts from Thomson Reuters as they show you how to design a document review with an eye toward fact-finding, case analysis, and litigation strategy. Attendees should have a basic understanding of document review and production practices and terminology. In this complimentary webinar, you will learn more about: How to design a strategic review protocol Optimizing process to increase communication Knowledge sharing between the review and the law firm teams Next steps once production is complete This is Part I of a multi-part webinar series on leveraging document review to maximize litigation strateg
Tags : 
leveraging, document, review, maximize, litigation, strategy
    
Thomson Reuters
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the worlds oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : 
energy, utilities, ibm, pov
    
IBM
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : 
stratus, tco, total cost of ownership, operations
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : 
stratus, operations, total cost of downtime, downtime, scada downtime
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jan 31, 2017
Discover how much unplanned downtime costs the average manufacturer in labor, safety, clean-up, production-line restoration, delayed delivery, unfilled orders, disposal, and other direct costs.
Tags : 
stratus, tco, total cost of ownership, operations
    
Stratus Technologies
Published By: CyberX     Published Date: Aug 21, 2017
Today, a range of diverse cyber-adversaries including nation-states, cybercriminals, competitors, hacktivists, and insiders/contractors pose financial, reputational and regulatory risk to industrial and critical infrastructure organizations. The business impact can include costly production downtime, safety failures, and environmental release of hazardous materials, as well as theft of corporate secrets such as sensitive information about formulas and proprietary manufacturing processes. The challenge is compounded as organizations adopt digitization initiatives and IT/OT convergence to support the business removing any air-gaps that may have existed in the past. To help security and operations teams stay ahead of the latest ICS/SCADA threats, CyberX the industrial cybersecurity company founded by military cyber experts with nation-state experience securing critical infrastructure has partnered with SANS to create educational content about emerging ICS threat vectors and
Tags : 
ics, scada, cyberx, cyber security, hacking, randomware
    
CyberX
Published By: Datastax     Published Date: Aug 23, 2017
Enterprises today continue to differentiate themselves with cloud applications any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industrys best distribution of Apache Cassandra. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra for production environments.
Tags : 
cloud, adoption, application, migration, performance
    
Datastax
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014 The seminal DevOps bookGene Kims The Phoenix Projectwas one year old Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 "Continuous Testing just started appearing in industry publications and conferences2 Many of todays popular test frameworks were brand newor not yet released The term microservices was just entering our lexicon QC/UFT and ALM were still sold by HP (not even HPE yet) Only 30% of enterprise software testing was performed fully in house3 There was no GDPR restricting the use of production data for software testing Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadnt even been announced Times have changeda lot. If the way that youre testing hasnt already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
    
Tricentis
Published By: Tricentis     Published Date: Aug 19, 2019
Lets face it. Businesses dont wantor needperfect software. They want to deliver new, businessdifferentiating software as soon as possible. To enable this, we (Development and Testing teams) need fast feedback on whether the latest innovations will work as expected or crash and burn in production. We also need to know if these changes somehow broke the core functionality that the customer baseand thus the businessdepends upon. This is where Continuous Testing comes in. Continuous Testing is the process of executing automated tests as part of the software delivery pipeline in order to obtain feedback on the business risks associated with a software release candidate as rapidly as possible.
Tags : 
    
Tricentis
Published By: TIBCO Software     Published Date: Jul 22, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product wasteand the need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product wasteand the need to rework faulty products. Watch this webinar to learn how TIBCOs Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Published By: Sage EMEA     Published Date: Jun 25, 2019
Digital transformation is now in the rearview for todays top-performing manufacturers. Industry 4.0 is the next phase of the journey toward perfect production, where the aim is minimal downtime, neglect, waste, and inefficiency. Industry 4.0 is where factory managers, financial experts and executives use cutting-edge technology to understand data and production reaching the pinnacle of technology and manufacturing development.
Tags : 
    
Sage EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: Micro Focus     Published Date: Aug 17, 2011
With the majority of mainframe processing power allocated to production, the mainframe is not the most appropriate platform for ongoing development.
Tags : 
micro, cobol, rumba, fr arbeit, rumba, server express, server express, express server
    
Micro Focus
Published By: Micro Focus     Published Date: Aug 17, 2011
Rehosting preproduction testing, while the production system stays on the mainframe, is a proven approach to reduce operating costs & improve quality
Tags : 
micro, cobol, rumba, fr arbeit, rumba, server express, server express, express server
    
Micro Focus
Published By: Tricentis     Published Date: Mar 13, 2018
Testing is critical to the success of any application. In fact, your software is only as good as the testing team behind it and their ability to identify bugs before they find their way into production. Practically speaking, that means that building and nurturing an effective testing team is mission critical. But, of course, doing so is a lot easier said than done. That's because to be successful, todays testing teams need to be cross-functional, efficient, and focused on the right things. They also have to be fully bought in and worthy of deep trust. As a result, finding the right candidates can be a challenge, so you have to get creative. Not only that, to attract and retain the best talent, you need to keep them motivated by giving them ample opportunities to learn and advance their career, while not weighing them down with the burden of time-consuming and unnecessary administrative tasks. Instead, you want to equip your team with the right tools to enable and empower them.
Tags : 
    
Tricentis
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle
    
Red Hat, Inc.
Published By: MicroStrategy     Published Date: Aug 21, 2019
To survive and thrive in an era of accelerating digital disruption, organizations require accessible data, actionable insights, continuous innovation, and disruptive business models. Its no longer enough to prioritize and implement analytics leaders are being challenged to stop doing analytics just for analytics sake and focus on defined business outcomes. In addition, these leaders are being challenged to bring predictive capabilities and even prescriptive recommended actions into production at scale. As AI and accelerated growth and transformation become top of mind, many enterprises are realizing that their current segmented analytics approach isnt built to last, and that real transformation will require proper endto- end data management, data security, and a data processing platform company-wide. The year 2019 will be a turning point for many organizations that realize being data-driven doesnt guarantee future success.
Tags : 
    
MicroStrategy
Published By: Frost and Sullivan     Published Date: Sep 21, 2012
Join Frost & Sullivan and Scottish Development International for a complimentary eBroadcast as we discuss why new game-changing product applications and technologies are seeing radical developments.
Tags : 
production, market applications, product applications, biomaterials, composites, metals and alloys, electronic functional materials
    
Frost and Sullivan
Published By: Brainshark     Published Date: Oct 16, 2013
Harnessing the combined power of online video, mobile technologies and social media will be crucial to the marketer's success in an increasingly media-rich world.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
Having trouble driving registrations to your live webinar? Maybe it's time for a change. This report explores picking the right webinar strategy for your goals, webinar best practices and technology integration.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
Running low on content for your next campaign? Learn how leading marketers are repurposing existing content and delivering it in a creative, targeted and measurable format that fuels successful lead generationwhile also saving time and money.
Tags : 
video marketing, content marketing, marketing best practices, social media, viral video, inbound marketing, outbound marketing, tracking video
    
Brainshark
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.