Skip to main content
 

safe

Results 926 - 950 of 1042Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 03, 2018
Wireless technology is increasingly used in machine safety applications. New solutions introduce mobility and offer higher levels of flexibility and safety for plant floor operators. This eBook explores how modern wireless implementations can increase user safety and mobility, reduce installation costs, and boost productivity.
Tags : 
safety, wireless, efficiency, smart machines, machine safety, productivity, security, cybersecurity, industrial automation, plant, factory
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., T‹V) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plantís overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm, enterprise resource planning, erp solutions, erp vendors, erp modules, asset-intensive
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Assessments are the key tools for uncovering vulnerabilities in your security that may be well hidden. This webinar explains how your organization can gain value and insight from the various types of security assessments that safeguard the confidentiality, integrity and availability of your critical business data.
Tags : 
ibm, ibm mi, ibm grm
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Affordable System x Express servers from IBM include features designed to keep your data safe and rapidly accessible. This e-kit includes white papers, datasheets and product guides for individual products, as well as overviews that help you compare systems and storage solutions so you can choose what works best for your business.
Tags : 
ibm express seller, data protection, security, ibm, data security, storage solutions
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation
    
IBM
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
This paper by S. Raghavendran of Pixel Infotek Pvt Ltd on GIS Interoperability and Spatial ETL solutions was presented at the GSDI conference in India and provides an excellent description of the interoperability challenges that Safe's products address.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
This paper defines the function of spatial ETL and expands the role and impact it has with spatial data processes and GIS systems.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
One of the most powerful aspects of GML is the freedom it gives users to define their own custom application schemas. While this capability provides extraordinary flexibility to data modellers, it also creates significant challenges, particularly when the data is interpreted.
Tags : 
spatial, geographic information system, geographic information systems, geological, geography, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
Implementing a web-based spatial data distribution can be a challenge, but many organizations are doing it successfully and reaping the benefits.
Tags : 
spatial, collaboration, distribute data, data management, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Mar 19, 2008
In this follow-up to their preholiday study of 12 of the season's most talked about products and retailers, Oneupweb looks at how these companies' online social media marketing strategies played out during the 2007 holidays. See what worked, why, and what social media marketing tactics you should be considering in 2008.
Tags : 
social, social media, one up web, oneupweb, survey, poll, ipod, wii, target, coach, webkinz, myspace, taryn, pronto, starbucks, pleo
    
Safe Software
Published By: Secure Computing     Published Date: Aug 21, 2009
Unknown attacks are quickly becoming the next great information security challenge for today's organizations. Get up to speed on what these threats really are and learn what security measures are available to keep your network safe from these attacks.
Tags : 
security, patch management, security management, web service security, malware, intrusion prevention, internet security, internet attacks, attacks, network security, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: Villanova     Published Date: Aug 21, 2009
Based on the Japanese words Seiri, Seiton, Seiso, Seiketsu and Shitsuke, the 5S philosophy focuses on effective workplace organization and standardized work procedures. 5S simplifies your work environment, reduces waste and non-value activity while improving quality efficiency and safety. Once fully implemented, the 5S process can increase morale, create positive impressions on customers, and increase efficiency and organization.
Tags : 
lean methods, productivity, efficiency, workforce management, customer service, six sigma, 6 sigma, project management, business management, business process management, bpm, people management, villanova
    
Villanova
Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery, emc, emc insignia
    
EMC
Published By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : 
disaster plan, encryption, disk backup, tape backup, offsite storage, offsite, off-site, backup data, data backup, aes encryption, data protection, emc, emc insignia
    
EMC
Published By: Symantec     Published Date: Dec 12, 2006
Read this whitepaper to find out how this latest release of Symantec's Backup Exec can help safeguard critical Microsoft Exchange 2000 Server and Exchange Server 2003 data.
Tags : 
backup, backup and recovery, high availability, microsoft exchange, data protection, symantec
    
Symantec
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech
    
Xiotech
Published By: SpringCM     Published Date: Dec 06, 2006
On behalf of CHEMCENTRAL, SpringCM manages more than 1.2 million documents — growing by more than 50,000 new documents each month — such as Material Safety Data Sheets (MSDS), Certificates of Analysis (CoA), product updates, proofs of delivery, price letters, and invoices.
Tags : 
document management, case study, chemical, product information, product information management, pim, msds, product safety information, spring cm, springcm
    
SpringCM
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
To be successful in today's safety-conscious and efficiency-minded marketplace, companies must combine compelling new technologies to offer the most convenient and effective business services and solutions. For monitoring remote tank sites, that means combining the intelligence of General Packet Radio Service (GPRS) communication with the risk mitigation properties of intrinsic safety.
Tags : 
business analytics, business management, business metrics, business intelligence, bi software, enterprise software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
    
Cyberoam
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.