Skip to main content
 

safe

Results 1 - 25 of 968Sort Results By: Published Date | Title | Company Name
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Factory production lines know the right jig or fixture speeds production, which increases productivity. But that’s just the beginning. Well-designed tools are more ergonomic, offering both increased worker safety and productivity, as well as cost savings. Traditional machining produces heavy, costly, multi-piece tools that become an even greater liability as repetitive motion injuries erode line productivity with worker disability. Redesign means even more protracted timelines for machined parts. While essential to efficiency, accuracy and safety, jigs and fixtures are often considered a necessary evil in the overall production process. Costly, protracted timelines for machined jigs and fixtures are the culprit here, especially for the often complex designs necessary to meet unique part needs. This, along with certain complex designs that simply cannot be manufactured using traditional methods are a reality on the production floor. But there is a better way. 3D printed jigs and fixture
Tags : 
    
Stratasys EMEA
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: HERE Technologies     Published Date: Feb 12, 2019
How does a transport authority to provide the safest and most efficient road network possible? How does it ensure the supply of data on road closures, accidents and disruptive events used in its decision-making is of the highest quality? This ebook examines the process used by HERE Technologies to produce industry-leading traffic content. As the foremost global provider of traffic incident information, HERE is well placed to help transport authorities exceed expectations as it produces evermore precise and granular data around the incidents that impact traffic flow.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 12, 2019
Many on-demand companies are starting to rely on fast, accurate and robust mapping and location technologies in order to stay competitive and to provide superior end-user experience. Leveraging location data can assist you in accurately locating each delivery address, matching demand with available supply and exceeding your customer’s expectations. Discover a variety of ways in which on-demand transportation can be optimized by maps and location services such as those created by HERE. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to improve transportation efficiency and safety.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 12, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2019.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 12, 2019
Get higher quality, more accurate location data – and a safer, more profitable fleet – by choosing the right location services provider. The true value of a location platform comes from bringing together multiple data sources and presenting them in a meaningful way. Using a platform approach, you can help customers differentiate their service, increase margins and increase safety. So, in this guide, we cover the four key considerations for choosing a mapping and location service platform to ensure a high quality, accurate mapping service for you and your customers. Download the eBook
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: RSM US     Published Date: Feb 08, 2019
As your nonprofit organization grows, your needs grow commensurately, often outpacing your managed service providers’ capabilities. To better safeguard your organization’s future, your managed service providers should exhibit these five key components:
Tags : 
    
RSM US
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Telecom Italia (TIM) Headquarters: Milan, Italy Users: 600,000 Objective: As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider TIM sought an innovative solution to effectively and efficiently protect the network and data of its business users. Solution: Cisco Umbrella for Service Providers (SPs) Impact: • Rolled out TIM Safe Web to more than 600,000 customers, with less than 1 in 10,000 customers opting out of the service • Provided TIM with a unique competitive differentiator • Created an incremental revenue stream for TIM
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Avoid these six common security pitfalls that put your users, their devices, and your data at risk.
Tags : 
    
Cisco Umbrella EMEA
Published By: Forcepoint     Published Date: Jan 29, 2019
For most organizations, compliance is a bottomless pit of cost and effort. Too many infrastructure components and configuration points, too much data and too many places to put it—there are just too many places for threats to hide.In this session, Forrester Vice President and Principal Analyst Andras Cser shares how to prioritize security and compliance efforts. Specific topics include: - How your auditors are behaving; - Why risk-based prioritization is the only way to find threats; - The importance of context; - Forrester’s recommendations and best practices. Watch this webcast and learn how to make your organization’s journey to the cloud as safe as possible.
Tags : 
    
Forcepoint
Published By: Oracle     Published Date: Jan 28, 2019
For more than a decade, Oracle has developed and enhanced its ZFS Storage Appliance, giving its users a formidable unified and enterprise-grade storage offering. The latest release, ZS7-2, boasts upgraded hardware and software and is a timely reminder that more users might do well to evaluate this offering. It has a trifecta of advantages: (1) It’s notable performance, price-performance, and flexibility are all improved in this new release (2) There is a surprisingly inclusive set of functionalities, including excellent storage analytics that were developed even before analytics became a contemporary “must-have” (3) There’s a compelling group of “better together” elements that make ZFS Storage Appliance a particularly attractive choice for both Oracle Database environments and users that want to seamlessly integrate a cloud component into their IT infrastructure. Given the proven abilities of Oracle’s prior models, it’s also safe to assume that the new ZS7-2 will outperform other m
Tags : 
    
Oracle
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: HERE Technologies     Published Date: Jan 24, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2019.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: HERE Technologies     Published Date: Jan 22, 2019
To improve safety and mobility across its 5,600km road network, the City of Toronto forged a partnered with HERE Technologies for the provision of traffic, incident, and historical traffic data. Access to this data allows the city authority to see exactly what’s happening on its roads and more easily and affectively run studies on improvement projects. This case study details how HERE Technologies enabled the City of Toronto’s transportation team to: Work smarter with comprehensive network coverage and accurate data to aid analysis Examine the impact of city projects without significant forward planning or expenditure Ensure travel volume models used to drive decision making are calibrated to represent real-world truths
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Most of the public and its public safety professionals live and work in a digital world of mobile devices, instant connectivity, and geo-location. This one powerful fact is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices.1 With the help of advanced technologies, citizens and trusted partners, agencies are: Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: HotSchedules     Published Date: Jan 17, 2019
Food safety should always be top-of-mind. Even one foodborne illness could put your restaurant out of business. The safety and well-being of your customers are at stake when your team isn’t following proper food safety protocol. This is where employee training becomes essential: your business needs a culture that values food safety. Typically though, food safety training hardly comes off as an exciting topic. But with today’s technology training can be engaging, entertaining, and memorable. This ebook will show you how to breathe new life into your food safety training with four lessons on making training more impactful.
Tags : 
    
HotSchedules
Published By: TIBCO Software EMEA     Published Date: Jan 17, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
data, virtualization, manufacturers, customer, supply, products, optimization, product
    
TIBCO Software EMEA
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
MANUFACTURING: AN INDUSTRY DRIVEN BY DISRUPTION A leading manufacturer today can be an also-ran next year. Disruption is the new normal. Maintain the status quo at your peril because no manufacturer is safe from: •? Innovative new products that can radically shift demand •? Falling prices that relentlessly pressure costs •? Dynamic business models where yesterday’s partner can become tomorrow’s competitor Turning disruption into your advantage requires continuous innovation and optimization, driven by data.
Tags : 
    
TIBCO Software GmbH
Published By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
    
ALE
Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.