internet things

Results 276 - 300 of 391Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Schneider Electric     Published Date: Aug 15, 2017
In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. Speed, efficiency, flexibility, and scale are now critical for winning the race to meet new connectivity and processing demands caused by the Internet of Things (IoT) and Big Data.
Tags : 
planning process, reference designs, cost analysis, design, site selection, schneider, electric
    
Schneider Electric
Published By: IBM     Published Date: May 31, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, iot technology, digital transformation
    
IBM
Published By: IBM     Published Date: Jul 13, 2017
Leaders embracing the ioT are gaining new values, including accelerating innovation, enhancing operations, and improving engagement. Disruptors are utilizing the internet of things and recomposing their businesses by digital transformation. There are many different ways to unlock the potential of the internet of things. The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
iot, internet of things, innovation, enhancing operations, digital transformation, iot technologies
    
IBM
Published By: IBM     Published Date: Oct 18, 2017
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies. To find out how you can extract value from the IoT, check out this recent IBV study.
Tags : 
internet, ibm, ibv, internet of things
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18
Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
A multitude of “things” generate floods of big data – cars, wearables, machines and appliances. Wouldn’t you like to sift through that noise and become an organization that relies on data to make fact-based decisions? Learn about the three foundations of becoming data-driven – data management, analytics and visualization – and how they can increase profitability, boost performance, raise market share and improve operations. Read about hurdles to becoming a data-driven organization and learn best practices from others. Then get a glimpse of what the future holds with the Internet of Things (IoT), edge analytics, artificial intelligence (AI) and other technology innovations.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Data integration (DI) may be an old technology, but it is far from extinct. Today, rather than being done on a batch basis with internal data, DI has evolved to a point where it needs to be implicit in everyday business operations. Big data – of many types, and from vast sources like the Internet of Things – joins with the rapid growth of emerging technologies to extend beyond the reach of traditional data management software. To stay relevant, data integration needs to work with both indigenous and exogenous sources while operating at different latencies, from real time to streaming. This paper examines how data integration has gotten to this point, how it’s continuing to evolve and how SAS can help organizations keep their approach to DI current.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: IBM     Published Date: Jul 27, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
insights, trends, business models, iot, internet of things, situational awareness, big data cloud computing, viable substitutes, customer engagement
    
IBM
Published By: Schneider Electric     Published Date: May 09, 2016
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
schneider electric, edge computing, data center, energy efficiency, data center energy, data center design and management
    
Schneider Electric
Published By: WebEx Communications     Published Date: Dec 14, 2007
The Internet is revolutionizing technical support. But, this efficiency often comes with a price in customer satisfaction. Customers expect to be able to solve their own problems or immediately communicate with a person who can make things right. But too often, these expectations aren't met. What's needed is a new class of software: web-based Automated Contact Distribution.
Tags : 
remote support, contact management, customer, customer service, customer support, online support, online help desk, help desk, crm, webex
    
WebEx Communications
Published By: QTS Data Centers     Published Date: Feb 17, 2017
As data consumption continues to grow and the expansion of the Internet of Things drives increased demand for data center storage, providers are facing a unique challenge. How can a facility meet the needs of customers today while keeping pace with how those needs will grow in the future? This whitepaper will discuss how the incremental growth philosophy is changing data center design. Download it now to learn about: The incremental growth philosophy. Implementing the philosophy. Pioneering incremental growth.
Tags : 
    
QTS Data Centers
Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused, it management, enterprise applications
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator, software development
    
ForgeRock
Published By: LookingGlass Cyber Solutions     Published Date: Apr 26, 2016
The Internet of Things (IoT) is expanding in a dramatic way, bringing to question the issue of availability versus security, as security measures are having a difficult time keeping pace with the development of IoT devices. The introduction of more efficient semiconductors, coupled with revolutionary technology that allows semiconductors to store as well as process complex instructions, means that the IoT may be a more attractive target for hackers. IoT devices from healthcare and industrial systems (i.e., SCADA) could be the most at risk for significant service interruptions and may have secondary and/or tertiary effects on other industries.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
LookingGlass Cyber Solutions
Published By: ForeScout     Published Date: Aug 15, 2017
In this IDC Perspective report, research director Abhi Dugar looks at IoT security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments.
Tags : 
    
ForeScout
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: ForeScout     Published Date: Nov 16, 2017
"Cyberattacks on Internet of Things (IoT) and operational technology now expose businesses to greater risk. But, with all the security technology available today, we asked ourselves the question, why do they keep happening? ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. Read the Report to learn more about the findings.
Tags : 
    
ForeScout
Published By: IBM     Published Date: Jan 05, 2015
As the number of connected devices grows from billions to hundreds of billions, and as governments and corporations race to take control of devices and data, we need to save the Internet of Things (IoT). Successfully scaling the IoT means executives must rethink the technology strategy.
Tags : 
it strategy, modern computing, iot, cost of computing, it management, knowledge management, enterprise applications, data management
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com